background image

19

5.3. Large HTTP Objects Handling

Under the normal conditions 

esets_http

 handles every object transferred in a way that the 

object is first transferred from the HTTP server (resp. client) to 

esets_http

, second, it is scanned 

for infiltration and last, it is transferred to the HTTP client (resp. server). Concerning large files (the 

large objects whose transfer time is larger than timeout defined by the parameter lo_timeout) 

this becomes not very suitable scenario as the user agent’s timeout or user’s impatience can 

cause interrupts or even canceling of the objects transfer. Therefore other methods to process 

the large objects must be implemented.

5.3.1. Method of deferred scan

The 

esets_http

 implements standard so-called ‘deferred scan’ method of large files handling. 

This  means  if  object  transferred  becomes  large  the 

esets_http

  starts  to  send  the  object 

transparently to an awaiting HTTP end-point (i.e. client or server). After the last part of the object 

has arrived to 

esets_http

, the object is scanned for infiltrations. If the object has been found as 

infected the last part of the object (current version of ESET Gateway Security defines last part as 

last 4KB of object’s data) is not sent to the awaiting end-point and the connection with the end-

point is dropped. In parallel, the e-mail notification is sent to the Gateway administrator with 

the relevant information about the dangerous file transfer. Note that the notification is sent only 

in case of server to client data transfer. The URL of the source object is stored in this case in the 

esets_http

 cache to block the source transfer if requested again.

In this place we would like to point out that the ‘deferred scan’ technique described above 

presents potential risk for the computer whose user agent requested the infected large file for 

the first time. The risk resists in that even data transfer of an infected object has been deferred 

some parts of already transferred data can contain executable danger code. That is why the ESET 

developed modification of the ‘deferred scan’ technique called ‘partial scan’ technique.

5.3.2. Partial scan technique

The  ‘partial  scan’  technique  has  been  developed  to  safeguard  ‘deferred  scan’  method. 

Operation principle of the ‘partial scan’ technique is based on the idea that scanning time of 

a  large  object  is  negligible  as  compared  to  overall  process  time  of  the  object.  Note  that  this 

condition is fulfilled in case of HTTP transfer of large object as significantly higher time is needed 

to transfer the object than to scan it for infiltrations. This assumption allows us to perform more 

than only one scan during the large object transfer.

Once parameter 

lo_partscan_enabled

 is enabled in [http] section of 

ESETS configuration 

file

 the large object is scanned for infiltrations during its transfer in some predefined intervals and 

data scanned are sent to awaiting end-point (i.e. to client or to server). Using this method there 

is no way to pass any infiltration to the computer whose user agent has requested the large 

infected object as each portion of the data sent is already ensured to be secure.

It has been proved that in the common circumstances (by means the speed of the Gateway 

local network connection is orderly higher than the speed of the Gateway connection to the 

Internet) the process time of the large object transfer with the ‘partial scan’ technique used is 

approximately the same as when the standard ‘deferred scan’ method used.

chapter 5

 

 

  Integration with Internet Gateway services

Содержание GATEWAY SECURITY

Страница 1: ...ESET Gateway Security Installation Manual and User s documentation we protect digital worlds ...

Страница 2: ... World WideWeb Interface 26 6 6 Remote Administration 27 7 ESET Security system update 29 7 1 ESETS update utility 30 7 2 ESETS update process description 30 8 Let us know 31 A ESETS setup process description 33 A 1 Setting ESETS for scanning of HTTP communication transparent mode 34 A 2 Setting ESETS for scanning of FTP communication transparent mode 34 Appendix A PHP License 37 ESET Gateway Secu...

Страница 3: ...Chapter 1 Introduction ...

Страница 4: ...ests are sent to All executive daemons except esets_dac run under non privileged user account to enhance security The system supports selective configuration specific for user or client server identification Six logging levels can be configured to get information about system activity and infiltrations Configuration administration and license management can be provided using intuitive and user fri...

Страница 5: ...Chapter 2 Terminology and abbreviations ...

Страница 6: ...t the RSR package is installed as an add on application i e the primary installation directory is opt eset esets ESETS daemon Main ESETS system control and scanning daemon esets_daemon ESETS base directory ThedirectorywhereESETSloadablemodulescontainingforinstancevirussignaturesdatabase are stored Further in this documentation we use abbreviation BASEDIR for the directory The directory location is...

Страница 7: ...ocation is as follows Linux usr sbin Linux RSR opt eset esets sbin FreeBSD usr local sbin NetBSD usr pkg sbin Solaris opt esets sbin ESETS object files directory The directory where the relevant ESET File Security object files and libraries are stored Further in this documentation we use abbreviation LIBDIR for the directory The directory location is as follows Linux usr lib esets Linux RSR opt es...

Страница 8: ......

Страница 9: ...Chapter 3 Installation ...

Страница 10: ...firmed the Acceptance Agreement the installation package is placed into the current working directory and relevant information regarding the package s installation un installation or update is printed into terminal Once the package is installed and the main ESETS service is running in Linux OS you can check its operation by using command ps C esets_daemon In case of BSD OS you can use a command ps...

Страница 11: ...Chapter 4 Product s Roadmap ...

Страница 12: ...tility modules are particular fraction of the system They are developed to provide simple and effective management of the system They are responsible for relevant system tasks e g license management quarantine management system setup and update Please note a special chapter in this document devoted to the topic CONFIGURATION Proper configuration is the most important condition for the system opera...

Страница 13: ... with this knowledge please refer to esets cfg 5 esets_daemon 8 manual page and also to manual pages related to relevant agents ETCDIR certs This directory is used to store the certificates used byESETSWWW Interface for authentication see esets_wwwi 8 for details ETCDIR license This directory is used to store the product s license key s you have acquired from your vendor Note that the ESETS daemon...

Страница 14: ......

Страница 15: ...Chapter 5 Integration with Internet Gateway services ...

Страница 16: ...ations For this purpose a generic ESETS HTTP resp FTP filter esets_ http resp esets_ftp has been developed In order to configure ESET Gateway Security for scanning of HTTP resp FTP messages routed through the network gateway server enter the command esets_setup Follow instructions provided by the script Once Available installations un installations offer appears choose HTTP resp FTP option that wi...

Страница 17: ...a Firefox The manual HTTP FTP proxy configuration of esets_http with the Mozilla Firefox is described in general by the left side of the figure 4 2 Note that this configuration allows to install ESET Gateway Security anywhere within the local network including gateway server and also user agent s computer In this example we configure esets_http to listen to port 8080 of the computer with local net...

Страница 18: ... when requested again In this example we configure esets_http to listen to port 8080 of the gateway server with local network IP address 192 168 1 10 by specifying the following parameters within http section of ESETS configuration file agent_enabled yes listen_addr 192 168 1 10 listen_port 8080 Note that the parameter listen_addr can be specified either as the host name visible from the local net...

Страница 19: ...point out that the deferred scan technique described above presents potential risk for the computer whose user agent requested the infected large file for the first time The risk resists in that even data transfer of an infected object has been deferred some parts of already transferred data can contain executable danger code That is why the ESET developed modification of the deferred scan techniq...

Страница 20: ...id installed is 4 2 or higher enter the following commands ln s LIBDIR ssfi esets_ssfi so opt safesquid modules esets_ssfi so ln s LIBDIR ssfi esets_ssfi xml opt safesquid modules esets_ssfi xml If version of Safesquid installed is lower than 4 2 enter the following commands ln s LIBDIR ssfi esets_ssfi so opt safesquid modules esets_ssfi gcc295 so ln s LIBDIR ssfi esets_ssfi xml opt safesquid modu...

Страница 21: ...i templates ssfi_not_scanned html opt safesquid ssfi_not_scanned html You have also to add the new templates definitions in the SafeSquid configuration by pressing Add in the Templates section In the list that appears the following parameters have to be defined for infected ESETS blocking page Comment ESET Gateway Security infected template Name esets_infected File ssfi_infected html Mime type tex...

Страница 22: ......

Страница 23: ...Chapter 6 Important ESET Gateway Security mechanisms ...

Страница 24: ...ted otherwise the object is blocked NOTE Please note that some of the modules has been written to integrate ESETS into the environment which does not allow to modify scanned objects and thus this functionality is disabled in the module Particularly this means that configuration option av_clean_mode is ignored by the module To get detailed information on this topic refer to appropriate modules manu...

Страница 25: ...ader name of the special section contains identification of the HTTP client for which we have created individual setting The section body then contains individual parameters specified for this identification Thus with this special configuration an HTTP traffic of all local network clients will be processed i e scanned for infiltrations with exception of the client determined by IP address 192 168 ...

Страница 26: ...L INFORMATION ABOUTYOU AND ORTHE USER OFTHE COMPUTER AND SAMPLES OF NEWLY DETECTEDVIRUSES OR OTHERTHREATS AND SENDTHEMTO OURVIRUS LAB THIS FEATURE ISTURNED OFF BY DEFAULT WEWILL ONLY USETHIS INFORMATION AND DATATO STUDYTHETHREAT ANDWILLTAKE REASONABLE STEPSTO PRESERVETHE CONFIDENTIALITY OF SUCH INFORMATION In order to turn on Samples Submission System the samples submission system cache has to be ...

Страница 27: ...t up specify the address of your ERA Server in racl_server_addr parameter and racl_password if appropriate in the global section of ESETS configuration file All RA Client variables are listed in the esets_daemon 8 manual page Unix ESETS RA Client has this functionality logins to ERA Server and provides System Information Configuration Protection Status and Features configuration can be viewed and ...

Страница 28: ......

Страница 29: ...Chapter 7 ESET Security system update ...

Страница 30: ...re downloaded from the origin ESET server If configuration option av_mirror_enabled is enabled in section global of ESETS configuration file the mirror of these modules is created in directory BASEDIR mirror Note that the mirror directory path can be redefined using configuration option av_mirror_ dir in section update of ESETS configuration file The newly created mirror thus serves as fully funct...

Страница 31: ...Chapter 8 Let us know ...

Страница 32: ...g a documentation is a process that is never finished There will always be some parts that can be explained better or are not even explained at all Therefore in case of bugs or inconsistencies found within this documentation please report a problem to our support center http www eset com support We are looking forward to help you solve any problem concerning the product ...

Страница 33: ...Appendix A ESETS setup process description ...

Страница 34: ... A PREROUTING p tcp i if0 dport 80 j REDIRECT to ports 8080 On FreeBSD the rule is as follows ipfw add fwd 192 168 1 10 8080 tcp from any to any 80 via if0 in On NetBSD and Solaris echo rdr if0 0 0 0 0 0 port 80 192 168 1 10 port 8080 tcp ipnat f A 2 Setting ESETS for scanning of FTP communication transparent mode The FTP communication scanning is performed using esets_ftp daemon In the ftp sectio...

Страница 35: ...p tcp i if0 dport 21 j REDIRECT to ports 2121 On FreeBSD the rule is as follows ipfw add fwd 192 168 1 10 2121 tcp from any to any 21 via if0 in On NetBSD and Solaris echo rdr if0 0 0 0 0 0 port 21 192 168 1 10 port 2121 tcp ipnat f ...

Страница 36: ......

Страница 37: ...Appendix A PHP License ...

Страница 38: ...will be given a distinguishing version number Once covered code has been published under a particular version of the license you may always continue to use it under the terms of that version You may also choose to use such covered code under the terms of any subsequent version of the license published by the PHP Group No one other than the PHP Group has the right to modify the terms applicable to ...

Отзывы: