Who's There? Firewall Advisor
User's Guide

Appendices

Mac OS X's built-in firewall (12)

Mac OS X 10.4 and later include logging capabilities with their built-in firewall user interface, accessible through the System Preferences window. The Leopard log file contains insufficient information to be useful to Who's There? in any way, and Snow Leopard's log file is in a non-standard format; neither of these built-in firewalls is supported. The Tiger log file is supported with the following significant caveat:

SECURITY WARNING: In Tiger, the firewall log only includes denied connection attempts. If any access attempts to your machine (desired or otherwise) are successful, these attempts will not be included in the log. Due to its lack of logging of successful access attempts, Open Door recommends against use of Tiger's built-in firewall user interface.

An additional, although much less severe, problem with logging in Tiger's built-in firewall user interface is that Mac OS X archives and resets the log file every 7 days, and deletes old archived logs after approximately a month. Thus, in addition to not being able to analyze successful access attempts at all, Who's There? can only analyze at most the last week's worth of denied access attempts through Tiger's built-in logging.

If you choose to use Tiger's built-in firewall, go to System Preferences and choose Sharing. In the Sharing window, click on the Firewall tab to display firewall settings (Figure 1).

Figure 1. Firewall settings

Choose the services, if any, for which you want to allow access, and then click the Start button. Next, confirm that firewall logging is enabled by clicking the Advanced ... button and check Enable Firewall Logging (Figure 2).

Figure 2. Firewall advanced settings

TCP and UDP Port Numbers Commonly Used by Macintosh Services (6, Port Numbers)

For the latest information on port numbers, see the list on our Web site.

Who's There? and routers (15, Home Routers)

Home routers, including wireless access points like the Airport Base Station, are used more and more in small networks as a way to share an Internet connection. By their nature, such routers provide some protection from access attempts from the Internet. In fact, unless a home router is specifically configured to do otherwise, no attempts from the Internet to access services on machines behind a router will succeed. This brings up a number of points:

  1. Firewall logs on machines behind a home router may contain no access attempt lines, or very few.
  2. Logging and analyzing allowed accesses on such a machine is as important as denied attempts. Generally, such accesses should only be from the network behind the router. Successful accesses from outside your local network should be examined carefully.
  3. Despite the protection offered by home routers, a firewall on each machine behind the router is still a good idea. Home routers can be configured to allow access from the Internet to certain specific services on specific machines behind the router. If you configure your home router to do this, a firewall is definitely important, but even if you don't, a firewall is still a good idea, in case your router is configured without your knowledge (by you or by someone else). Also, especially on wireless networks, it's possible that someone could have obtained physical access to your home network without your knowledge.

Log File Formats (12, Features)

To be processed by Who's There?, your firewall's log file must be written in one of the three supported formats. These formats are:

Mac OS X ipfw log format (system.log, WhosThere.log and ipfw.log)

Fields are space-delimited.

Log lines in OS X ipfw log format look like this:

Jan 30 17:28:45 localhost mach_kernel: ipfw: 303 Deny ICMP:8.0 192.168.0.1 192.168.0.2 in via en0
Jan 30 17:28:48 localhost mach_kernel: ipfw: 10001 Deny UDP 192.168.0.2:49161 239.255.255.253:548 in via en0

Notes:

Extended WebSTAR log format

Operations are logged using the following tokens (which are included in the !!LOG_FORMAT line whenever your firewall starts up or a new log file is written):

Actions related to the firewall itself are logged using the standard WebSTAR comment format:

!!LOG_FORMAT DATE TIME RESULT HOSTNAME SERVER_PORT METHOD
!!ENABLE_LOGGING 05/19/00 16:34:07
!!DISABLE_LOGGING 05/19/00 16:34:15
!!ENABLE_FILTERING 05/19/00 16:34:24
!!DISABLE_FILTERING 05/19/00 16:34:23

Log lines in extended WebStar format look like this:

!!LOG_FORMAT DATE TIME RESULT HOSTNAME SERVER_PORT METHOD
05/19/05 16:52:19 ERR! 192.0.0.2 21 TCP
05/19/05 16:52:39 OK 192.0.0.2 21 TCP
05/19/05 16:52:39 OK 192.0.0.2 2051 UDP

NPF 3 log format

Operations are logged using the following tokens (which are included in the !!LOG_FORMAT line whenever your firewall starts up or a new log file is written):

Actions related to the firewall itself are logged using the standard WebSTAR comment format:

!!LOG_FORMAT DATE RESULT HOSTNAME SERVER_PORT METHOD DIRECTION TYPE
!!04/30/2003 11:16:22 -0700 ENABLE_FILTERING
!!05/06/2003 12:08:26 -0700 DISABLE_FILTERING

Log lines in extended NPF 3 format look like this:

!!LOG_FORMAT DATE RESULT HOSTNAME SERVER_PORT METHOD DIRECTION TYPE
05/06/2005 12:06:55 -0700 OK 192.0.0.2 49161 UDP IN User
05/06/2005 12:04:45 -0700 ERR! 192.0.0.2 548 TCP IN User
05/06/2005 11:52:15 -0700 OK 192.0.0.2 8 ICMP IN Stealth Mode

Note that the TYPE token is ignored by Who's There?


Back to Table of Contents
Back to Troubleshooting