This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

SSP.exe creating lots of traffic

We have been investigating issues with our firewalls and one thing I noticed is i have been seeing hundred and hundred of hits from ssp.exe to our firewall

Client base is over 500!


These seem to be amazon IP Address, why is it talkign too these and what is ssp.exe?



This thread was automatically locked due to age.
Parents
  • Hi,

    I've recently noticed these too since upgrading to 10.6.3 on 12 April. FW logs were being flooded with these dropped connection attempts.

    I logged a call and was told to disable the "Sophos System Protection Service" on a machine to see if it stopped, it did. I then received the reply at the end of this post. Just waiting to hear what the actual risks are of not allowing this traffic before I make the decision.

    I also got the following information about ssp.exe:
    Sophos System Protection, a new component installed in 10.6.3) uses HTTPS to perform lookups to Amazon-hosted Web servers in order to determine if processes that are connecting to external IPs/URLs/etc. without using a browser are talking to Command and Control servers. If they are, the process is quarantined and if need be, terminated. You can see the FAQ for Malicious Traffic Detection here: https://www.sophos.com/en-us/support/knowledgebase/121607.aspx
     

    "Hello,

    Since these machines do not have direct access to the internet, I would recommend disabling the Sophos System Protection service across your environment, as it doesn't seem like this feature will be usable unless you make some significant changes to your network.

    If in the future you do want to enable this feature, you'll have to whitelist the domains referenced in here:

    https://www.sophos.com/fr-fr/support/knowledgebase/117936.aspx

    You'll also have to the Whitelist the Sophos Live Protect and Sophos System Protection Processes. 

    Let me know if you have any further questions! 

    Regards,"

  • On these computers without internet access, what about adding the addresses to the hosts file?

    C:\ProgramData\Sophos\Sophos System Protection\Config\SXA.conf references:

    https://4.sophosxl.net/lookup

    C:\ProgramData\Sophos\Sophos System Protection\Config\FBA.conf references:

    https://ssp.feedback.sophos.com/ssp/v1/

    so "C:\Windows\System32\drivers\etc\hosts" could be updated with:

    127.0.0.1  4.sophosxl.net

    127.0.0.1  ssp.feedback.sophos.com

    Regards,

    Jak

  • Hi Jak,

    Thanks for your reply, the URIs in those config files resolve to all the IP addresses I'm seeing traffic to.

    The computers do have proxied Internet access, but strictly controlled direct access.

    Once I hear back from support on the risks of disabling SSP we may decide to open up HTTPS traffic to 4.sophosxl.net, ssp.feedback.sophos.com

    Many thanks,

    Paul

  • Hi Paul,

    Did you get any feedback from Support? or have you made any changes that have had a positive impact?

    We are experiencing the same issue at the moment and have raised a case with Support who I'm waiting to hear back from.

    Thanks

    Martin

  • It would be best to allow https access to: 4.sophosxl.net and ssp.feedback.sophos.com

    These are used by our next-gen MTD and Download Reputation features, which connect to those urls via the SSP service. In fact here's the full list of SXL addresses you should allow access to - https://community.sophos.com/kb/en-US/117936

    Allowing the Endpoint software to connect to our live protection cloud gives the best possible protection. Feel free to ask if you have any further questions, Endpoint protection is my specialist subject.

    Kind regards 

    Craig

  • Hi Craig,

    Thanks for the information. I have a case open with Support at the moment, opened on 28th April and finally got a response on 2nd May and still waiting for another response despite this being a fairly urgent issue. The SSP.exe service is being blamed for a major slowdown on one of our firewalls because our Infrastructure Team are seeing massive amounts of traffic (think millions of hits over a few hours) from that service on the Firewall logs.

    I have been told the following:

    • The SSP should establish a connection to 4.sophosxl.net on startup and then repeat that connection every 30 minutes, unless it can't establish a connection and then it will retry each of the connection methods every 30 seconds?
    • It will also connect to ssp.feedback.sophos.com at startup and will then connect again once per week, unless it can't establish a connection and then it will retry each of the connection methods every 30 seconds?

    Is this correct?

    • If the above is true, is there a way for us to change how often the service connects and the connection method it should use?
    • Can you confirm that the connection will work through an authenticated proxy so long as HTTPS traffic is allowed?
    • Can you explain why a machine with Sophos 10.3.15 has SSP logs on it if SSP is a feature of 10.6? I have actually found machines with SSP logs going back to February 2016, well before 10.6 was available.
    • Have any Sophos customers experienced problems with connection speeds through their firewalls or millions of connection attempts by SSP.exe since the update to 10.6?

    And the most important question:

    • How would we disable this service from the Enterprise Console? What feature do we need to turn off in the "Antivirus and HIPS" policy?
  • SSP, just to be clear:

    SSP performs SXL4 online queries on behalf of the Malicious Traffic Detection and File Download Reputation features. The queries are used to determine the reputation of a file or URL. The data sent includes file names, file hashes, URLs. The SXL4 queries are done over HTTPS connections to the Sophos SXL4 server.

    On startup, SSP establishes an HTTPS connection to 4.sophosxl.net, which is the Sophos SXL4 server. It does that so that the proxy is available when a SXL4 query needs to be performed. To determine a proxy, it attempts to connect to the server using three methods in parallel: direct connection (no proxy), auto proxy detection (WPAD) and system default proxy (e.g. configured with netsh), and it chooses the first one that succeeds. **We have this KBA that might be useful in this case (Ingnore the fact that it's MCS mentioned) -https://www.sophos.com/support/knowledgebase/119263.aspx

    On startup, SSP also establishes a connection to ssp.feedback.sophos.com, which is the feedback server used for telemetry. For that it uses the same three methods of determining a proxy (direct connection, auto proxy detection and system default proxy). .

    If a connection to either of these servers cannot be established, SSP will retry periodically every 30 seconds. This can happen for example if no Internet connection is available, or if a proxy/firewall at the edge of the network blocks HTTPS traffic to these servers.

    To answer you questions (as best as I can).

    Can you explain why a machine with Sophos 10.3.15 has SSP logs on it if SSP is a feature of 10.6? I have actually found machines with SSP logs going back to February 2016, well before 10.6 was available.

    Without seeing the full sophos logs or even just the alupdate logs, I can't tell you exactly. But as a guess  maybe the machine was on a preview subscription and it was changed back? You will have found mentions of SSP in alupdate.log from before February, alupdate was aware of the component for a while and would look in the CID for SSP even before release, you would see this in the logs. If you really want an answer, PM me and I can take a look at your logs then we'll know.

    Have any Sophos customers experienced problems with connection speeds through their firewalls or millions of connection attempts by SSP.exe since the update to 10.6?

    Live protection will generate traffic, for best possible protection it should be on.We haven't seen a lot of cases for this. Allowing access out will alleviate some of the symptoms, for sure.

    How would we disable this service from the Enterprise Console? What feature do we need to turn off in the "Antivirus and HIPS" policy?

    You can't disable SSP from SEC. You could disable the service via GPO, but I absolutely wouldn't recommend it. Disabling the SSP service would prevent Malicious Traffic Detection, and File Download Reputation features from working.

  • Hi,

    Thanks for the detailed reply. I've bypassed authentication on the proxy for 4.sophosxl.net and  ssp.feedback.sophos.com, which I'm happy to do as it's likely only Sophos application traffic communicating with those domains.

    However, the traffic I am seeing blocked at the firewall is all to AmazonWS and this traffic stops instantly as soon as the "Sophos System Protection Service" is stopped and disabled on the monitored system.

    Are we expected to bypass proxy authentication for AWS as well?

  • No, our products will be connecting to the domains listed, not directly to Amazon EC host-names. 

    What you might be seeing is your Firewall inspecting the connection, seeing the IP the client is connecting to, performing a reverse lookup and the reverse lookup giving an EC compute hostname?

    Similar to:

    nslookup 4.sophosxl.net

    Non-authoritative answer:
    Name: 4.sophosxl.net
    Addresses: 52.31.86.186
    54.154.220.93
    54.246.238.203
    52.19.14.126
    54.229.220.139
    54.154.45.88
    52.30.36.55
    54.171.202.28

    ping -a 52.31.86.186

    Pinging ec2-52-31-86-186.eu-west-1.compute.amazonaws.com [52.31.86.186] with 32
    bytes of data:
    Request timed out.
    Request timed out.

    I'd be interested to know some more detail from your logs. Could you PM me your FW/UTM vendor and some log detail?

    Kind regards, 

    Craig

     

Reply
  • No, our products will be connecting to the domains listed, not directly to Amazon EC host-names. 

    What you might be seeing is your Firewall inspecting the connection, seeing the IP the client is connecting to, performing a reverse lookup and the reverse lookup giving an EC compute hostname?

    Similar to:

    nslookup 4.sophosxl.net

    Non-authoritative answer:
    Name: 4.sophosxl.net
    Addresses: 52.31.86.186
    54.154.220.93
    54.246.238.203
    52.19.14.126
    54.229.220.139
    54.154.45.88
    52.30.36.55
    54.171.202.28

    ping -a 52.31.86.186

    Pinging ec2-52-31-86-186.eu-west-1.compute.amazonaws.com [52.31.86.186] with 32
    bytes of data:
    Request timed out.
    Request timed out.

    I'd be interested to know some more detail from your logs. Could you PM me your FW/UTM vendor and some log detail?

    Kind regards, 

    Craig

     

Children
  • Hi,

    Sure. Will PM you now.

    Paul

  • Hi Craig,

    To return to the 4.sophosxl.net address returning as an Amazon AWS address, I get the following from an nslookup on our web filter:

    "DNS Lookup for 4.sophosxl.net (4.sophosxl.net) returns:    54.246.172.45    52.50.177.117    52.51.158.42    52.30.113.180    52.30.190.178    52.48.62.119    54.76.67.12    52.18.100.124"

    When I use MXToolbox.com to reverse lookup all of those IP addresses, they all come back as an amazonaws.com address.

    Similarly when I complete a DNS Lookup on MXtoolbox.com on "4.sophosxl.net" it returns completely different IP addresses:

    Is this all correct?

    Thanks

    Martin

  • That's all correct, it's a massive load balanced system, so it will return multiple AWS addresses.

    Best,

    Craig

  • Hi Craig,

    Sorry I thought you had said that these weren't actually Amazon addresses previously. So are you confirming that the sophosxl.net service is a load balanced system hosted on Amazon AWS servers?

    Is there a particular range or list of IP addresses that Sophos use for this? We have found that some of them are blocked by our web filtering software as it thinks they are a "peer-to-peer" connection.

    Thanks

    Martin

  • I am slowly getting angry.. another two days without any helpful update on this bug.

    I this the way Sophos cares for custumers? Especially in this case where the bug ist caused by a sophos antivirus product update

    in combination with an other sophos product (UTM) . Our companys suffers from an absolutely wrecked proxy, an there is literally no

    useful help... seriusly WTF? 

  • Hi, I PM'd you last week - I haven't had a reply.

  • How is the state of investigation? Can you confirm that this is a Proxy bug?

  • Do you have found  a solution for your environment? We are in the similar situation (the proxy server with authentication) and going to  disable ssp.exe via GPO

  • The only real solution would be a hotfix by Sophps for this  bug. But Sophos support is quite horrible as it seems they dont really care. We have been told to disable SSP or to rollback to an older Sophos release ^^.  What helped a litte was to redirect the traffic to the WAF by using a WPAD Proxy config. Seems to bee less cpu sonsuming if the WAF recieves the packages, but still not a suitabble solution in any way.

  • What I don't understand is, why isn't Sophos at least using the systems proxy settings?
    Sophos should implement the whole thing into the enterprise console and make it downloadable like the CIDs.
    Or better the message router forwards it to the server and the server asks for the information via proxy and send the reply back to the client. 
    Requesting direct internet Access for something like this just plain stupid and I don't think that is suitable for ANY business customers.
    Blocking ssp.exe via GPO is another thing. Manually manipulating the services of a security suite?
    THIS IS SOMETHING ONE SHOULD MANAGE THROUGH A GUI AKA (SEC).