TimbuktuPro The #1 Remote Control and File Transfer Software Contents 1 Introduction 1 Application Level Security 2 Network Level Security 2 Usage Examples 4 Summary 4 Appendix A–Setting Up a Firewall for Timbuktu Pro 5 Appendix B–Differences Among the Timbuktu Pro Family Timbuktu Pro Enterprise Security White Paper A secure approach to deployment of remote control technology TimbuktuPro Introduction Master Password Netopia has gone to great lengths to ensure that the security features built into the Timbuktu Pro line of software are not only stringent enough to meet IS needs, but have the flexibility to work with existing security standards such as firewall, Virtual Private Networks (VPN), PAP, CHAP, Point-to-Point Tunneling Protocol (PPTP), SecureID™, etc. Timbuktu Pro can be configured with a Master Password to prevent any changes to the security specifications on a machine. When configured in this way, Timbuktu Pro requires the correct Master Password whenever somebody tries to change security-related preferences, such as the defined users or incoming access. This high level of security allows Timbuktu Pro to be an essential tool for safety conscious organizations such as Banker’s Trust, the Pentagon and Hughes Aircraft. Site Keys and Administrators Timbuktu Pro’s security can be divided into application level security and network level security. Application level security refers to features in Timbuktu Pro that make it a secure application on your network. The network level security section of this document illustrates how Timbuktu Pro interacts with security hardware and software already in place on your network. Application Level Security Password Protection (User level access) At its most basic level, Timbuktu Pro is designed to require a specific user name and password for each person needing access to a given machine. In addition, users can be set up with varying levels of access depending on their individual needs. For example, a Timbuktu Pro machine can be easily configured so that one or more remote accounts have “control access” for administrative purposes, others have “observe access” for training purposes, and all accounts have send privileges to facilitate communication and collaboration across the Intranet. The Timbuktu Site Key Generator can be used to enforce the established security policy for corporate use of Timbuktu Pro. Enforcement can involve disabling various features, modifying the TCP ports used for Timbuktu Pro, requiring Site Keys in order to connect to members of the site, and restricting modifications after the initial installment and configuration of Timbuktu Pro. Secure Screen Blanking Timbuktu Pro for Windows supports secure screen blanking on Windows NT and Windows 95 machines. When this option is enabled, a remote control session will automatically blank the screen on the host, preventing the disclosure of any sensitive or confidential information to somebody with physical access to the host machine. Remote Control Notification Timbuktu Pro for Windows can be configured to warn you of active remote control or observe sessions in two ways. You either can configure it to beep periodically, show a warning dialog, or both. This feature ensures that you don’t inadvertently display sensitive information while somebody observes your screen. Attended Access Activity Logging In attended access mode, access can be restricted only to specifically authorized users. Here, the user of the Timbuktu Pro machine must specifically authorize–on a per-session basis–any incoming connections. For maximum security, the administrator can permit only attended access mode. Every Timbuktu Pro connection established to a machine is logged to an Activity Log. This file is a continuous record of which machines (including IP addresses where applicable) have used a given service. This information is logged in a standard format and may be audited on a regular basis for security violations. Under Windows NT, Timbuktu Pro also logs connection information to the Application Event Log. This enables integration with standard Windows NT monitoring and auditing software. 1 TimbuktuPro Network Level Security Network Management Integration Firewalls Timbuktu Pro is integrated with popular network management and help desk software such as SMS and Remedy. This integration lets a Network Administrator automatically use Timbuktu Pro’s remote control capability to access a machine from within their existing network management software. Virtually every corporate LAN connected to the Internet has a firewall in place. Because of its flexible TCP/IP implementation, Timbuktu Pro can be blocked or permitted on a service-by-service basis at the firewall level. Every service that Timbuktu Pro provides can be configured with the Site Key Generator for distinct and unique TCP/IP ports. For example, the firewall could be configured to allow Observe and Send to take place across a WAN, but prohibit services like Control and Exchange Files across insecure connections. Usage Example The following examples are accounts of how Timbuktu Pro can be used in a corporate environment. They are examples based on feedback that Netopia’s Technical Support department received from customers. See Appendix A for detailed information involving firewall configuration. Example 1 Virtual Private Networks (VPNs) The problem: A Virtual Private Network allows secure communication over a connection that would normally be either blocked by a firewall or unsuitable for sensitive material due to the inherent insecurity of Internet communications. A number of companies are providing VPNs as either stand-alone products or as add-ons to firewalls. These VPNs are capable of encrypting an entire WAN connection, tunneling it through the Internet or some other insecure link, and decrypting it at the other end, all the while ensuring the data hasn’t been tampered with or spied on while in transit. Many such VPNs are capable of 128-bit encryption, which is more than suitable for today’s computing technology. Please see Example 3 in the Usage Example section for details on how such technologies can be used in conjunction with Timbuktu Pro. Company A is a financial organization that needed a more effective way of supporting and training their users. They were experiencing two problems: Remote Access Authentication In order to prevent dial-up users from gaining access, you can require various levels of authentication from your Remote Access Server (RAS). Because Timbuktu Pro for Windows doesn’t contain a direct dial component, it is possible to require that remote access users go through a standard security mechanism such as PAP or CHAP PPP access as well as have a closely monitored central RAS box. For the highest level of security, you can supplement PPP access with SecureID (or other token-card technology) to ensure that only authorized users are able to access your LAN and your Timbuktu Pro resources. 1. Users were frustrated by the time required to get support from the help desk 2. The help desk was department frustrated with the amount of time and effort spent fixing or explaining simple problems. Management did not want to double the help desk staff in order to meet the needs of the end users in a timely fashion. The solution: In a pilot program, Timbuktu Pro was rolled out to two help desk people and twenty end users. Whenever any of these users required support, they used the standard mechanism already in place to contact the help desk. Without ever leaving their seats, the help desk was able to observe or control the user’s screen in attended access mode and either fix the software problem or demonstrate how to accomplish a task. Timbuktu Pro had the necessary components to effectively double the productivity and responsiveness of the help desk department without any staffing changes. TimbuktuPro The security: This organization was extremely security conscious, but had fairly simple requirements for Timbuktu Pro. They had an Internet connection, but didn’t want Timbuktu Pro to be accessible across the Internet. Since their existing firewall implementation completely blocked the IP ports used by Timbuktu Pro, this was not a problem. They eventually installed Timbuktu Pro on every user’s machine for support purposes, but didn’t want or need to take advantage of the peer-topeer collaboration capabilities of the software. This was easily addressed by having a corporate–wide Site Key that was pre-installed on all Timbuktu Pro machines. This Site Key locked down the preferences so that only somebody with the administrator’s key was able to connect. The help desk department then installed the administrator’s key on all of their machines so only they could connect to the users with Timbuktu Pro. Example 2 The problem: Company B was in a similar situation to Company A. However, as a computer manufacturer targeting vertical markets, they wanted to provide technical support to their customers using the same tools the help desk used to provide internal support. The solution: Similar to Example 1, Company B used a corporate–wide Site Key, but allowed employees to use Timbuktu Pro for collaboration purposes. Their employees find Timbuktu Pro to be an extremely useful tool for sending files and ideas to coworkers instantaneously. Company B also purchased a site license allowing them to ship Timbuktu Pro to any customer with a support contract. When Company B’s support staff communicates via phone or email with a customer, they are able to use their existing Internet connection to provide the same kind of support their help desk provides internally. The security: Company B used their existing firewall implementation to block incoming Timbuktu Pro connections, and rolled out a less restrictive Site Key that allowed peerto-peer usage of Timbuktu Pro while still providing the help desk benefits outlined in Example 1. The machines used for external customer support were put in an external “no-mans-land” between two levels of firewall. Most importantly, these machines were located outside of a firewall to ensure that even if a machine used for support is compromised, it will not be a risk to corporate data or security since no sensitive information is stored on these machines, and the firewall prevents these machines from being used to leapfrog into the internal network. Also, there is a useful external firewall protecting these external support machines from non-Timbuktu attacks such as SYN-ACK denial of service and routed packets. Example 3 The goal: Company C is a global organization with locations in twenty U.S. states and thirteen countries. Their primary use of Timbuktu Pro is collaboration, as well as administering about 75 file servers, web servers, and application servers running Windows NT. All of their offices are connected via various methods to a single WAN. Many of their connections are over dedicated leased lines, but nearly half tunnel their WAN connection through the Internet to reduce the costs of leasing high-speed international data lines. The solution: Timbuktu Pro is running on virtually every machine in the company and is used in a number of different ways. 1. The web masters use it to administer their web servers for both internal and external information publishing. 2. The engineers use it to share ideas and files among themselves, and to quickly facilitate a review process between engineering, QA, product management, and marketing. 3. The sales force uses it to access information on their desktop machines when they are dialed in to the corporate network while traveling. The security: These links are secured with Virtual Private Network technology. Some of these VPNs use the Point-to-Point Tunneling Protocol available in Windows NT and many modern routers while others use more proprietary VPNs from Trusted Information Systems (TIS) — a well–regarded firewall manufacturer. In both cases, these VPNs are used to provide an encrypted LAN-toLAN connection that can be tunneled over any 3 TimbuktuPro Internet connection. Because they have no need to communicate outside of their own network, their external links to the Internet are configured to completely block Timbuktu Pro traffic. Site Keys are used only on the servers that need to be administered and only the server administrators are provided with the administration keys for these machines. Timbuktu Pro UDP Ports Summary Control Observe Send Files Exchange Files Chat Timbuktu Pro has an extensive set of security features built into it. Even more important, it has been designed from the ground up to be flexible enough to work with and extend a corporation’s existing security policies and mechanisms. This document is an introductory look at the ways Timbuktu Pro’s administration, communication, and collaboration features can be securely used on your network. Netopia has focused for years on the security needs of a corporate network, and our support department can assist you in design and implementation of Timbuktu Pro usage on your network. If you would like to discuss implementation possibilities or problems, or if you have some unique requirements that aren’t addressed by this document or the Timbuktu Pro feature set, contact us to see exactly how our product can be adapted to meet your needs. Appendix A–Setting Up a Firewall for Timbuktu Pro For security reasons, network managers on TCP/IP networks usually want to restrict external access to their networks. Most of the time they will only open TCP/UDP ports for Telnet, FTP and other common services. To do that, they will configure their IP routers (sometimes referred to as gateways) to filter out access to different ports. These filters are usually referred to as “firewalls”. TCP/IP security firewalls may be configured in ways that selectively allow or block various types of Timbuktu Pro connections. The firewall administrator should configure the firewall for use with Timbuktu Pro to meet the needs of the corporate security policy. Timbuktu Pro uses well-defined UDP Port 407 for connection handshaking. Once the UDP connection is established, Timbuktu Pro uses TCP ports for each of the seven types of Timbuktu sessions. Connection (handshaking) - UDP Port 407 (Timbuktu Pro for MacOS and Netopia Virtual Office use UDP port 1419) Timbuktu Pro TCP Ports Notify Intercom TCP port 1417 TCP port 1418 TCP port 1419 TCP port 1420 Dynamic TCP port (NVO and Timbuktu for MacOS only) Dynamic TCP port (NVO and Timbuktu for MacOS only) Dynamic UDP and TCP ports (NVO and Timbuktu for MacOS only) These ports are used during access from “registered users” - those users who have valid user accounts and passwords on the Timbuktu Pro hosts. Any or all of these ports can be firewalled to ensure security from unauthorized users. Some network managers will firewall all ports, but allow a connection to be established to UDP Port 407 and TCP Port 1419. This allows anyone on the Internet to send files via Timbuktu Pro. The Timbuktu Administrator’s Toolkit (included with the Timbuktu Pro for Enterprise package) provides the ability for network administrators to reconfigure the TCP ports used by Timbuktu Pro. However, UDP Port 407 and 1419 cannot be changed. Timbuktu Pro also supports “attended access” from temporary guests where the host’s user admits a guest on a one-time basis without requiring a password. Timbuktu Pro defaults to using a dynamic port assignment for attended access connections thereby bypassing the firewall on the static ports. If network administrators wish to firewall this attended access feature, they can simply assign it to a static port using the Administrator’s Toolkit. Registered port numbers are used only by computers receiving a connection. Users who initiate connections are using dynamic port numbers. A dynamic TCP port is negotiated by the two computers involved in a Timbuktu Pro connection. Dynamic ports usually have numbers greater than 1023. If these dynamic ports are firewalled, Timbuktu Pro will not be able to complete a TCP/IP connection. The network manager will need to re-configure the TimbuktuPro firewall permissions to permit TCP and UDP port assignments. Refer to the firewall or router documentation for details. If the default TCP port assignments are not the preferred ones, a network administrator can use the Timbuktu Pro Administrator’s Toolkit to designate which TCP/IP ports are used for Timbuktu Pro services throughout the site. For information about the Toolkit, contact Netopia’s Customer Service at (510) 814-5000. Netopia Virtual Office While Netopia Virtual Office doesn’t contain “Timbuktu” in the product name, it does use Timbuktu Pro Remote Control and File Transfer technology. Therefore, this document applies equally to both Timbuktu Pro and Netopia Virtual Office. In addition to the features covered in this document, Netopia Virtual Office 1.1 also contains a miniature web server. This HTTP server operates on TCP port 80 by default, but can be overridden with a Site Key. Appendix B–Differences Among the Timbuktu Pro Family Timbuktu Pro for Windows All portions of this document are relevant to Timbuktu Pro for Windows 1.5x. References to the Chat and Intercom features are not currently available in this product. Versions of Timbuktu Pro prior to 1.5 do not support all of the Window’s NT specific features. If you are running Window’s NT and have an earlier version of Timbuktu Pro, contact Netopia to upgrade to 1.5. Timbuktu Pro for MacOS Timbuktu Pro for MacOS supports two transports protocols that are not found in the Windows version and may require special considerations. The first transport is AppleTalk. If your network uses the AppleTalk protocol, then Timbuktu Pro for MacOS can take advantage of this for easy communications between Macintoshes on the LAN. Unless you have AppleTalk bridges to untested networks, this will not be a security concern. The second Mac specific transport is Dial Direct. This feature allows two machines with Timbuktu Pro for MacOS to communicate directly with each other over a modem without going through a network connection. To address security concerns about unmonitored remote access and remote control, this feature can be configured and/or disabled with a Site Key. In addition, Timbuktu Pro 4.0 introduces a feature allowing a network administrator to monitor the network for machines configured for Direct Dial. For further information about this feature, contact Netopia at 510-814-5000. 5 TimbuktuPro More than five million network users and 300,000 network administrators depend on Netopia innovation. Since 1986, Netopia has been the industry leader in providing networking products that connect personal computers, and help users communicate quickly, easily, and effectively. With products for PCs, Macs, notebooks, workstations, and printers, Netopia offers easy-to-use solutinos for connectivity and communications. Netopia, Inc. 2470 Mariner Square Loop Alameda, CA 94501-1010 USA (510) 814-5000 (510) 814-5023 Fax ©1997 Netopia, Inc. All rights reserved. All trademarks are the property of their respective holders. Printed in the USA. v.1097. ZPK800