1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Pohrn control on home network

Discussion in 'Security and Privacy' started by alphaa10, 2010/03/13.

  1. 2010/03/13
    alphaa10

    alphaa10 Inactive Thread Starter

    Joined:
    2008/12/28
    Messages:
    9
    Likes Received:
    0
    BLOCK POHRN ON A WIRELESS HOME NETWORK

    BACKGROUND
    I plan a home wireless network, N-class, and know visiting teenagers will be tempted on rare occasion to go places on the internet they should not. So, I need a way to prevent internet travel to pohrn palaces and other sites associated with malware.

    PROPOSED METHOD
    Generally, I am familiar with wireless setup, and plan to use WPA2 security to restrict the network to authorized users.

    Since my objective is to stop pohrn, I have a choice between a content-screening proxy like OpenDNS, through which all my router traffic would be directed, or a locally-resident program like NetNanny or CyberSitter.

    OpenDNS would be my first choice, since creating a control point is vastly simpler for the local network-- one proxy, one connection point. But OpenDNS seems a bit too loose to provide the fine-grained control I need to keep out cleverly-named websites (whose web page search descriptors draw Google searches like a magnet, no matter what the domain name).

    So, I am driven to consider a locally-installed control program like NetNanny or CyberSitter to seal the leaks more effectively. Generally speaking, both products do a fairly complete job and are frequently updated with new lists. The only drawback, at least theoretically, is local control programs impose a real-time burden on system processing times. RAM must be maxed and the CPU very capable to get a decent system response.

    That being the case, I plan to run a fairly powerful gateway computer just behind the broadband modem. The gateway will run all the time, and host the pohrn screening programs. A solid system (and CMOS screen) admin password will keep the screening from being too hackable.

    Out of the backplane of the gateway system (on a separate card), I plan to run a router to broadcast the wireless signal to all network machines.

    WHAT DO YOU THINK?
    Is this design practical? Will it work? Have you tried such a setup?

    Your suggestions could be valuable to others. Many home networks across this country and abroad must deal with the intrusiveness of malware, pohrn and cybercrime, and need help.

    One veteran already has commented that pohrn control is all but a "lost cause ", and he seems to have a defensible point of view. But necessity is the mother of invention (and midwife to many hours of lost sleep).
     
  2. 2010/03/13
    TonyT

    TonyT SuperGeek Staff

    Joined:
    2002/01/18
    Messages:
    9,072
    Likes Received:
    400
    What operating system on the gateway? This matters a lot. There are free Linux distributions compiled solely for this type of use, with IPTables firewall and robust rules and configuration possible.
    http://www.livecdlist.com/purpose/firewall
    http://www.google.com/#q=linux+firewall+distributions&hl=en&sa=2&fp=f8bc9ba0718e9555

    Another option is to use a wifi router that has been modified with dd-wrt firmware, there are versions that have such filtering capabilities that would suit your needs. This is far cheaper than building a gateway computer.

    No matter the operating system on a gateway, a hosts file can be used to prohibit access to known malware & pron sites, but as your friend stated, it's a never ending battle that has no winners, at best a tie can be achieved.

    The best method of controlling this is education and agreed upon network policies/comp use. Inform anyone that uses the network that the lan is locked down and all usage is logged and filtered. This acts as a deterrant to begin with.

    Put a hub between the access point and the gateway and connect your comp to it by wire. Then run wireshark and demonstrate that ALL network traffic can be captured, show someone their captured email username/password. They will think you are a guru and they will be reluctant to use the network for anything dishonest or risky.
     
    Last edited: 2010/03/13

  3. to hide this advert.

  4. 2010/03/14
    alphaa10

    alphaa10 Inactive Thread Starter

    Joined:
    2008/12/28
    Messages:
    9
    Likes Received:
    0
    Thanks, Tony-- you understand the problem.

    The gateway runs XP Home, which is not perfect, but XP is widely supported by device OEMs (giving me more flexibility for solution), and at least I can password it, along with the CMOS.

    From your description, Linux is an interesting and capable option, but my main concern seems simpler-- effectively excluding pohrn sites without significant maintenance. Although I do plan to check out the Linux links you provide, to the best of my information, no OS or firewall list can spare me hours of tinkering to keep up with the ongoing struggle.

    The pohrn situation almost dictates a third-party, automatically-updated solution, since I cannot be always present to tweak against holes as they develop.

    Which brings NetNanny and CyberSitter into play. Although both of these products, by their multi-level screening, seem much more comprehensive and consistent than the OpenDNS approach, even they have some warts. For example, any really serious effort at screening with NN or CS requires some editing of white or black lists after a breach occurs.

    That said, my objective is to minimize my own editing, and in a toss-up between maintenance levels for OpenDNS versus NN and CS, OpenDNS probably loses.

    The reason I keep OpenDNS an option is all the facts are not in. Both NN and CS pose real questions about how they interdict-- they degrade system performance if installed locally, and that is my principal reason for the idea of a gateway, instead, as a control point. The hope is all local, user operations will run normally, while the gateway (where NN or CS reside) will function as a more or less transparent intercept point.

    The same performance consideration becomes all the more important if my users also plan to stream video over the network

    Another question about how NN and CS will interdict is whether they will work when installed on a gateway intended as an internet proxy. Since you are an MS MVP, would the MS concept of a gateway offer an effective solution? That is, would browser requests from users on the (wireless) router subnet actually run through a NN or CS screening and review on the gateway machine? Or does MS mean, by "gateway ", a much more general sense of internet access and protection?

    Again, the critical question is whether NN and CS will work for this design when installed on a gateway / proxy, rather local (user) machines.

    BTW, to prevent users from simply connecting their own machines via ethernet cable directly to the ISP-supplied modem (upstream of the gateway), I plan to replace the ISP's modem with a good, PCI-based internal broadband modem for N-level network traffic. The phone line goes in the gateway backplane and modem input port, and the traffic exits a separate network card to the router / access point. Such PCI modem cards are in common use everywhere, it seems, but the USA (ISPs love selling hardware).

    In any case, it is vital to use only a PCI, N-level modem without built-in, ethernet output ports, to restrict traffic to pass through the gateway machine, and to the router.

    The more I ponder this "out loud ", so to speak, the better the responses from experts like you have been. I hope you understand your helpful advice will be of value to others, including many families which elect to stimulate the local economy and acquire the services of a local computer expert.

    As mentioned, I'll look over the Linux options. I know far less than you about Linux general suitability, so forgive my presumptions about what Linux can and cannot do. In the next year, in fact, I plan to explore the robust authentication and security options of Novell / Suse and begin to install that for client / office situations. Already, it appears Linux has much better general security than any rival in the market.

    By no accident, NSA has its own (more secure) version of Linux, just as the PRC has Red Flag Linux for its own offices. Years ago, in fact, when Mr. Gates visited Beijing to sell Windows as the official interface of PRC government offices (promising to let the PRC look over Windows source code), they would have none of it. Ironically enough for the PRC, on grounds Windows was too insecure.


    ---- REFERENCE LINKS BELOW ----

    OpenDNS--
    Introduction-- https://www.opendns.com/start/
    Specifics-- http://www.opendns.com/solutions/overview/

    NetNanny--
    Introduction-- https://www.netnanny.com/alt_rotate
    Specifics--https://www.netnanny.com/products/netnanny_home_suite/detail/technical#reports

    CyberSitter--
    Introduction-- http://www.cybersitter.com/cs10mainpage.html
    Specifics-- http://www.cybersitter.com/cs10mainpage.html
     
  5. 2010/03/14
    TonyT

    TonyT SuperGeek Staff

    Joined:
    2002/01/18
    Messages:
    9,072
    Likes Received:
    400
    To be honest, I am not certain that Windows XP can utilize 2 network cards and route Internet traffic from the access point. To my knowledge it can't.

    XP has Internet Connection Sharing and I believe that's the only way that Internet traffic can be routed in XP, unless a 3rd party software is used which has the capability of utilizing separate NICs.

    AFAIK, Windows XP can only use one single network connection at a time, or it can bridge 2 adapters into a virtual single connection, but it cannot route 2 separate connections. You'd need a server operating system to do that.

    I wouldn't go so far as to use an internal dsl modem. And I wouldn't go that far to restrict pron sites and known malware sites either. If someone wants to bypass a proxy or look at questionable content, they are going to do it no matter what steps you take to prevent it. That's why edu is the senior thing to do to prevent it.

    When my children were young I had similar concerns. My solution was to demonstrate to them that "Dad can see everything you do on your computers ". I showed them how I can connect to their computers or sniff the network traffic. Every now and again I'd ask one of the kids, "hey, you changed your Instant Messenger password again" and read it to them. They realized that "Dad really does know what I do on the comp." I also taught them how malware gets onto a computer and showed them what to do to prevent it, showed them how to use search engines safely, showed them what to do if had any doubts about what to click or if malware at a site is suspected. Sure, I cleaned up a lot of malware & viruses too, but never had to discipline them about pron. The child obsessed with pron has other issues that need addressing!

    What I would do:

    1. lock down router access using strong password.

    2. lock down my own comp & others on the lan using passwords.

    3. young children with their own computers would have limited user accounts, software cannot be installed via such accounts.

    4. use hosts files on their comps to restrict known malware/pron sites.

    5. use antimalware-antivirus on their comps.

    6. use a router that has robust filtering.

    7. use strong WPA2 encryption on access point.

    8. no way to avoid having to do regular updating/maintenence/intervention.

    Bottom line is that any child or teenager who would go so far as to try to reset the router, or who would make an effort to bypass proxies and restrictions on his family's network has deeper problems. A parent can be overly cautious too. No amount of restrictions will help this child.

    If I needed to use heavier filtering, I would use opendns over 3rd party apps like netnanny or proxies.
     
  6. 2010/03/14
    Dennis L Lifetime Subscription

    Dennis L Inactive Alumni

    Joined:
    2002/06/07
    Messages:
    2,557
    Likes Received:
    2
    I practice / agree with TonyT's method.
    Over the years have raised 7 children (oldest 29, youngest 16) and a school full of friends. For the past week I have up to 7 computers accessing home network / router 20+ hours a day. The main gathering area for family and friends is our very open family room ... which is where all of our desktops / router is located. All friends of our children know this is the only area of the house they can surf / use their laptops. I run OpenDNS/network at router and some "key explicit words" (of porne nature) filters at router level. After that it is the honor system/trust/ respect of what our family expects of young adults / non-family users.
    Currently I have only my 16 year daughter living at home. I do not have any filters / porne tracking programs on her computer, it's just not necessary. When the boys where living here I ran Blue Coat K9 WebProtection, a commercial grade, but free for use non-commercial use. It did not tax the system, automatic filter and program updates. It had good security for by-pass protection right down to running Safe-mode/network connection safe guards. All K9 users are "automatic watchman" by adding links of objectionable subject matter automatically being passed on to K9 for possible inclusion to master filter (based on material and how many users added site to local filter).
    As with many things in life, it all comes down to acceptable balance. Encourage the good and in most cases it will happen .. with a little nudge here and there.
     
    Last edited: 2010/03/14
  7. 2010/03/14
    alphaa10

    alphaa10 Inactive Thread Starter

    Joined:
    2008/12/28
    Messages:
    9
    Likes Received:
    0
    I have used NN, but not OpenDNS-- can ODNS provide "heavier" filtering than a third-party app like NN or CS?

    My concern, again, was that to reach and maintain the appropriate level of filtering on a consistent basis, I would be required to do list editing with time I do not have.

    ODNS is a wonderful solution, if only it did automatically provide the level of filtering needed. One forum poster has commented ODNS is satisfactory, but did not comment on his threat environment.
     
  8. 2010/03/14
    alphaa10

    alphaa10 Inactive Thread Starter

    Joined:
    2008/12/28
    Messages:
    9
    Likes Received:
    0
    THANKS TO DENNISL

    You are now the third person to suggest OpenDNS (TonyT, and another on a separate forum).

    I would have tried ODNS long ago, but wandering the ODNS forum, I found anecdotes which persuade me there are still plenty of holes to be addressed, despite efforts of (probably) hundreds of ODNS users.

    Of course, I am prepared to accept less than perfection, but need also to reduce my probable investment of time in tweaking ODNS.
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.