Hardware Firewall On a USB Key 203
An anonymous reader writes "An Israeli startup has squeezed a complete hardware firewall into a USB key. The 'Yoggie Pico' from Yoggie Systems runs Linux 2.6 along with 13 security applications on a 520MHz PXA270, an Intel processor typically used in high-end smartphones. The Pico works in conjunction with Windows XP or Vista drivers that hijack traffic at network layers 2-3, below the TCP/IP stack, and route it to USB, where the Yoggie analyzes and filters traffic at close-to-100Mbps wireline speeds. The device will hit big-box retailers in the US this month at a price of $180." Linux and Mac drivers are planned, according to the article.
Not really a hardware firewall (Score:5, Insightful)
A bit hyped up if you ask me.
Re: (Score:3, Insightful)
Re: (Score:3, Interesting)
Re:Not really a hardware firewall (Score:5, Insightful)
Re:Not really a hardware firewall (Score:5, Informative)
Re: (Score:3, Insightful)
and useless when the laptop user connects to the internet via their GPRS card, or their Bluetooth enabled phone, or via wireless
This device works with all of them, it could only be better if they made it in an ExpressCard format, which I'm sure is in their plans.
Re: (Score:2)
Re: (Score:2)
They had a previous with ethernet ports. This thing is a (FORWARD-thinking) change from this to reduce physical size.
For a large percentage of the real world, having drivers that allow it to work on Windows only is sufficient.
Re:Not really a hardware firewall (Score:5, Interesting)
Re: (Score:2)
Re: (Score:2, Informative)
The new device was created because a USB interface is less cumbersome and less expensive, while still offering a similar feature set and only somewhat reduced security.
Mod up. (Score:3, Informative)
The point of the article (if anyone bothered to read it) was the miniaturization feat... 12 LAYER PCB!
It's just Killer.NIC on USB (Score:3, Interesting)
a small embed router + a driver that directly taps into the WinXP TCP/IP stack (instead of having the packets go through the whole stack then over a short "virtual" network link to the router then up to TCP/IP again, then routing, then back to Ethernet then on the "actual" cable).
My only though : Is it programmable ? Could it be reflashed to function as something else more creative and be powered from a wall-socket USB 5v power brick ?
C
Re: (Score:2)
I see this as being handy for anyone that plugs into foreign networks like at some Hotels. Good little road warrior tool.
Re: (Score:2)
Re: (Score:2)
Why? (Score:2)
Marketing Gimmick (Score:5, Insightful)
Personally it looks like a waste of money to me.
Re:Why? (Score:5, Insightful)
You've obviously never used Norton Internet Security 2007 [symantecstore.com] or McAfee Internet Security Suite 2007 [mcafee.com].
Re: (Score:2, Insightful)
That's like comparing a normal handgun to an ED-209 [wikipedia.org] on a rampage.
Re: (Score:2)
jeez, why would do something like that to myself?
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
For example, I run no firewalls whatsoever on my home network, instead relying on my NAT router to keep inbound traffic out, and configuration / backups to keep risk to acceptable levels elsewhere.
Taking a laptop to a cafe or hotel or something, or a gaming machine to a LAN party means I'd have to muck around with a Firewall before (or just go without) going.
So I would use this thing there. But, probably not
Re:Why? - your wish is granted - Yoggie Gatekeeper (Score:2)
The Yoggie Gatekeeper can also be used like the Yoggie Pico in USB-only connection mode, with a Windows driver. You might want to do this to connect with built-in laptop wireless hardware, or with USB ADSL "modems".
odd (Score:5, Insightful)
Re: (Score:2, Insightful)
I find it Ironic personally that the linux device can easily hijack packets from a windows stack but the driver to hijack the traffic from the mac or linux boxes are still not ready.
The true question at this point is who can't steal hijack packets from a windows box.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Informative)
Their efforts really do put the rest of the world to shame (er, maybe i mean the opposite of that)
That being said; the fact that this product was developed in Israel is not a reason to avoid it.
*That* being said; the fact that this security product relies on closed-source binary drivers and runs on XP *IS* a reason to avoid it.
I would trust this product about as much I would trust Norton or Mcafee.
Re:odd (Score:4, Insightful)
Re:odd (Score:4, Funny)
makes sense (Score:2)
Re:odd (Score:4, Funny)
Why would I want this? (Score:5, Insightful)
IOW, someone tell me why I should care?
You shouldn't (Score:3, Funny)
Re: (Score:3, Interesting)
Re: (Score:2)
Re:Why would I want this? (Score:5, Funny)
Re: (Score:2)
(sorry, could not resist)
Re: (Score:2)
(I'm wearing my asbestos underwear for this)
Re:Why would I want this? (Score:5, Informative)
Re: (Score:2)
It's not just Unix software which is guilty of gratuitously using the TCP/IP stack for IPC.
Re: (Score:2)
this is just snake oil for feeble-minded people who don't realize that firewalls are for blocking access *between* networks not for closing ports that shouldn't be open in the first place on individual machines.
I guess I'm "feeble-minded" because I believe security should at best be layered, and also realize that protecting the inside of a network is important as well. Maybe you never thought that firewalls can restrict port access to only certain IP addresses that simply closing a port wouldn't allow?
Ther
Firewall is a small part of the product. (Score:2)
Or you could just read the article.
Re:Why would I want this? (Score:5, Informative)
Why would anyone want this? Well, a router that combines firewall, nat, vpn, etc. is fine for home use, but what about the coffee shop? For a mobile computer having a on-computer firewall is a must. As far as why anybody would choose to use this over any software firewall... I can only assume it's for people who don't want yet another piece of software hogging their cpu. Most software firewalls aren't that intensive, but if you're looking to free up that 3-5% of your resources, hardware is the way to do it. Of course, without a benchmark showing a difference, the actual performance increase is lost in the market speak.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2, Insightful)
Very much agreed - At first glance I dismissed the product but then realized that it would be great for the laptop that I am typing away on now. Yes, there are software solutions etc. but having a dongle that I can take from one machine to another would be awesome - Potentially I no longer have to install firewalls on each and every computer that I use
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Somehow I missed the middle of the article. They don't just do the normal firewall things - they also do a bunch of higher-level things (snort, HTTP antivirus proxy, etc.) which are more CPU-intensive. So I guess it might save significant CPU usage over doi
Re: (Score:2)
The device has sex appeal in terms of form factor accomplishments. But the OS level filter driver requirement turns me off.
A device like this needs to be totally independent of the OS to be attractive.
I won't be buying t
Re: (Score:2)
Not too bad (Score:5, Funny)
That's where all of my clients' problems come from.
-Nick
Re: (Score:2)
Layer-42 is available under GPLv3.
Re: (Score:2)
100Mbps on USB? (Score:4, Interesting)
It seems much more likely that there's an app on the USB stick tht is run by the windows machine making the USB stick just a different delivery mechanism than a CD/DVD. Probably way cheaper to produce, update and ship.
USB2, yes. (Score:5, Informative)
So for them to claim that this device can push 100Mbps really isn't that surprising. So long as the little processor can burn through the logic checks fast enough, the bus can definitely handle the load.
-Rick
Re: (Score:3, Insightful)
Re: (Score:2)
But does the taste move you when you pop it in your mouth? It's just not the same unless the taste - the taste - the taste - the taste is gonna move ya.
from the article (Score:5, Insightful)
so basically this means allowing a black box to hijack completely my IP stack, a black box which phones home every 5 minute and arbitrarily downloads software updates... just think if this company's server was compromised even for an hour, given that all of the devices update every 5 minutes you could compromise pretty much all of them at the same time.
Not to mention that if this device can insert a 'low level driver' that hijacks the IP stack, I'm sure a virus will come up sooner or later that will re-hijack this and compromise it. The only really 'safe' hardware firewall is, guess what, a completely separate hardware firewall (like my custom LEAF install on my old p3-500), this sounds like those 'one time pad, guaranteed!' crypto products we often lambast here on
Re: (Score:2)
And, in all seriousness, there may very well be unforseen vulnerabilities in the device in question. However, that's certainly no reason to write it off as a completely useless product. Like everything else relating to security, the question is one of balance. More specifically, how to balance access to those tha
Re: (Score:2)
For instance, you can prevent the 'bind' user, as well as the named binary from accessing port 25, which would prevent a hole in bind from allowing emails to be sent. With hardware-only solutions, to provide this level of security, you would need to setup a separate machine on its own network segment and subnet, running bind, and then blo
Huh? That's not a hardware firewall! (Score:3, Insightful)
Here we have a software layers shunting packets for filtering to another "device" and then they are probably reinjected. The software layer that does this shunting and re-injecting of packets makes this not a hardware firewall.
Or are we saying that iptables is a hardware firewall as well?
something similar but better... (Score:2)
Anyone remember this, maybe have a link?
Re: (Score:3, Informative)
Intel? (Score:2)
Wait (Score:2)
Compare this USB device to a software firewall such as Zonealarm. It costs $180 whereas you can get free versions of Zonealarm. It routes your network traffic via USB, which makes me shudder. That would be a nightmare on older pre-USB2.0 machines. It requires software drivers in order for network traffic to be directed through it. That's more "moving parts" than should be necessary. Because, of course, the more moving parts there are, the more there is that can break.
Now if t
Hardware firewall definition (Score:3, Insightful)
Re: (Score:3, Insightful)
I mean, it's a cool idea/system, but... uh, not really a "hardware" firewall if it needs client system software to route to it..
Re:Hardware firewall definition (Score:4, Informative)
This gimmick consists of a coprocessor and some low level operating system drivers, and appears to be primarily designed as a host firewall. It might be useful in a network firewall, it the operating system components could be ported to an operating system adequate to the task.
Re: (Score:2)
Re: (Score:3, Insightful)
Re: (Score:2)
I could sell you a box which boots off CompactFlash, runs one of the common Linux firewalls such as Astaro or Smoothwall, but it would technically be a software firewall. If I customised the
Re: (Score:2)
sorry, needs to be ENTIRELY outside the pc (Score:2)
now, take that neat usb form factor, put 2 rj45 jacks on it and THEN we'll talk.
Re: (Score:2)
Re: (Score:2)
Stick a single RJ45 on it, and use it as an extra ethernet interface. Come to that, stick 802.11a/b/g wireless on it and make something incredibly useful.
Close but no cigar (Score:2)
why not make it fire wire or pci / pci-e based (Score:2)
also some chipsets like the nvidia ones have build in firewalls
100 mbps "Wire Speed"? (Score:2)
I'm sure *internally* it'd handle it at wirespeed, but... otherwise, I can't see how even 50% of wirespeed is possible. Possibly closer to 20%, which, incidentally, is still faster than most home user's bandwidth.
And yes, this gadget's a total gimmick.
Re: (Score:2)
Uhm... USB 2.0 bandwidth is 54 mbps. In order to filter traffic going through it, you'd have to use the bus twice - once to send a packet to it, and once to get the packet (provided it was permitted) back from it.
As far as I know, the USB 2.0 fast transfer rate is 480Mbps. A rough 25% overhead rule of thumb yields a rate of 384Mbps, or 48MBps, easily enough to handle a 100Mbps ethernet connection.
Also, you don't necessarily have to send each packet over the USB twice, if you are not doing any packet shaping, or address translation. A 1-bit response to each packet (pass / fail) is enough for a simple packet filter. The software drivers that intercepted the packet in the first place would then send the original pa
holy hackable hardware, batman! (Score:5, Interesting)
Re: (Score:2, Insightful)
Re: (Score:2)
And then, if you still need/want extra points, remove as many of the critical moving parts from the box as you can to enhance reliability. Think undervolting, big heatsinks, and solid-state storage.
But $180 is too much to spend just for geek cred alone.
If that's your whole goal, then look not toward needless complication. Far better (and cheaper) results would come
Sorry guys, (Score:2)
I think I could buy an N Router (Score:2)
Professional Product. (Score:2)
You don't say! Duh!
This is a product for mobile professionals. The IT department can stick this cheap (for a multinational) dongle into their laptops and guarantee that the professional person, who probably isn't too bright in terms of IT, won't get owned on their round the world trips with their various different types of connectivity t
Lotsa useless negativity (Score:3, Insightful)
I, for one, might look into owning one of these. After all, I spend a shitload of time working on client machines trying to isolate and diagnose problems. Being able to plug in a USB key to emulate the hardware firewall the client *should* have would be helpful. Notice, I said emulate, not duplicate.
Just because it is on the front page of
Regards.
Re: (Score:2)
While in Knoppix, grab the Documents and Settings folder and copy to a USB drive.
Reformat HD, reload windows, copy over Document and Settings.
very cool (Score:2)
Apparently we all didn't actually RTFA (Score:2, Interesting)
Anti-virus software always slows down your PC. No matter what. It has to because it scans each and every file as its accessed (assuming resident scanner operations).
This little gem allows me to not bother with installing any anti-virus software and just offload that function to a li
Re: (Score:3, Insightful)
You're quite correct about the filesystem checks... it can't do those.
For email, though, it could be quite decent - provided the signatures are kept current, and/or are broad enough to pick up new variants of some of the more common varieties. Many AV products set up POP, IMAP and SMTP proxies (although this looks like it only does SMTP and POP)... yo
Passthrough TAP IDS/IPS (Score:2)
You can buy taps and redirect copies of network traffic into a snort or other IDS, but I'd rather have a small all encompassing device I could take on the road.
Wouldn't work for wireless, but I'd rather hop on a wired connection at a hotel anyways. Half the time wireless is shotty or the signal is weak.
If I just plug the ethernet into one port and then plug my laptop into the other that would be great. It could then block traffic on non
I am from Yoggie: Critial information disclosed (Score:3, Informative)
How does it compare to... (Score:2)
What I would like to know is how Yoggie [yoggie.com]'s devices compare to Zyxel [zyxel.com]'s ZyWALL P1 [zyxel.com]. Zyxel's device is larger at about 5×3×0.75" (assuming I'm doing the metric conversion properly) but it is a standalone device with two 10/100 Ethernet ports. Zyxel's web site says anti-virus, IDP and anti-spam will be available in the future, but since that was two years ago with no update to the web site since then, I'm guessing they will never be added, so the device only acts as a firewall with SPI
Oh that's just great. (Score:2)
I do this now with keys, wallets and cell phones. Do I really need to do it with my firewall?
Re:Troll! (Score:5, Funny)