Personal Firewalls Tests: ZoneAlarm

An analysis of mini-firewalls for Windows users

By Seán Boran


November 29, 2000 - This article is a part of a series of tests on Personal Firewalls / Intrusions Detection Systems. Refer to 1 for an introduction to Personal Firewalls, risks, tips on 'hardening' your Windows even without a firewall, a feature comparison and a summary of analyses.

This report focuses on ZoneAlarm (note that ZoneAlarm Pro has not yet been tested)


Security Effectiveness tests

Key criteria in choosing a Personal Firewall are:

How did we test firewall/intrusion detection effectiveness?

a) Ping and accessing shares to and from the test host.

b) A powerful, well known 'remote control' trojan (Netbus Pro v2.1) 3 was installed on the system on a non standard port (to make detection more difficult), the Netbus server started and attempts made to connect from a remote system.

c) The telnet server was enabled on the Win2k test PC. It was then attempted to connect to this service remotely. It is not recommended that you enable telnet, we do this purely for testing purposes.

d) An nmap 2 scan was run against each product (see below), to check that incoming ports were effectively blocked. With no firewall installed, the test PC (Win2k sp1) presented nmap (nmap -sT -P0 -O IP_ADDR) with the following ports:

Port State Protocol Service
7/tcp open echo
9/tcp open discard
13/tcp open daytime
17/tcp open qotd
19/tcp open chargen
23/tcp open telnet
135/tcp open loc-srv
139/tcp open netbios-ssn
445/tcp open microsoft-ds
1025/tcp open listen
No OS matches for host


ZoneAlarm Personal Firewall

ZoneAlarm Firewall 4:

Combining the safety of a dynamic firewall with total control over applications' Internet use, ZoneAlarm gives rock-solid protection against thieves and vandals. ZoneAlarm now features MailSafe to stop email-borne Visual Basic Script worms, like the "I Love You" virus, "dead-in-its-tracks", thwarting its spread, and preventing it from wreaking havoc on your PC. ZoneAlarm makes ironclad Internet security easy-to-use.

Zone Alarm watches network communications on a per application basis and asks the user for permission each time an application wants to use the network.

Features

Security Effectiveness

Running nmap on ZoneAlarm in "high security" mode causes one alert that was not informative and nmap is able to identify a few services:

Port    State       Protocol  Service
17      open        tcp       qotd                    
19      open        tcp       chargen                 
135     open        tcp       loc-srv                 
139     open        tcp       netbios-ssn             
No OS matches for host.

Advantages

  1. Shuts down all unused ports.
  2. Cost: free for personal use.
  3. Has different rules for LAN (local) and Internet networks.
  4. Stops and asks for your permission before an application can use the network, for the first time, or every time.
  5. Flexible
  6. Button to block the network temporarily (which can be used if you suspect you have a Trojan, or are opening an email/program from an untrusted source, or are going off for lunch...). Programs which are configured to "Pass Lock" are still allowed to communicate.
  7. Quick download (1.5MB)
  8. Other ZA users have indicated that they like its method of functioning.

Disadvantages

  1. If many applications are used, the questions to the user can be annoying/confusing, and the user may end up having more applications trusted than expected.
    It doesn't tell you exactly what the Application does, and application is either trusted, or it is not.
    For example, when using Internet Explorer, ZA prompted saying IE wanted to be a server to the Internet, but without any details as to what port, whether this was dangerous, etc.. I denied access and IE still worked (Netscape did not cause this effect). IE did this several times.
  2. If you use a dialup connection, sometimes for Intranet, sometimes for Internet, ZoneAlarm will always apply the same rules. e.g. on an Intranet dial-up NetBIOS file sharing, RPC etc. are desirable, but they are not on the Internet connection. It's too unwieldy to switch security levels on the GUI each time you dial one or the other.
  3. ZA can't be configured to ignore pings from unknown sources, e.g. from Network management stations on the Intranet.
  4. GUI could be easier to use, more instructive, and could use less screen space (I don't like the permanent window that can't be removed).
  5. It would be nice if power users could customise the rules a bit more: cannot allow/deny specific incoming/outgoing ports/protocols.
  6. Deinstalling could be cleaner, an empty ZoneAlarm directory is left in C:\Program Files\ and keys are left in the registry.
  7. There is no 'user friendly' GUI for browsing attacks. However a third party tool is available 5.
  8. The attack logs \winnt\Inernet Logs\ZALog.txt is not detailed enough, it gives port numbers but not reasons why packets are blocked, no packet headers or contents, nor any state information.
  9. Bugs:
Summary

ZoneAlarm is interesting and has a loyal following, especially since it is free for home users.

However it does have it's quirks and you may find it worth paying for the pro version or other products.

Addendum: Some information has come in, but I've not reinstalled to check it;


References

  1. Personal Firewalls/Intrusion Detection Systems (The base reference for this article).
    pf_main20001023.html
  2. Nmap
    http://www.insecure.org/nmap

  3. Netbus Pro: Remote control program often used as an attack tool to control remote PCs.
    http://netbus.nu/

  4. ZoneAlarm
    http://www.zonealarm.com/
  5. Firewall Log Analyzers from Brady & Associates, LLC, for BlackICE, ZoneAlarm and Winroute. The BlackICE log analyse was tested and works well. It costs $20.- for BlackICE, $10 for ZoneAlarm, with a one month evaluation period.
    http://clearice.hypermart.net/
  6. "Windows 2000 SP1 breaks firewall software":
    Q269676
    http://support.microsoft.com/support/kb/articles/Q269/6/76.ASP
    Wininformant article
    http://www.wininformant.com/display.asp?ID=2852

 


About the Author

Seán Boran is an IT security consultant based in Switzerland and the author of the online IT Security Cookbook.

Changes to this article

18.Oct.00 Published
22.Nov.00 Minor fixes
12.Mar.01 Reader note.  Doc 332
15.May.01 Addendum

© Copyright 2000, Seán Boran, All Rights Reserved     Last Update: 17 August, 2001