Kerio 4.0.7 released

  • Thread starter Thread starter Mel
  • Start date Start date
I like Kerio. Kerio was definitely the fastest firewall that I have
tested on my old PII.

I also use Proxomitron to filter web content, block pop ups etc.
Kerio and Proxomitron are a great combination. Highly recommended!

But, you speak about Kerio 2.1.5, not 4.0.7.

From all I have read, Kerio 4 is a piece of junk.
 
I like Kerio. Kerio was definitely the fastest firewall that I have
tested on my old PII.

I also use Proxomitron to filter web content, block pop ups etc.
Kerio and Proxomitron are a great combination. Highly recommended!

But, you speak about Kerio 2.1.5, not 4.0.7.

From all I have read, Kerio 4 is a piece of junk.
 
But, you speak about Kerio 2.1.5, not 4.0.7.

From all I have read, Kerio 4 is a piece of junk.

I'm using 4.0.7 on an xp home laptop without any problems :) Extremely easy
to install and setup. I like it so far.
 
Il 06/dic/2003 Rob ha scritto:
Well Outpost was not that bad. It was fairly fast compared to ZoneAlarm.
But it was buggy.
Pity. I liked some of the built in features. I got fed up and uninstalled
it.

I like Kerio. Kerio was definitely the fastest firewall that I have tested
on my old PII.

Please, could anyone give me some advice about this alert Kerio(2.1.5) is
giving me continually:

Someone from 69.20.61.210, port 2426 wants to send UDP datagram to port
1027 owned by 'Kerio Personal Firewall Engine' on your computer
Details about application:
c:\programmi\keriopersonalfirewall\persfw.exe

Can I safely put a deny rule or is this something I should allow?
Thank you.
 
Il 06/dic/2003 Rob ha scritto:


Please, could anyone give me some advice about this alert Kerio(2.1.5) is
giving me continually:

Someone from 69.20.61.210, port 2426 wants to send UDP datagram to port
1027 owned by 'Kerio Personal Firewall Engine' on your computer
Details about application:
c:\programmi\keriopersonalfirewall\persfw.exe

Can I safely put a deny rule or is this something I should allow?
Thank you.

I am no expert, but 2.15 ships with default rulesets, and certainly
the rules suggested by sponge at www.geocities.com/yosponge block all
tcp or udp outbound and inward on all ports to kpf

no doubt someone else will advise, but you might also try a common
sense approach - when you see any request at all, unless you know what
it is and you want to allow it, block it and set up a rule to block it
always. Then, if something no longer works (eg antivirus updates) then
think again.

HTH
 
To MLC, I get those all the time and simply don't allow them. Has
never hurt anything not to do so.

I would disallow it.
I am no expert, but 2.15 ships with default rulesets, and certainly
the rules suggested by sponge at www.geocities.com/yosponge block all
tcp or udp outbound and inward on all ports to kpf
no doubt someone else will advise, but you might also try a common
sense approach - when you see any request at all, unless you know what
it is and you want to allow it, block it and set up a rule to block it
always. Then, if something no longer works (eg antivirus updates) then
think again.

Good advice, Alastair. That's how I did it and now I don't have to
mess with it unless I install a new program or program version that
needs to communicate. And in those cases, Kerio (2.1.5) leads me
through the process in a very intuitive way.
 
I am no expert, but 2.15 ships with default rulesets, and certainly
the rules suggested by sponge at www.geocities.com/yosponge block all
tcp or udp outbound and inward on all ports to kpf
no doubt someone else will advise, but you might also try a common
sense approach - when you see any request at all, unless you know what
it is and you want to allow it, block it and set up a rule to block it
always. Then, if something no longer works (eg antivirus updates) then
think again.

Looking up the IP:

Search results for: 69.20.61.210

OrgName: Rackspace.com
OrgID: RSPC
Address: 112 E. Pecan St.
Address: Suite 600
City: San Antonio
StateProv: TX
PostalCode: 78205
Country: US

OrgAbuseHandle: ABUSE45-ARIN
OrgAbuseName: Abuse Desk
OrgAbusePhone: +1-210-892-4000
OrgAbuseEmail: (e-mail address removed)

This IP seems to be a web hosting company.

Plugging the IP into a browser brings up an "under construction" page.
http://www.rackspace.com is the main URL.

I'd give a shot at the abuse address to stop the useless bandwidth and
block the request.

Under Administration in Kerio the highest setting will block all
unknown and not bother you with the pesky request boxes that popup
each time some stray request lands at your door step.
 
Excerpt from
http://www.geocities.com/yosponge/commonprogs.html on Kerio Firewall
setup
-------------------------------------------------
Here are some common programs to allow Access to the Net

This is by no means a complete list. Just some common programs to allow
to access the Internet.

Note that * means part of the name can vary.

It is usually safe to allow the following to access the net:

Netscape Browser - NETSCAPE.EXE

Mozilla Browser - MOZILLA.EXE

Internet Explorer Browser - IEXPLORE.EXE

Kerio Personal Firewall - PERSFW.EXE

Proxomitron - PROXOMITRON.EXE

Free Agent, a popular news reader - AGENT.EXE

Microsoft Outlook, a popular email program - OUTLOOK.EXE

Pegasus, a popular email program - PEGASUS.EXE
 
Il 06/dic/2003 (e-mail address removed) ha scritto:
Looking up the IP:

Search results for: 69.20.61.210

OrgName: Rackspace.com
OrgID: RSPC
Address: 112 E. Pecan St.
Address: Suite 600
City: San Antonio
StateProv: TX
PostalCode: 78205
Country: US

OrgAbuseHandle: ABUSE45-ARIN
OrgAbuseName: Abuse Desk
OrgAbusePhone: +1-210-892-4000
OrgAbuseEmail: (e-mail address removed)

This IP seems to be a web hosting company.

Plugging the IP into a browser brings up an "under construction" page.
http://www.rackspace.com is the main URL.

I'd give a shot at the abuse address to stop the useless bandwidth and
block the request.

Under Administration in Kerio the highest setting will block all
unknown and not bother you with the pesky request boxes that popup
each time some stray request lands at your door step.

Thanks to all of you. I made, me too, a research on 69.20.61.210 and found
the "under construction" page: I don't know why this guys are bombarding me
so heavily these days, I've nothing to do with them. BTW it's not properly
aginst "me", because I'm on dialup and my IP changes. I'll follow your
advices, thanks again :)
 
MLC said:
Thanks to all of you. I made, me too, a research on 69.20.61.210
and found the "under construction" page: I don't know why this
guys are bombarding me so heavily these days, I've nothing to do
with them. BTW it's not properly aginst "me", because I'm on
dialup and my IP changes. I'll follow your advices, thanks again
:)

I don't know whether Kerio enables to either reject or deny a
connection ; if it is the case, I would suggest you rather deny the
connection than reject it. With the reject rule, your pc sends some
packets over this connection (which could give some information to
the third party attacking you) whereas with the deny rule, your pc
is like stealth.
 
I don't know whether Kerio enables to either reject or deny a
connection ; if it is the case, I would suggest you rather deny the
connection than reject it. With the reject rule, your pc sends some
packets over this connection (which could give some information to
the third party attacking you) whereas with the deny rule, your pc
is like stealth.

the choice is between deny this time, or deny all the time.
AFAIK kerio does not send packets outbound to "reject" a connection
attempt
 
Alastair Smeaton said:
the choice is between deny this time, or deny all the time.
AFAIK kerio does not send packets outbound to "reject" a
connection
attempt

Then it doesn't work the same way as Outpost, with which you can
either deny or reject a connection attempt.
 
Il 06/dic/2003 Antoine ha scritto:
Then it doesn't work the same way as Outpost, with which you can
either deny or reject a connection attempt.

Yes, in Kerio there is only "deny", and from what you have said I
understand that this is a safer option.
Now I've set Kerio under a rule to deny always that attempt.
I asked before, because I was wondering if it could be some important
update...
 
donutbandit said:
But, you speak about Kerio 2.1.5, not 4.0.7.

From all I have read, Kerio 4 is a piece of junk.

Yes version 2.1.5. I use it with Proxomitron. No Need to get that more
bloated version of Kerio v4!

Rob
 
Thanks to all of you. I made, me too, a research on 69.20.61.210 and
found the "under construction" page: I don't know why this guys are
bombarding me so heavily these days, I've nothing to do with them. BTW
it's not properly aginst "me", because I'm on dialup and my IP
changes. I'll follow your advices, thanks again :)

I'm on dialup, too, and I get continual scans and probes from ARIN and
other communications services.

The best thing to do is to edit the rules in Kerio to "log" rather than
"alert." Those popups will drive you crazy. I'm not the least bit
interested in what Kerio is blocking - I've used it long enough that I know
it's blocking everything I told it to.

The only rule that I have set for "alert" is the one at the very bottom -
"Block All" - all processes, apps, everything. If something gets to that
point, I want to know about it.
 
Back
Top