He@tSeeker Pro
The Distributed Intranet Firewall
1. The Intranet Problem
A large number of companies are connecting their networks to the Internet, looking for better integration with their clients and other commercial partners, all in the context of a growing global economy. Statistics show that this process is irreversible - the Internet continues to profoundly impact commercial and business applications. A presence on the Internet (and using it correctly) can give a company a very important competitive advantage.
However, when they begin to offer Internet access to their employees, the majority of companies face two potential problems. First is the risk that a direct connection to the Internet can represent to the security of the company’s information. If the company has access to the Internet, the Internet also has access to the company, unless the necessary precautions are taken.
Second is the problem of employee productivity. Since the Internet represents a seemingly endless information archive with many different subjects, it is easy to imagine that some of its services (WWW, IRC-Chat, FTP, Newsgroups, etc.) might be used by the employees for purposes incompatible with the company’s objective and mission.
"Firewalls" were developed to resolve the problems of internal network security and access control to Internet services. Firewalls are aptly named, for they resemble the structures that prevent fire from spreading from one environment to another. Generally, firewalls are server-based applications that monitor and control the traffic between two networks.
Traditional gateway firewall products were specifically developed to protect networks from external intrusions over the public Internet. The main goal of these products is to control access to your private network by external sources. Since their introduction, traditional firewalls have been widely viewed as the "Holy Grail" for network security.
Today, that view is changing. Users are beginning to realize that firewalls are only part of the total security solution, not the entire solution itself.
According to recent security surveys by the Computer Security Institute/FBI and Ernst & Young (1997), nearly 50% of all network intrusions come from INSIDE. Protecting the "front door" of an organization with a traditional firewall does not secure a network from internally based attacks – dial-up access, Trojan Horse type programs, or disgruntled employees. Traditional firewalls act like a security guard at the main entrance; they control only the main door protecting the network – leaving backdoors, windows and emergency doors and other entrance points unguarded and open. These are "points of least resistance" within a network that make easy targets for hackers and other intruders.
In addition, the firewall market is rapidly becoming commoditized. It is dominated by 4 major players, and further consolidation is ongoing (Source: Frost & Sullivan research report, "US Network Security Markets" 1997). Given the size of the traditional firewall installed base – 344,000 units deployed – and the maturity of the existing firewall market (Frost & Sullivan, "US Network Security Markets"), this represents a significant new opportunity. The supply channel also is ready for the next security solution to sell to existing firewall customers.
If we examine the recognized elements of security and the functionality of traditional firewalls, we see that firewalls don’t provide a complete solution to any of the security elements, as shown in the following table:
|
Security Elements |
Traditional Firewalls |
|
Authentication |
As traditional firewalls are the middle point between the Internet and the private network, they are based on IP addresses. They use IP addresses to authenticate machines; therefore, they cannot authenticate the user. But the world is based on people. It is necessary to authenticate both the machine and the user. |
|
Access Control |
Granularity: As in the building analogy, the guard at the entrance can’t know to what floor a person is going, who they are visiting, or what kind of message he is leaving. |
|
Privacy |
Some traditional firewalls implement Virtual Private Networks (VPNs), but they only guarantee privacy between the two firewalls; they cannot guarantee privacy between the initial and the end point of communication because they are in the middle of the communication. |
|
Integrity |
Some traditional firewalls implement integrity when they implement VPNs, but as above, they only guarantee integrity between the two firewalls. They cannot guarantee integrity between the initial and the end point of communication. |
|
Auditing |
Traditional firewalls cannot provide auditing reports, track statistics and or graph data based on users, groups or department utilization, because they are based on IP addresses, not on the network’s user identification. |
|
Non-Repudiation |
Traditional firewalls cannot guarantee non-repudiation because they are based on IP addresses, not on users. |
|
Performance |
The more the granularity they try to work with, the more firewalls suffer serious performance problems; they can become a bottleneck to the network. Firewall performance affects everyone single user on the network. |
3. The Distributed Firewall Architecture Concept
Based on the problems outlined above, the concept was developed whereby a "machine" will function as a server for some services and a client of other services and all microcomputers will be a client and server at the same time. Using the recognized military concept of security that says that the strength of security is measured by the weakest ring, it makes sense to protect the vulnerable inner portion of the network. Since networks are made of servers and stations, this means protecting stations as well as servers. This is the Distributed Firewall Architecture (DFA), designed to place security as close as possible to all objects requiring protection.
Another part of the DFA is that security solutions must be tied to the operating system(s). The closer the placement of the security solution to the kernel of the operating system, the stronger the security. Beyond that, attachment to the operating system provides that the security is transparent and simple for the end user and the environment. DFA allows legacy systems to continue to work the way they always have. This approach also is good for administrators because it allows them to implement Intranet security without having to make modifications to the environment and/or to end-user applications.
One of the strongest concepts of DFA is that users are separate from IP addresses. This provides the granularity needed to implement more sophisticated security measures. The technology is user-based, not IP address-based. Regardless of the IP address assigned to a user at any given time, he or she will be the same person, and needs to be authenticated as a person, not as an IP address.
The protection in the DFA model is based on the Seven Security Elements: Authentication, Access Control, Privacy, Integrity, Non-Repudiation, Auditing, and Enterprise Management. The DFA was created to accept the standards of and use each of the seven security elements. These seven elements combined in an integrated product will solve security problems in the future. Today, some products are available that solve one, two, or sometimes three of these elements, but no single product covers all seven elements. And most of these products don’t support all the main operating system platforms.
4. The Seven Security Elements
Protecting against internal threats requires a radical new approach to firewall security. That’s why Fortress Technologies created NetFortress He@tSeeker Pro – an Intranet firewall that can be distributed and centrally managed to bring the implementation of security policy down to the individual desktop.
He@tSeeker Pro is a security, administration, and auditing software product, based on the Distributed Firewall Architecture (DFA). The main goal in the design of He@tSeeker Pro is the extension of network security from the point where the security of traditional firewalls ends.
Installed on a company’s workstations and servers to complement the security offered by traditional firewalls, He@tSeeker Pro allows access to Internet resources to be secure and productive, according to well-defined standards.
He@tSeeker Pro can be customized for a variety of projects and applications, such as user authentication, cryptography, ATM machines as an electronic commerce solution on the Internet, Extranets, home banking, election projects, electronic kiosk, among others.
He@tSeeker Pro monitors other applications that request services from the Windows Socket API (WINSOCK), intercepting these service requests and enabling or disabling access to the requested service’s program. Any program that has access to TCP/IP services based on WINSOCK can be monitored by He@tSeeker Pro.
He@tSeeker Pro analyzes each data packet from a monitored application's request by the system-installed WINSOCK. In this way, it can determine if a logged user's requested package is compliant with the company's security policy. If this access request is not in compliance, the user will receive a standard message from the application being used, informing the user that the service was denied or the requested resource (Service or Host) is unavailable. He@tSeeker Pro also can be configured to display its own message notifying the user of any service denials.
To provide the needed security granularity, the He@tSeeker Pro uses two "fences." The first is at the IP level: this fence protects against attacks at the network layer. The second is at the TCP layer. Using both, He@tSeeker Pro provides the granularity needed to control the applications.
Whether resource usage is permitted or not, the He@tSeeker Pro system can register access trial in the station log file, saving the user’s name, date, time and the workstation used. This file can be exported to the server, allowing the auditor or super user to conduct professional network usage auditing, including all workstations.
Understanding WINSOCK
To gain a better understanding of He@tSeeker Pro, the following briefly describes the WINSOCK.DLL, what it does and how it works.
In order for a client application, such as a browser, an FTP client, a Chat-IRC or any other client program, to access services of a server application using TCP/IP as physical transportation, it is necessary to establish a connection between the applications.
The API WINSOCK is a routine library that allows the client application to establish these connections, and access different services such as name resolution, IP address treatment, etc. It is an API (Application Program Interface) that allows the client application developed for the Windows (Windows 3.x, Windows 95 or Windows NT) environment to use TCP/IP services to communicate with server applications.
WINSOCK defines a standard followed by programmers who develop applications for the Windows environment. The WINSOCK is a DLL (Dynamic Link Library), executable code loaded and unloaded by Windows applications dynamically as necessary.
WINSOCK is based on the SOCKS library, created in Berkeley for the UNIX environment.
As an example, a Windows application (Windows 3.1, a Windows 95 or Windows NT) wants to use TCP/IP services to access Internet services (through a modem, with dial up access) or a corporate intranet (through the network cables, using the Ethernet protocol).
In any case, the application uses WINSOCK.DLL functions, located "between" the application and the workstation TCP/IP stack, to open a connection (socket) with the desired service and to transmit and receive data using TCP/IP.
For example, in the browsers Netscape Navigator and Microsoft Explorer, the CuteFTP (FTP client) and Mirc (IRC-Chat client) are Windows applications that use the WINSOCK API to access TCP/IP services.
He@tSeeker Pro guarantees total access protection to Internet / Intranet services by staying between the application and WINSOCK.DLL.
In a 32-bit environment such as Windows NT, He@tSeeker Pro uses WSOCK32.DLL to protect 32-bit applications. WSOCK32.DLL has the same functionality of the WINSOCK.DLL.
When the application tries to connect to a server to obtain any service through WINSOCK API calls, He@tSeeker Pro intercepts the request and checks it against the access rules defined by the administrator, and allows or blocks the access accordingly. The application is not able to access WINSOCK.DLL without being monitored and registered by the He@tSeeker Pro log.
Supported operating systems and Compatibility
He@tSeeker Pro is a Windows application, with 16-bit (Windows 3.1 or Windows 3.11) and 32-bit (Windows 95 and Windows NT) versions. In all cases, He@tSeeker Pro requires that a Winsock 1.1 API compliant networking package is installed. He@tSeeker Pro is compatible with the standard definition of WINSOCK 1.0 and with Proxies of HTTP and FTP.
Minimum hardware requirements
The minimum hardware requirements to install He@tSeeker Pro are basically the same as those for the operating system in use. The table shows the hardware requirements recommended to install He@tSeeker Pro for better performance.
|
Processor |
Pentium |
|
RAM memory |
4 MB for Windows 3.x 16 MB for Windows 95 32 MB for Windows NT |
|
Disk space for He@tSeeker Pro |
3 MB for installation. Additional disk space is required for LOG and configuration files. |
|
Drive |
3 ½ or CD-ROM |
He@tSeeker Pro Main Sub-Systems
CFINET – Access Control Sub-System for 16-bit
CFINET32 – Access Control Sub-System for 32-bit
CFIWS32 – Access Control Sub-System for 32-bit
CFIHK32 – Access Control Sub-System for 32-bit
CFIHKMS – Access Control Sub-System for 32-bit
CFIITF*.DLL – Authentication and Users and Groups Network Database Access
CFIADMIN – Enterprise Security System Manager
CFIAUDIT – Auditing Sub-System
CFICRT32.DLL – Cryptography Sub-System
Environment Changes
To correctly install and activate He@tSeeker Pro, some changes are made in the Windows environment during the installation process. The changes are based on the options chosen during installation and are dependent on the operating system where He@tSeeker Pro is being installed.
Windows NT
Windows 95
Windows 3.x
None of the other components of Windows Systems is changed by He@tSeeker Pro and only the directory indicated in the installation is used by He@tSeeker Pro.
The deinstallation process restores the environment the way it was before installation.
6.1. Access control to Internet resources
He@tSeeker Pro controls access to Internet services such as WWW, FTP, USENET Newsgroups, IRC- Chat, etc., based on TCP/IP or other protocols. Generic applications that run in specific TCP ports can also be controlled. He@tSeeker Pro restricts access to specific users or group of users, based on the server host, IP address and domain name. For each service, He@tSeeker Pro defines up to four different levels of control: access allowed for all users without auditing; access blocked with auditing; access allowed for some users or groups; and access denied to all users or groups.
He@tSeeker Pro is a software application that monitors and controls access to basic TCP/IP resources. It is used as a corporate Internet and intranet security solution. It is a workstation-based solution that complements the firewall, which is a server-based solution.
He@tSeeker Pro uses a technology known as WINSOCK and TCP/IP trapping. When an application tries to connect to a remote Host to obtain an Internet service through calls to the WINSOCK, He@tSeeker Pro intercepts the request and verifies, based on defined rules, if it will permit or block the access.
When an ICMP (ping) or some special TCP/IP ports are attacked, He@tSeeker Pro uses the TCP/IP trapping technology to detect, defend and drop the attack.
He@tSeeker Pro must be installed in every workstation where local access control to the Internet is desired. He@tSeeker Pro does not replace a traditional firewall. Traditional firewalls are designed to protect servers, not network workstations, and they are unable to protect workstations that access the Internet through a modem. He@tSeeker Pro complements traditional firewalls in providing network security.
6.2. Authentication
He@tSeeker Pro uses a proprietary user database and automatically imports user authentication information used by the operating system. So, when installed on a NetWare environment, He@tSeeker Pro is able to read data from the Bindery (NetWare 3.x) or NDS (NetWare 4.x). He@tSeeker Pro can also access Windows 95 user information (user.pwl) and Windows NT account information (SAM).
He@tSeeker Pro imports users’ information from the NetWare (Bindery and NDS), Windows 95 and Windows NT operating system automatically. This is done by installing the required DLL for each of these environments. He@tSeeker Pro can also be integrated with specific applications or other access control systems (e.g. Banyan Vines).
To authenticate and give real security to users of Windows 95 and Windows 3.x systems, it is necessary to install Access Control Systems in the station so the authentication process will be trustworthy. He@tSeeker Pro can be easily integrated with all the access control systems available today.
User identification and verification
He@tSeeker Pro uses the resources of the operating system to identify and validate an active user, the groups to which the user is linked, and the user's access rights on the network. Thus the active user is recognized immediately and his or her access rights on the Internet or Intranet are loaded automatically. The system communicates directly with the network identification provider, through a system loaded during installation. The system utilizes its own DLLs to access the user database used by the main operating system, such as Novell Netware (Bindery and NDS), LAN Manager, Windows NT, Windows 95.
6.3. Auditing, usage statistics and graphs
One of the main features of the He@tSeeker Pro system is monitoring and consolidating Internet and Intranet usage. The auditing module is the tool that collects data from the He@tSeeker Pro firewall and stores it in a database. The Auditing tool enables network access and Internet and Intranet usage to be analyzed through spreadsheets, graphs or data. This data can be exported for analysis by other software.
Another feature of the He@tSeeker Pro is the collection of information through the system log. Since this log is not available to regular users, it guarantees data security. The auditing module of the He@tSeeker Pro system is available only to Super Users and Auditors.
He@tSeeker Pro offers a variety of report formats and statistical graphs of TCP/IP service usage, with executive information. Examples include: most frequently accessed hosts, most frequent user, and most used workstation. The auditing graphs can be configured by workstation, user, date, time or day of the week.
All He@tSeeker Pro components use the auditing sub-system, composed of the following sub-systems:
. Logging Events
. Log Analysis, Statistics and Graphs Generation
. Monitoring and Alarms
The processes of monitoring, logging events and alarm are initiated when the Windows operating system is booted.
The administrator can configure the information logged in the Management system of He@tSeeker Pro. Services (HTTP, FTP, E-mail, etc.), as well as specific hosts, can be selected for, or excluded from, registration.
The events registered in the log file vary, depending of the type of service used. In some services such as HTTP, FTP, Gopher, E-mail, etc., He@tSeeker Pro can identify what kind of information is being transmitted or requested. For example, with the FTP service, all types of access can be logged, such as CD, DOWNLOAD, UPLOAD, MD, RD, etc.
The log file is in a proprietary format for the purpose of security and performance. It can be seen only by the He@tSeeker Pro Auditing sub-system. Nevertheless, it allows for the export of the log to the ASCII, DBF, DIF and HTML file formats.
The spreadsheet fields are as follows:
|
# |
Shows the entry number in the log file. |
|
Date |
Shows the date on which the event occurred. |
|
Time |
Shows the time that the event occurred. |
|
User |
Shows the name of the user accessing the service. |
|
Station |
Shows the workstation name where the event was registered. |
|
Activity |
Shows the type of registered event. |
|
Violation |
Shows security violation attempts. Incorrect passwords, unauthorized directory access, etc. are considered security violation attempts. |
|
Instance |
In situations where workstations are working with Windows, many processes (programs) are executed at the same time. The instance will identify which processes created the events. |
|
Object |
Identifies the object (Host, IP, Service, folder, directory, file, etc.) that instigated the event. |
The information presented on the spreadsheet is refreshed every 15 seconds, or whenever the user presses the left mouse button.
The He@tSeeker Pro Auditing program registers some information related to attached files in the e-mail messages, such as filename, size and date.
The auditing module allows the Audit or Super user to apply restrictions to the log being inspected, to obtain a partial view. For example, if it is desired to view only a user's records, or records based on a determined time interval, etc., auditing supplies the Configure Restrictions option, which affects the entire log file.
Three versions of the log file are available:
Spreadsheet: View the current selected log as a spreadsheet format. View all the events that happened during a certain time period. This function can be configured through restrictions.
Graphs: Evaluating data in graph format is easier to understand than data displayed in raw numbers. He@tSeeker Pro makes several activity evaluations available in graph format, including 2D-Bar, 2D-Column, 2D-Total, 3D-Bar, 3D-Column and 3D-Pie.
Statistics: This option provides viewing of the consolidated data in a spreadsheet format. He@tSeeker Pro enables the generation of several types of statistical analysis.
Graphs and statistics can be viewed by frequency and time. Frequency is the number of times something occurs – e-mail is sent; a Host or URL is accessed; or a specific service is used. Time is the amount of time used to send e-mail, access a Host or URL or use a service.
The Administrator or Auditor is able to generate several kinds of statistics and graphs, including:
. Percentage of use of the equipment by host;
. Percentage of use of the equipment by service (HTTP, FTP, Chat, E-mail, etc.);
. Percentage of use of services per user;
. Percentage of use of services per station;
. Percentage of use of hosts per user;
. Percentage of use of hosts per stations;
. E-mail messages sent;
. E-mail messages received;
. Number of Accesses to hosts and services.
6.4. Enterprise Security Management
He@tSeeker Pro installation uses InstallShield, so the process is simple, fast and secure. Its configuration and management is accomplished centrally from the Administration program. In this program, the administrator implements a series of rules compatible with the established security policy for Internet service use, specifying the hosts and services that must be globally permitted or blocked. Also, the administrator may implement special configurations for specific groups or users.
The Administration program interface is simple and user-friendly. It is formed by a main window (work area) divided in two smaller windows. The "object tree" in the left window lists the different types of He@tSeeker Pro objects (Groups, Hosts, Users), separated by classes. The right window provides a description of the selected object and other important information about the object.
6.4.1. He@tSeeker Pro object classes
He@tSeeker Pro is a Windows application that utilizes the "object oriented" concept. Many of the elements represented in the work area are treated by the program as independent objects, having specific characteristics derived from an object class. For example, the "Group" class has objects created to represent groups of users and the "Users" class has objects that represent individual users.
He@tSeeker Pro uses three types of objects:
Hosts and services class
The objects in this class represent any Internet resource that can be accessed through an IP address; for example, hosts, routers, networks, etc. A Host object can be created to represent a Web server on the Internet (WWW), so the administrator can configure the way the system will treat the access trials and the users and groups linked to this server.
Users class
These objects represent users. This class contains all the users registered in the system. He@tSeeker Pro automatically imports all user information from the operating system (Windows NT, NetWare, etc) to create its own user database.
Users group class
The Users group class includes all the user groups registered in the system. Both users linked to the group and the hosts and services linked directly to the group can be viewed.
He@tSeeker Pro also has an object above all the classes described above, representing the Internet or the corporate Intranet. This object is represented by the planet earth icon; it is called the Internet/Intranet object.
7.1. Authentication
7.1.1. Imports automatically users and group of users from the Novell Netware Server version 3.x accessing the bindery
7.1.2. Imports automatically users and group of users from the Novell Netware server version 4.x accessing the NDS
7.1.3. Imports automatically users and group of users from the Microsoft Windows NT server version 4 accessing the System Account Information - SAM
7.1.4. Imports automatically users from the Microsoft Windows 95 (standalone installation)
7.2. Access Control
7.2.1. By Time
7.2.1.1. Allow you to define individually the period of time USERS can or can not access the Internet
7.2.1.2. Allows you to define individually the period of time the SERVICES as FTP, HTTP, CHAT, etc. can be used.
7.2.1.3. Allow you to define individually the period of time the HOSTS can be accessed.
7.2.1.4. Allow you to individually define the period of time the IP addresses can be accessed.
7.2.2. Philosophy
Closed -- everything not defined is protected; and
Open -- everything is open until you establish a rule.
The closed philosophy is the default. He@tSeeker Pro intercepts the communication between the browser and WINSOCK.DLL, obtaining information about the service (HTTP), about the host and about its IP address. With this information, He@tSeeker Pro checks to see if there is any block definition rule or access permission to this specific URL for the user. The verification is done as follows:
Host: If there is a registered restriction in the system for this user relating to this host, it will be verified. If a registered restriction exists, it will be verified if the restriction applies to all services (Total block) or only to specific services. If there is a restriction to a specific service, the solicitation is aborted immediately. If the service or host is registered without restriction, the solicitation is sent to the server.
Services: If the host is not registered, He@tSeeker Pro will verify if the solicited service is registered in the system general configuration. If it is registered and there are restrictions, the solicitation is aborted. If it is registered without restrictions the solicitation is permitted.
Philosophy: If neither the host nor the service is registered, then the adopted access philosophy is verified. If it is open, the solicitation is sent to the server. If it is closed, the solicitation is aborted. NOTE: Even with the closed philosophy, access to the He@tSeeker Pro registered services is permitted, unless the access is clearly blocked in these services.
7.2.2. Protects IP address without name. When this option is on, if He@tSeeker Pro does not resolve an IP address during access to any given host, it will not allow the access. This option is disabled by default, which means that access will be enabled to hosts whose IP addresses cannot be resolved by He@tSeeker Pro. In installations where a higher level of security is necessary, this option must be enabled. As a result, access to hosts whose addresses can not be resolved will be blocked.
7.2.3. Uses SOCKS Proxy Server; mark this option to configure He@tSeeker Pro when a Proxy Server is being used. He@tSeeker Pro supports the use of a Proxy Server in HTTP and FTP services, when executed inside the browser.
7.2.4. Enables Browser Security (Windows 95 clients only). Using this option the Administrator can disable the download of cookies, Java Applets, ActiveX controls and protect the Workstation against malicious JavaScript malicious code.
7.2.5 Enables Attack Protection on the IP Level (for Windows 95 clients only). The Windows operating system is vulnerable to a series of attacks when the NBT (NetBios Over TCP/IP) service is used. He@tSeeker Pro can disable the TCP/UDP network services related to NetBios, to prevent a hacker from launching a "denial of service" attack.
-- FTP
-- Telnet
-- Netbios Name
-- Netbios Session
-- Netbios Datagram
-- TCP/IP service port blocking at the network layer
7.2.7 ICMP Attacks: Some or all ICMP packets can be disabled, eliminating the possibility that the workstation can be attacked by Ping of Death and other ICMP-related attacks (for Windows 95 clients only). He@tSeeker Pro stops ICMP attacks like Ping-O-Death, Supersonic Ping, Ping Flooding, Route deterring, SYN flooding, and DNS denial of service attacks.
7.3.1. Registers the commands inside the host. This option registers all executed commands, such as application execution, directory change, etc., inside of the host in the log file.
7.3.2. Registers beginning and end of access to non-specified services. This option registers the beginning and the end of access to any service in the log file, even if this service is not registered in the system.
7.3.3. Registers the beginning and the end of access of the Services in the log file, indicating the accessed services.
. % of use of the equipment by host;
. % of use of equipment by service (HTTP, FTP, Chat, E-mail, etc.);
. % of use of services per user;
. % of use of services per station;
. % of use of hosts per user;
. % of use of hosts per stations;
. e-mails sent;
. e-mails received;
. Number of Access to hosts and services.
7.4.1 Simple installation using InstallShield Technology
7.5. Management
7.5.1 Administrator Authentication through password. If this option is enabled, it requires a password to allow access to the Administration, Auditing and Uninstallation programs. The default is disabled.
7.5.3 Time profiles can be used to specify time restrictions on access to Internet / Intranet services.
2.9.98
He@tSeeker is a trademark of Fortress Technologies, Inc.
© 1998 Fortress Technologies Inc. All rights reserved.
©1998 NetVersant Technologies. All rights reserved.
For further information, please call
(800) 274-6065 or e-mail NetVersant.