VB Comparative: Novell NetWare 6.5 - August 2006

2006-08-01

John Hawes

Virus Bulletin
Editor: Helen Martin

Abstract

John Hawes's first task as VB's new Technical Consultant was to run a comparative review of AV products for NetWare. See how John and the eight products fared.


Introduction

The previous incumbent in this post, Matt Ham, made no secret of his opinion of the NetWare operating system and the anti-virus products available for it. Though he left the job exactly one month before the review schedule came back round to Novell's network operating system, this may be mere coincidence. Faithfully following the test timetable laid down before my arrival, I resolved to ignore Matt's cynicism and approach the task with an open mind. Wide-eyed and full of wonder, with the prospect of making friends with the gaggle of strange new AV products before me, I headed into the lab.

Products, test sets and platforms

One of my first tasks for VB was to issue a call for products and to announce deadlines for this test. I chose the date of my first day in the job, 3 July 2006, as the vendors' final chance to submit products and virus data updates, with the WildList deadline a few days earlier; as a result, the In the Wild (ItW) test set was compiled using the April 2006 WildList.

Fortunately for me as much as for the submitted products, there were comparatively few new viruses to add to the test set; while quite a few fell from the list, only around 30 had been added since the VB collection was last updated. Along with the handfuls of W32/Mytob and W32/Bagle variants, there were a few variations of W32/Feebs and W32/Lovgate, as well as some names that were new both to me and the list – W32/Nugache, W32/Gurong and W32/Rontokbro are yet more mass-mailing worms with some file-sharing exploitation and backdoor functionality thrown in.

I was also thankful that, for this educational first stab at running VB's comparative testing, a fairly limited selection of products was submitted. I knew practically nothing about most of these products – most of their names and reputations were familiar only from previous reviews in this very publication. As the products arrived, in the form of zipped email attachments, links to FTP sites or descriptions of CDs stashed somewhere deep in the VB test lab, I could only wonder what delights and horrors lay ahead of me.

The test machine setup gave me my first real challenge – one in which I quickly conceded defeat. The current version of NetWare, 6.5, with the latest Consolidated Support Pack, number 5, is also known as Novell Open Enterprise Server (with the support pack renumbered 2). My hopes that the installation CD with the support pack pre-applied would install happily on the shiny new hardware in the test lab evaporated quickly, when it decided it could not begin to cope with the hardware configuration or components. With time pressing, I decided to avoid fiddling about with drivers and such, and installed instead on older, more standard machines, using more powerful hardware for clients. These ran Microsoft Windows XP Professional SP2, with Novell's Client 4.91 SP2 installed. This compromise meant that the NetWare servers were running rather close to the minimum permitted RAM, but they seemed to handle it without complaint. With products gathered, test collections in place and all the machines happily networking and reimaging, I was ready to commence testing.

CA eTrust v7.1 for NetWare (InoculateIT engine 23.72.00, 23.72.57)

Opting to run through the products alphabetically, I started with CA's offering – perhaps an unfortunate decision as it proved the most time-consuming product to test. Installation of the NetWare product took the form of a Windows installer, with a simple and fairly helpful GUI taking me through the steps of selecting the target machine and the components to install. Updating was a little more old-school, with a selection of virus data and engine updates copied onto the server manually, overwriting the existing files and requiring a simple unload and reload of the software to be picked up (I later discovered a more sophisticated approach was also available).

Once up and running, I found the interface on the NetWare console fairly intuitive, with the top half of the screen displaying status and statistical information, and a menu of options below. A scan of the test set was easily set up and initiated, although there was no option to browse files or save paths. The scan presented me with a screen showing nothing but the path being scanned and the number of files processed, incremented in hundreds. Results finally appeared at the end of the scan, and were written to a log with much of the information about the scan crammed into the lengthy filename.

As I came to the on-access test I ran into trouble. While the console interface allowed me to stop and start real-time scanning, and to examine the status (opening a new screen showing numbers and categories of files scanned and infections found), there seemed to be no way of configuring the scanner's behaviour. The default settings were to 'cure' infected files, with no obvious form of logging. Resorting to the manual at this early stage, and browsing through some of VB's previous NetWare comparatives, I discovered that configuration could only be effected via an interface on the Windows client. This I duly installed, and I found myself faced with a multi-tabbed browser-based 'Threat Management Console' interface. After upping my screen resolution so I could see at least most of the page at once, I navigated my way around some rather baffling pages, and eventually managed to persuade it first to 'discover' and then to control the NetWare product. With this hurdle out of the way, I found the interface itself to be fairly easy on the brain.

Testing proceeded without further incident, the product handling the test set quite happily. However, since the InoculateIT engine is not the default for the product, it does not qualify for a VB 100% award.

Please refer to the PDF for test data

CA eTrust Antivirus v7.1 for NetWare (VET engine 12.06.01 12.06.2285)

The default Vet engine, while very slightly slower in the throughput tests than the alternative provided, achieved marginally better results in the zoo virus detection, and did just as well in scanning the ItW and clean test sets, earning CA its VB 100% award. Switching between the two engines was a simple manoeuvre, involving selecting the appropriate option from a menu; again, while this could be done from the console interface for on-demand scans, the client-based management GUI was required to adjust the on-access component.

Please refer to the PDF for test data

Doctor Web Dr.Web for Novell NetWare v4.33.3(.06190)

Dr.Web proved a much simpler piece of software, with a large number of tiny virus data files and an NLM copied onto the server and loaded. The console screen presented was a rather murky dark-green-on-black, with a small menu in one corner and most of the screen given over to contact details for the company. The menu itself was simple and logical, with ample configuration options, even offering to detect any jokes I may have had on my machine. On-demand scans were accompanied by a highly detailed information screen.

The product flew through the WildList viruses without difficulty, and did well in the zoo collection too; unfortunately, it claimed one of the clean files was infected with 'Trojan.classic' – an issue which, according to the developers, was fixed less than 24 hours after the close of entries for the test, but one which was sufficient to deny Dr.Web the coveted VB 100% award this time round.

Please refer to the PDF for test data

ESET NOD32 version 1.1640

The simplest of the products by far, NOD32 provided me with only six files, two of which were basic user guides, while a third formed the EULA. The other three files, once copied to the NetWare server, provided a command-line scanner, which merrily zipped through the test set, and an on-access monitor, again with all options passed in as command-line qualifiers. Display and logging were simple and effective, although logs were afflicted with the common problem of truncating long filenames, while speed and detection rates were exceptional.

NOD32 takes the VB 100% award easily in its stride; the only other flaw I could find was on the help screen, entitled 'NOD32 Antivirus System for Nowell Netware'.

Please refer to the PDF for test data

Kaspersky Anti-Virus for Novell NetWare v5.60.01

Kaspersky Anti-Virus is another product installed from the Windows client, with standard Windows installer dialogues to select server, apply licences etc. Along with the scanner, a ConsoleOne snap-in and web management tool are offered as optional modules; at least one is required as no control at all is possible from the NetWare console. A screen is available on the NetWare server, with some statistics and status information, but this is purely for display. The option to add a line to the Autoexec.ncf, causing the product to be loaded on restart of the NetWare server, is also offered during the install.

I used the ConsoleOne snap-in which, like all ConsoleOne experiences, tended to suffer moments of extreme slow motion. The snap-in provides tree entries for on-demand, on-access and updating jobs, each with a properties page offering copious configuration options. Scans were simple to set up and run, and the interface fairly intuitive and usable.

With almost total success in the virus scans (the only files missed were in archives, not scanned by default on access to save resources), and no false positives, Kaspersky wins yet another VB 100% award.

Please refer to the PDF for test data

McAfee NetShield for NetWare v4.6.3

Once again going for the Windows installer approach, McAfee has opted also to provide its own client-side interface. The installer slowed things down by demanding the Java Runtime Environment be available before it would consent to continue; with this in place, the software for the NetWare server and the Windows GUI installed quickly and easily.

A console screen on the NetWare server provides information but no control other than totally unloading the scanner. The Windows GUI requires a password to access it, which brought testing to a halt once more – I wrongly assumed it wanted the password for the NetWare server, when in fact it had its own, presumably as some kind of second-line licensing technique.

Once access was gained, tweaking the settings was straightforward and speedy. Scanning over the test sets proceeded without incident, and the McAfee product, while somewhat on the slow side, was admirably thorough, detecting everything that was thrown at it and deserving its VB 100% award.

Please refer to the PDF for test data

Norman FireBreak v4.76.2325

Norman's FireBreak also installed from Windows, demanding a lengthy licence key before proceeding. It also required the root of the SYS drive of the NetWare server to be mapped to a local drive letter on the client. The installation process mentioned a ConsoleOne-based interface, which I was unable to locate on completion; however, it provided a server console interface too.

There were, in fact, two console screens: the first was a monitor packed with information about real-time scanning, while the other was half-empty, with just a small menu in the top left-hand corner. This provided further menus within menus, all arranged in a fairly straightforward and sensible fashion, allowing me to configure the test scans without difficulty.

Once an on-demand scan was started, the details were displayed in another window, while the product chugged confidently through the test set. Although a fair smattering of zoo viruses were missed, nothing in the ItW test set went undetected and the product generated no false positives. As a result, Norman also wins a VB 100% award.

Please refer to the PDF for test data

Sophos Anti-Virus 4.07.0

Sophos has done away with its old single-self-extracting-NLM style, and the product now provides a collection of NLMs and data files, much like most of the other products. Once copied to the server and run, the program creates all the folders it needs, demanding a user ID to 'integrate into NDS'. Updating was achieved by dropping identity files into the appropriate folder and reloading, but an automated system is available, administered by a Windows console.

The single-screen GUI is fairly straightforward and informative, with a menu top left and the rest of the screen showing stats and figures. One small annoyance was that the path to be scanned could not be edited once entered, and had to be deleted and replaced; this made running separate scans of several folders with the same root path rather frustrating. Another was the truncating of filenames in the log. These minor issues aside, SAV detected everything in the wild, threw no false positives, and did very well for speed; a VB 100% award for its performance.

Please refer to the PDF for test data

VirusBuster VirusBuster 2006 for NetWare Servers, v2.03.006-4.03.012

VirusBuster, with its handful of NLMs and folder of data files dropped into a folder under SYS:/SYSTEM and added to the search path, demanded a licence key before activating, and then presented me with another uncluttered screen – just a small menu in the centre, surrounded by a sea of blue stripes. I found the controls a little unintuitive at first, with paths for scanning entered under 'Domain management' and scans of these paths initiated from 'Runtime options', but once this was figured out everything seemed to work reasonably well.

This was the only product to cause one of my servers to 'abend' (which was a big surprise to me – in my previous NetWare experience this happened fairly regularly). It occurred during some rather cavalier starting and stopping of scans of an entire SYS volume, but despite a few attempts I couldn't get it to reproduce the feat. During the clean set scanning, it also snagged on a file and had to be unloaded quite forcibly. Being in a patient and forgiving mood during my first comparative, however, I managed to coax it gently through the rest of the tests. Detection of infected files was solid, with 100% of the ItW samples found, and labelling a single clean set file 'suspicious' was not enough to deny VirusBuster its VB 100% award.

Please refer to the PDF for test data

Conclusion

Perhaps thanks to using a combination of the very latest version of the OS and some fairly standard hardware, I experienced few of the problems with NetWare that made it the bane of my predecessor's life. Likewise the products, despite a few minor irritants such as the unstoppable sending of NetWare alert popups to clients during on-access testing (and the associated incessant beeping), caused few headaches once I came to understand their layout.

I was struck, as Matt has been in previous reviews, by the ever-widening split between the group of products endeavouring to provide an up-to-date, user-friendly experience and those sticking with their tried-and-trusted, simple console interfaces (or, in the case of NOD32, the command line). NetWare itself reflects this dichotomy, with much of its administration yanked out of the hands of the pared-down console tools and replaced with ConsoleOne snap-ins and web management systems, to the chagrin of many veteran admins and the delight of others.

One interesting anomaly was the contrast in scan rates, and lack of contrast in detection, between the most pared-down and the most idiot-proof products. McAfee's client console is clearly designed to be usable by anyone with a bare minimum of computer skills. This was at the opposite end of the throughput test from the techie-pleasing, command-line-driven NOD32, which zipped through the test sets in seconds, while NetShield ambled slowly along, way behind the pack. The two were equal top in terms of thoroughness in detecting infections though, with both products missing nothing whatsoever across all test sets.

Detection rates were generally high all round, with developers having had several weeks to get their ItW virus definitions up to speed. With little time available to update the clean test set or expand on the zoo collection, most products' detection rates in the zoo sets had changed little since the last round of tests; nevertheless, as Dr.Web's bit of bad luck shows, false positives can always creep in. It is clear that I will have to get to work improving and expanding the VB test sets, in order to give the products more of a run for their money in the next test.

Technical details

Test environment - Servers. Identical 1.6 GHz Intel Pentium machines with 512 MB RAM, 20 GB dual hard disks, DVD/CD-ROM and 3.5-inch floppy drive, running Novell 'Open Enterprise Server', NetWare 6.5 Support Pack Revision 5, Server version 5.70.05.

Test environment - Clients. Identical AMD Athlon 64 3800+ dual core machines with 1GB RAM, 40GB and 200 GB dual hard disks, DVD/CD-ROM and 3.5-inch floppy drive, running Novell NetWare Client version 4.91.2.20051209 installed on Windows XP Professional SP2.

Virus test sets.  Complete listings of the test sets used can be found at http://www.virusbtn.com/Comparatives/NetWare/2006/test_sets.html.

Results calculation protocol.  A complete description of the results calculation protocol can be found at http://www.virusbtn.com/virusbulletin/archive/1998/01/vb199801-vb100-protocol .

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest articles:

Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.

Cryptojacking on the fly: TeamTNT using NVIDIA drivers to mine cryptocurrency

TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…

Collector-stealer: a Russian origin credential and information extractor

Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…

Fighting Fire with Fire

In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…

Run your malicious VBA macros anywhere!

Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.