throbber
Special-effects company Industrial lightat Mass muscles upwiui 1oc.
`andwidth “
`
`et details in our exclusive 10G Ethernet editorial
`
`supplement. coverage begins alter page 26.
`
`M0
`
`The leader in network knowledge I www.nwtus':on.com
`
`August 18, 2003 I Volume 20, Number33
`
`RBOGs & cable
`wage turf war
`
`
`I BY JIM DUFFY
`
`Time was you would buy TV
`service irom your cabie compa-
`ny. telephone service front your
`- phone Company‘. and that was
`that.
`
`HP prepping
`all-In-one
`
`server mgmt.
`software
`I BY JENNIFER MEAH5 AND
`DENI CONNOR
`
`HP is readying server manage
`ment software that should give
`users control of Unix. Linux and
`Windows machines from a sin-
`
`gle consolea capability analysts
`sa_v will be particularly impor-
`tant as businesses consolidate
`workloads to boost clficiencies
`in their data centers.
`The
`software. code-named
`Nimbus. will be the first
`inte-
`
`grated tool from a systems ven-
`(lot that ltandles the nitty-gritty
`of sewer management regard-
`less of platform. from updating
`server BIOS and driver agents to
`Sec Nimbus. page 12
`
`“We take [cable competitors]
`very
`seriously."
`says Mark
`Pitchford. senior vice president
`of consumer marketing at Qwest.
`The carrier does not divulge
`nutnbers. but has seen line loss
`to cable operators in sorne of its
`larger metropolitan markets.
`Such encroachment by Cable
`operators in RBOC territonr
`is
`just beginning and is likely to last
`a long time. analysts say:
`"Cable competition is the great-
`est threat to Bet] franchises.” says
`John Hodulik, an analyst at UBS
`Warburg. who says he believes
`See H3005. page 10 l
`
`Robbins during the company's
`earnings announcement
`last
`mont|i."'l"oday neariy one-third of
`our customers buy multiple ser-
`vices."
`The chief business beneficia-
`
`t'ies of this budding competition
`are home office workers and
`
`very small companies, custom-
`ers the RBOCS covet as mttch as
`the millions of residential users.
`
`
`J1 '" Lessons from llia.tltng users North Bronx Ileatthcare Natworlt
`
`Bronx hospital leaps to 106
`
`I BY PHIL HOCHMUTH
`
`With zero network downtime in
`
`the
`The good news was that
`LAN
`at
`the North
`Bronx
`Healthcare Network was pre-
`dictable: unlortunatelv that was
`the bad news,too.
`
`five years. the Ciscobascd LAN
`was"a phenomenally stable envi-
`ronment." says Dan Morreale. (‘IO
`at l\ll3l~tN.But doctors and nurses
`
`using the system also could
`count on phenomenal delays
`
`
`
`ll clinicians were waiting
`
`4 or 5 seconds or more for a
`
`response from the network.
`That wasn't going to fly. '1!
`
`Dan llllorreale
`ClO. North l3r‘r.-nv. l+ealti'i:.' are l\l»:'-:twor«'
`
`when using applications over the
`ltealthcare provider's l0M bit/Sec
`hubs and Fast Ethernet back-
`
`bone. In fact. when running net-
`work applications. sorne NBl"lN
`staff members were known for
`
`giving computer screens that old
`familiar cheer forwhich this New
`
`‘rbrk borough is famous.
`"Clinicians were waiting -l or 5
`seconds or more for a response
`from the network" when using
`certain applications. Morrcale
`says.“That wasn‘t going to go fly."
`A standard prescription for
`such a network problem might
`call
`for a Gigabit Ethernet up-
`grade. lnsteatl. NBHN is skipping
`a step in the traditional migration
`See Bronx. page 11
`
`Radware Exhibit 1015
`
`But now cable companies are
`offering phone services at hard-
`to-pass-up prices, while phone
`companies are fighting back
`with plans for TV services deliv-
`ered through brand—new agree-
`ments with leading satellite TV
`providers.
`The heated competition be-
`tween regional Bell Operating
`companies and cable compa-
`nies shows no signs of abating
`as the rivals invade each others‘
`
`turf with "triple play" — voice.
`data and video — service bun-
`
`dles designed to attract new cus-
`tomers and retain old ones.
`Throw wireless services into the
`
`mix and the prospects for even
`fiercer battles — and even more
`
`aggressix-'el}~' priced service pack-
`ages — loom.
`"A driving factor in our success
`continues to be our bundling
`strateg_v," said Cox Communica-
`tions President and CEO Jim
`
`Latest worm
`puts focus on
`patch woes
`
`I BY ELLEN MESSMER AND
`JOHN FONTANA
`
`The Blaster worm that last week
`infiltrated hundreds of
`thou-
`sanclsif not mil|ions,ofWindovvs-
`based computers once again
`highlighted the IT comrnunitys
`inability to plug software holes
`even when they have been
`detected and patches have been
`issued.
`As N'e.'Loorr'e
`
`ll-'i.)r1'd went
`
`to
`
`press late Friclay. Microsoft was
`preparing for what was stip-
`posed to be a denialof-service
`See Blaster. page 15
`
`NEW3.l7’.-'—\F‘ERu.l'~f-
`
`
`
`AppShield edges |nterDo
`in battle of software that filters
`
`Port 80 traffic. Page 48.
`
`APPLICATION FIREWALLS
`
` sor‘rwAi'mf-"BASED WEB
`
`

`
` .rNatiitiiiil<liirirlii
`
`
`
`rerwurkworr
`
`
`
`
`
`www.ilwfusil)ri.milIil
`
`soFTWARE-BASED WEB APPLICATION F'lREWALlS
`pshield edges lnterDo in
`battle of Port 80 filters
`
`I BY THOMAS POWELL, NETWORK WORLD GLOBAL TEST ALLIANCE
`
`raditional firewalls — when properly configured and managed — do a good job of thwarting many network—level
`
`attacks, but do little to address gaping holes in Web applications where intruders commonly attack Web sites directly
`
`through form submissions or URL manipulations.
`
`A new class of products — often-
`dubhed Web application firewalls —
`attempt
`to thwart Port 80 focused
`attacks by using blacklist and whitelist-
`style input filtering. We examined six
`soltwarebased offerings: eEye Digital
`Security's Securells. l<aVaDo’s lnterDo,
`Mu|tiNet's
`iSccureW'eb._
`Sanctutnis
`AppShield. T'urillion Scifttrvaies cServer
`Secure
`and wcbScurity‘s webApp.
`secure. We tested all
`the products on
`Microsoft's
`Internet
`Information
`
`Services (_llS} but most also work with
`Linux and Apache.A future review will
`cover hardware.-based products.
`lnterDo and AppShield stood above
`the rest
`in terms of ability to defend
`against attacks and suitability for large
`scale Web site deployrnerits. While ex-
`treme flexibility is the key to lnterDo,
`the dynamic policy generation and
`strong default configuration of App-
`Shield gave it a slight edge in our evalu-
`ation and earned it our World Class
`award.
`
`common attack methods
`come into play
`To Linderstand Web application tire-
`walis you have to understand what they
`attempt
`to defend against. The most
`basic application attacks modify an
`HTTP request to cause a problem on
`the server or force it to divulge useful
`information. Generic attacks might use
`long URLs to trigger buffer overruns,
`attempt to traverse the sites root direc-
`tory to run trusted commands, or
`exploit extended HTTP features to sup-
`port
`online
`collaboration
`using
`WehDAV. WebDAV (Wet:—based Distrib-
`uted Authoring and Versioning) is an
`extension of HTTP that lets users col-
`laborate via the Internet,
`
`More sophisticated attacks rely on
`knowledge of how the Web application
`works.
`in database-driven sites using
`dirty URLs
`like http;//wwwsitenanie.
`com/app. asp?irl:5. SQL commands
`miglit be appended to the URL in an
`attempt
`to dump useful data or gain
`write access to the back-end database.
`
`Forms also might be open for SQL injec-
`tion. anrl
`tampering with hidrlen data
`
`
`
`fields and manipulation of maximum
`data size limitations, which can lead to
`buffemverrun prob|ems.('3iven the mul-
`titude oi possible attack methods, any
`data from the user — be it a simple
`HTTP request. URL or form submission
`—should not be trusted implicitly:
`
`Divergent defensive strategies
`To combat potential exploits. a Web
`application firewall will take one of two
`approaches.A negative model or black-
`list product looks for common attack
`signatures and warns the administrator
`or blocks the user when it encounters
`
`one. A positive-model or whitelist fire-
`wall determines all
`the allowable re-
`
`quests, and inputs and disallows every-
`thing else. Some products try to blend
`the two approaches, but, essentially. all
`the products tested emphasize either a
`positive or negative model.
`A few of the products also addressed
`common Web server information leak-
`
`age issues such as masking server head-
`ers or sending back generic or config-
`urable error pages. lt was disconcerting.
`however: to see how easy it was to iden-
`tify some of
`the application firewall
`products via hard-COClE(Il error pages or
`telltales (some signature response that
`is different enough for the intruder to
`know what kind of tool is in play) in
`response headers. Trying to improve
`security simply by obscuring potentially
`dangerous information is not true secu-
`rity Such blatant
`information leakage
`seems foolish in a security product and
`fails to address the well-known fact that
`
`reconnaissance is a key part of success-
`ful intrusion strategies.
`These tested products spread an obvi-
`ous spectrum of cost vs. functionality.
`Those employing the positive model
`generally are more expensive and
`sophisticated than the products that
`use the negativemoiilel approach (see
`pricing in NetResults box, page :19).
`Another key cost factor is the underly~
`ing
`architecture.
`EServ-er
`Secure
`appears
`intenclecl
`for
`single-server
`implementations, while Applfahield,
`h‘1terDo and webApp.se-cure serve more
`as proxies. capable oi protecting multi-
`
`products
`servers. Higher-end
`ple
`Appshield and lnterDo also possess
`remote-management capabilities and
`distributed
`architectures.
`features
`designed with server farm deployments
`in mind.
`
`
`
`Sanoti.In1_'s Anpshietd edged out the compo-
`titioo as our ‘World Glass award winner
`because of its dynamic policy generation
`and strong tlafautt configuration.
`
`Raise your Appshield
`Sanctum's AppShield boasts a fully
`tlistribttted architecture designed for
`server farm deployments. Components
`include a crisp .lava-liasetl n'1anage-
`ment console. a configuration server
`(mysql
`is used for database support)
`and one or more firewall nodes.
`
`AppShielr.l uses a positive model built
`around what Sanctum calls its Dynamic
`Policy Recognition Engine. Outgoing
`pages are scanned and the appropriate
`whitelist of allow-abic inputs is con-
`structed accordingly. Such dynarnic pol-
`icy generation is a considerable help in
`getting the product up and running
`quickly, and maintaining security poli-
`cies as the site/application changes.The
`general policy defaults put
`in place
`when one Cltooses the desired security
`level are easily loosened by browsing or
`crawling the site using a trusterl
`IF’
`
`addressifyou find that the default level
`is too strict for a site or application.
`Appfihield has a “passive mode" that
`logs but does not block requests that
`would violate policy This mode lets
`policies be tested. which the adminis-
`trator can modify selectively in real
`time by right—clicking the request that is
`in violation.
`If
`there are mull.iple
`Appshield nodes deployed in a server
`farm. the passive mode role could be
`permanently given to a single node.
`That node could then serve as a moni-
`
`tor or hone_v;)ot for the entire farm. in
`general. Appshield gets high marks for
`ease of configurability.
`.-\ppShield’s dynamic policy genera-
`tion worked well
`to prevent forceful
`browsing by automatically restricting
`traffic patterns to legitimate naviga-
`tion paths and limiting form—field tarn-
`pering. !\ppShie|d‘s default policies.
`however, were more restrictive than
`other products tested when it came to
`preventing simple SQL injection. The
`default policies also block standard
`attacks such as buffer overruns. directo-
`ry traversals and suspicious URl.s. For
`preventing repeated attacks that violate
`security policies.AppSl)iel(l can notify 21
`Check Point
`firewall using the Open
`Platform for Security (OPSEC) standard
`that a particular ll’ should be blocked at
`the network level.
`
`Customizable error pages are provid-
`ed. but there are some shortcomings.
`Although the error page is passed with
`an HTTP reason code to display, the
`page itseil is I'et1‘ie\'ed using a redirect.
`Ineaning that
`the underlying HTTP
`response code is always a 302 tfia redi-
`rect) followed by a 200 (Okl — not the
`code that reflects the actual state of the
`
`response. Like many of the firewalls.
`AppShield runs fast and loose with
`HTTP response codes. which is trou-
`bling lrom standards compliance and
`raises the possibility that potential
`hackers might fingerprint
`the security
`software in place from nonstandard
`l’E‘S[JL')I'l.$l':‘S.
`On aside note,.I\ppShield takes advan-
`tage of being a proxy to provide sortie
`interesting securil.y-oriented features
`
`

`
`www.iiwfusinn.ctim
`
`that go beyond the usual menu of appli
`cation firewall options: URL mapping
`("including regular express matching) and
`the ability to globally prohibit direct
`downloading of image and multimedia
`files, often dubbed “leeching." This inter-
`esting feature suggests the possibility of
`application firewalls eventually merging
`with authorization and access-control
`
`functionality to provide a complete appli-
`cation security framework.
`
`Intorlio can do
`KaVaDo's lnterDo was designed with a
`large distributed deployment
`in mind.
`One or more server nodes communicate
`
`with the Java-based management con-
`sole via built-in Secure Sockets Layer
`(SSL] encryption — a feature none of
`the competing products equal. The
`application server nodes run as a set of
`services (in the Windows environrnent).
`Although there is no central configura-
`tion server, administration of all nodes
`can be done from a single console.Strict
`password requirements and the ability
`to set up multiple users with different
`administrative privileges
`show that
`InterDo is serious about keeping its
`house in order. while supplying security
`for the Web application.
`lnterDo uses a positive-model approach
`with some novel architectural concepts.
`Trusted and untrusted zones are joined
`by what KaVaDo calls “tunnels.” an
`abstraction describing a connection
`between trusted and untrusted IP address
`
`the
`and port combinations. Within
`metaphor of a tunnel.sr-.curity policies are
`
`segregated into functional areas called
`"pipes," several of which can be com-
`bined within a single tunnel and selec-
`tively applied to one or more applications
`in a configurable order of precedence.
`Examples of pipes include general vul-
`nerabilities (URL, header and entity pat-
`tern matches’), database issues {parame-
`ter screening), cookies and HTTP meth-
`ods. Default pipes do a good job with
`
`Strict password require-
`
`ments and mutli-level
`
`administrative rights
`
`show |nterDo is serious
`
`about keeping its house
`
`in order.
`
`common buffer overruns,direcloi"_y traver-
`sals and SQL injection. The default set-
`tings did not stop form manipulations by
`default, but it is possible to set up custom
`tunnels and rules.
`
`lnterDo gives administrators a great
`deal of flexibility in configuring security
`policies — more so than any other prod-
`uct we tested. On the downside, initial
`configuration is nowhere near as easy as
`AppShielci's and is probably best tinder-
`taken only after reading the manual very
`carefully.
`There is a"lean mode"tbat lets adminis-
`
`trators monitor and selectively modify
`
`Net Results
`
`
`
`l 8.«i8?u3
`
`
`
`l_ tlawiirkwtiriii.
`
`time, and requests
`certain pipes in real
`that run afoul of the security policies are
`blocked while these refinements are
`
`made. This is a safe and helpful way to
`manage the complexity of configuring
`multiple pipes.
`Another helpful management feature is
`the update service that can securely
`update pipes in real time using SSL and
`digital signatures.
`lnterDo has an lP-blocking feature that
`ternporarlly prevents continued access
`from visitor [P addresses that have gen-
`erated enough security policy violations
`to constitute a suspect pattern of mali-
`cious behavior. Suspect attackers are
`given a security score (high. medium or
`low) and blocked for varying durations.
`The response to further requests from a
`blocked IP is simply a dropped connec-
`tion. but it might be better— especially
`for Level 1 attacks — to have the option
`to show the possibiy malicious user a
`configurable message. For those with 21
`Check Point
`firewall.
`lnterDo is also
`OPSEC-compatible for
`firewall-based
`network blocking.
`
`Securolls: llltlscan on steroids
`E‘.Eye Digital Security's Securells has by
`far
`the best user interface of all
`the
`
`products tested. The program uses an
`interface similar to Microsoft Outlooks
`
`that makes configuring this negative-
`model
`application
`firewall
`trivial.
`Unfortunately. Secur-ellS lacks the depth
`of many of
`the other products and
`appears to do little beyond what a capa-
`ble administrator couid do with Micro-
`
`soft's free URLScan tool.
`While SecurellS could deal with mal-
`
`formed requests exceerlirig size limits
`and basic URL tampering.
`it couldn't
`detect and block any form tampering or
`careful SQL injection.
`Furthermore. the product sent back the
`inappropriate I-l06“Not Acceptable" HTTP
`response code on request
`rejection.
`rather than 403 "Forbidden" or 404 “Not
`
`Found” message. as it probably should.
`This is the wrong response code and
`informs
`a
`potential
`intruder
`that
`SecurelI.S is being used.
`SecurellS does have some nice features
`
`to ease deployment in a multiserver envi-
`ronment by letting policies easily be repli-
`cated to other systems.The product also
`has some basic file—integrity monitoring
`features that could be useful if an intrud-
`
`er penetrated a machine. but they seem
`out of place in an application firewall
`offering.
`Securells is targeted at users looking to
`have the support and ease of use missing
`from UR1Scan.|riteresting1y. e-Eye recently
`announced a free personal-use version of
`its software that makes this product an
`obvious replacement
`for URLSCHFI and
`obvious first step for those [IS administra-
`tors new to application firewalls.
`
`Eserver Secure for the entry level
`Turil1ion’s eSei'ver Secure is designed
`specifically for the IIS Web server environ-
`ment. Based on Internet Server Ap-
`plication Program Interface {IE-API) tech-
`nology, eserver Secure combines a host-
`based architecture with the flexibility of a
`
`
`sum-$2.5
`nup_.uun
`claws:-"saunas
`j—‘ W?
`Milli 1.1 j ’ — *
`1.815
`company: i<aVaDo, (212)
`company: eEye Digital T company:Tur-illion
`30242400 Price: Starting
`Security. (949) 34941062,
`company: webscurity.
`Software. (210) 495-3228,
`comparw: Multinet. (866)
`at $15.0(XJ. Pro: incredible
`vvww.eey.e.com
`(763) 786-2009
`wwvv. turillion.com-
`682-9286. www,
`flexibility. con: Com-
`Price: Starting at $995;
`Price: 5:10.000 per server.
`Price: Starting at $995
`elitasecurewehcom
`plexity.
`Windows only.
`Windows. Linux or Solaris.
`per server. Fro: More
`Price: Starting at $2.000.
`Pro: Simple one-button
`Pro: Basic positive fine-
`coverage beyond basic
`Pro:Weatth of con-
`secu rity for basic attacks.
`wall with simple config—
`attacks at inexpensive
`figuration options.
`Con: incomplete coverage
`ur-ation. Gun: Stability and
`price. Can: Default
`Con: Ease-of—use and
`of possible Port80 attacks.
`installation issues. some
`coverage of attacks
`stability issues.
`false positives.
`. incomplete.
`
` mamas
`
`
`
`company: Sanctum.
`(408) 85544500. www.
`sanctuminc.com
`Price: Starting at
`$15,000. Pros: Automatic
`rule generation, good
`l flexibility. Con:
`. Complexity.
`‘
`
`
`.
`Protoofion quality50% 5
`womgésll
`
`IIIIOHM
`. 5
`
`Itonfiguratin 39% 4.5
`
`Ease of use 20% 4.5
`lnstaIlation1ll% 4
`Ilooumentation1'lI5$
`4.5
`Tl|Tll8ll0lIE_ us
`
`qffiyzer
`
`5
`
`i
`i 5.5
`' 4
`4
`its
`
`l soourlls
`l 2.5
`
`3
`
`5
`l 5
`| 4
`I 5.55
`
`woblpoaom-o
`. 5.5
`
`osomi-Secure
`5
`
`lsoourohob
`3
`
`3.5
`
`4.5
`2
`2
`5.4
`
`3.5
`
`3.5
`5
`2
`3.55
`
`4
`
`2.5
`5
`2
`5.1
`
`I Scoring Key: 5: Exceptional; 4:\l'er'y good; 5: Average; 2: Below average; 1: Consistently subpar
`
`
`
`

`
`lwww.nwfusirin.t:nm l
`
`and eServer Secure — are useful but
`
`have configuration or occasional opera-
`tional problems. SecLirellS -- while
`potentially the least capable — is proba-
`bly the best bet for someone looking for
`some simple protection for
`the most
`basic attacks. However. for those admin-
`istrators who want to get serious about
`application-level protection. it
`is really
`only a choice between lnterDo and
`App.Shield. with AppShield having a
`slight advantage in our assessment.
`However. both have significant learning
`curves and might require consulting ser-
`vices for correct usage.
`In the final analysis there is a lingering
`question of whether some of
`the
`“exploits” these products protect against
`shouldn’t be dealt with during the Web
`application development process.
`Obviously filtering out bad requests is
`a wise addition to a Web server. but
`shouidn‘t a Web application keep track
`of field sizes and allowed data directly?
`It would be less expensive and more
`effective to design security into a Web
`application in the first place.
`Given Sanctum's recently released
`developer-focused product AppScan DE.
`it would seem that even Web application
`firewall vendors understand the need to
`
`have security designed into the appiica-
`tion from the start. However. the cost of
`reworking an existing Web application
`might be significant enough to make
`even expensive Web application fire-
`walls cost—effective additions to the Web
`administrator's security arsenal.
`
`Fbweff is the CEO of PINK (1 lrl/eb devel-
`opment and consuffing firm in San Diego.
`He is also the author of numerous Web
`
`development books. He can be reeched.al
`!powe1l@pr'nt. corn.
`
`configuration or making changes. we
`often preferred to access the XML con-
`figuration file directly
`The product has a number of short-
`comings that suggest a lack of overall
`polish.The error/block pages are hard-
`coded, making them impossible to edit.
`Without such modification. the software
`immediately tells the potential intruder
`what kind of countermeasure software
`is
`installed. However, Version 2.0 of
`webApp.secure was released after test-
`ing andmany of these issues might have
`been addressed.
`
`MuItil|nt».iSecure\Vel: focuses on
`Microsoft‘s IIS
`Mu|tiNet's iSecureWeb also is built
`with ISAPI technology and intended for
`deployment on IIS hosts. A proxy site
`(the “Gateway'’) is setup to filter incom-
`ing requests headed to an origin site.
`Policy administration is ‘clone via a
`stand-alone interface (the"Studio") that
`can be installed on a separate box.
`Studio is a two-pane. native Windows
`affair. Getting used to navigating around
`its multi-tab. multi-level tree view control
`— and learning how to make sense of it
`all — takes a considerable investment of
`
`time and patience.
`As for the security capabilities of the
`default rules, common buffer overflow.
`the default policies handle the illicit
`character sequence and directory tra-
`versal attacks well. However. neither SQL
`injection nor form-field manipulations
`are dealt with adequately.
`The predominant approach is clearly
`negative-rnodel. which limits the reach
`of the default rule ‘set and makes post-
`installation configuration a must for a
`secure" setup. At that point, considerable
`power is available to the administrator
`— especially one willing to wade
`through the intricacies of the user inter-
`face and, in the case of certain rules.
`deal with the complexities of regular
`expression syntax. There is probably no
`Web-based attack that one cannot stop
`with an isecureweb rule. if you’ve got
`the patience and knowledge to create
`and apply it properly
`Error pages are easily located and edit-
`ed. a good anti—fit1gerprinting measure.
`However. it is all fo-r naught because our
`installation of fSecureWeb doubled the
`
`HTTP headers in every response and
`certain HTTP response codes lacked the
`usual response message following the
`numeric code. Not only does such
`behavior make a host easy to finger-
`print, it raises serious doubts about the
`soundness of MultiNet’s proxy imple-
`mentation in general. Before running
`iSecureWeb in a production environ-
`ment. we ‘would want more assurance
`that it can be set up in a way that makes
`it fully HTTP-compliant.
`
`flonclusion
`The products we tested fall into two
`distinct classe5.The low-end products —
`SecurellS. webApp.secure,
`iSecureWeb.
`
` heview
`
`How we did it
`
`
`
`~
`
`.-‘e used a pair of Dell PowerEcIge 6000 servers running Windows 2000 and
`iwlicrosoft Internet Information Server 5.0 as the testing platiorm.The test
`_ Vsites installed used ColdFusion and Active Server’ Pages for dynamic
`;i3l;ife"se access and did not have input sanitlzatlon built inlesting covered
`'e3‘<‘{:ilo:tts such as URL tampering. form-field manipulation. SOL injection and
`tnanyknowri l|S server specific exploits. Two other machines on a connected net-
`woricusilig automated security audit tools and manual attacks performed test-
`ing.=ri\»il5hird machine was used as the adrninistratlon console for altering and
`Conf_i'gu_ration where possible. Server interaction was monitored not only at the
`browser level but the underlying HTTP discussion was monitored to ensure stan-
`etard interactioii between systems.
`
`
`
`
`
`Web-based management interface.
`fire-
`This is a strictly negativemodel
`wall. with a respectable blacklist of
`attack signatures that are blocked by
`default — long URLs, disallowed meth-
`ods and directory traversals. for example
`— and the ability to revise these policies
`for tighter security. These attacks were
`blocked as expected.
`SQL injection can be combated, but
`this is addressed through keyword filter-
`ing. and you likely will want to strength-
`en the default policies to make them
`more robust.This product does not obvi-
`ously address manipulation of form-field
`sizes. An update subscription service is
`offered to keep the attack signatures cur-
`rent. Error pages are "fully configurable.
`The HTTP management interface is a
`convenient way to handle remote
`administrative duties but is also a liabili-
`
`is
`ty. Security for remote management
`provided via basic IP filtering. This is a
`nice feature. but the wise user most like-
`ly will want to employ SS1. as well to fur-
`ther secure communication with the
`firewall.
`The Web interface suffers from the
`
`statelessness and latency one would
`expect from H'TTF,’and some quirks exist
`—- probabty a function of the tricky
`interprocess communication between
`the ISAPI extension that supports the
`user interface and the lSAPl filter that is
`
`responsible for actually carrying out the
`security policies.
`Changes to the administration inter-
`face do not always seem to take effect
`immediately or consistently. and some of
`the integrated reporting and statistical
`features display disconcerting inaccura-
`cies. For example. a single request gen-
`erated
`app-roxlmately
`60
`“requests
`processed." and a number of common
`attacks were miscategorized.
`In general, eServer Secure struck us as
`a good example of an entry-level prod-
`uct. In that sense. its most direct com-
`petitors in this review are iSecureWeb
`and Securells. Among those products.
`eServer Secure does not stand out for
`having any major flaws (apart from its
`user interface quirks) but neither does it
`distinguish itself as superior.
`
`ltlehltppseeure: Positive model
`on the cheap?
`WebScurity’s webApp.secure attempts
`to bring the benefits of positive-model
`application firewalls within reach of
`smaller organizations.
`firewalls.
`Like most positive-model
`webApp.secure bases its security model
`on a whitelist of permitted requests
`called intended Use Guidelines.
`In
`webApp.secure’s case. this is a list of
`legal URLs for the entire site. which is
`built through the use of what webscurity
`calls “entry points.“ Entry points let
`administrators
`adiust
`the
`relative
`"porousness" of a sitelapplication. by
`forcing users to come into it
`through
`certain pages but not others and also to
`control URL jumping within the site.
`During configuration, entry points that
`the administrator has designated are
`treated as starting points for building the
`map of permitted URLs and navigational
`paths between them. E'.ssenti'a'lly. a trust-
`ed user (or script) must navigate from
`each designated entry point to all the
`pages that are to be treated as legally
`accessible from that entry point. From
`this
`configuration—time
`traversal.
`webApp.secure learns where traffic is
`allowed to enter the site. and where it is
`allowed to go. establishing positive-
`model access control. in theory this
`should be quite useful
`in combating
`exploits that depend on URL jumping
`and other forceful browsing techniques.
`However, during testing it didn't always
`work correctly.
`Webnppsecure also shines in protect-
`ing against form-field manipulation and
`in blocking the usual run of common
`attack signatures.SQL injection and cross
`site scripting are not well defended
`against by default, but lexical blocking is
`available by disallowing specific charac-
`ters in form field values — an example of
`where the positive model
`implernenta-
`tion gives way to standard negative
`model techniques.with a resulting extra
`burden on the administrator
`
`Implemented as a p.roxy that is con-
`trolled via an XML configuration file.
`webApp.secure also provides a native —
`but somewhat awkward —Windows GUI
`
`for administ.ration.When inspecting the

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket