Thursday, July 11th, 2013 at
There was a good article recently on PaulDotCom related to bypassing an IDS using SSL. This is a common problem with any IPS/IDS.
Lets first understand how an Intrusion Detection System can inspect SSL traffic. There are two primary ways vendors have implemented SSL decryption.
The first way is through the use of a dedicated appliance; such as a Netronome device. In this scenario the traffic is redirected to the offload appliance and decrypted. The decrypted traffic is then sent to the IPS/IDS for inspection.
The second method is where the traffic is decrypted on the intrusion prevention appliance.
Both of these scenarios have their benefits and drawbacks but they both require access to the private key of the certificate for the site being access. The certificate is loaded on the device and then traffic can be decrypted. This presents a problem when you do not have access to the private and is why the example from PaulDotCom works so well. This is also why attackers will encrypt their outbound traffic and easily evade IPS/IDS devices.
To counter this threat companies can you other solutions such as web gateways to redirect all SSL traffic to a web gateway where a certificate is installed on system to allow decryption of outbound traffic, think “man-in-the-middle” attack but performed by your company.
We will release some videos in the future showing how to do this.
Tuesday, April 27th, 2010 at
Virtualization is a top priority for most organizations today. Security of these virtualized environments should also be a top priority and in the Intrusion Prevention market most vendors are developing or have developed virtual or virtualized solutions.
The terms virtual IPS and virtualized IPS have different meanings and I want to take some time to attempt to differentiate these terms. Most vendors have had virtual IPS for many years. Virtual IPS is the ability to apply different polices to certain types of traffic. This could be done using VLAN tags or physical interfaces. IBM does this using the Protection Domains feature which allows a different policy to be deployed to different VLAN’s. Mcafee does this by allowing different policies to be assigned to physical interfaces and can also support policies to be applied based no VLAN tags.
Virtualized IPS is what most of us think of today when we discuss virtualization. Virtualized IPS is an IPS appliance that runs in a virtual environment such as VmWare, Zen or Microsoft’s Hyper-V. The IPS is installed as a virtual server and can be configured so that all server to server traffic inside and outside the virtual environment can be monitored by an IPS.
It is important to be clear on these differences in terminology because not all vendors have virtualized IPS and most sales people will not know enough to properly answer the question, Do you support virtualization? Most will say yes, because they have heard their support teams talk about virtual IPS not virtualized IPS. Virtualized IPS will continue to grow in importance and eventually all the major Intrusion Prevention vendors will have these offerings. Until then do your homework and hold the vendors accountable.
Monday, July 13th, 2009 at
This is the first post on the Intrusion Detection and Prevention blog. I plan to post information relating to these technologies, the vendors, etc. I hope you find it useful and interesting.