MALWARE AND CONTENT SCANNING

the course is saying that its recommended to use "Malware and content scanning" instead of "Filtering common web ports" So ive done some testing to check if malware will be blocked if i'll set only "malware and content scanning" unfortunately, files sended with no  problem. Ive attached screens from policy of FW rule and ssl/tls rule. Also ive added via Console non-standard port for https and ftp <- but ftp is a different story. 

 

 

BUT if im setting options below(screenshot) it does working. Tested malware are blocked and i can see it in the LOGS.

  • In reply to Roman klisiewicz:

    No one is able to scan encrypted traffic, if your running FTPS you will need to decrypt it first with SSL/TLS Inspection rules.

     

    Just tested myself with FTPS, XG with the new TLS engine has able to decrypt it and scan over it's default port (990).

    NO, I has wrong, XG doesn't scan decrypted FTPS, on v18 your able to decrypt it but not scan it, incredible.

  • In reply to Prism:

    Can someone open a support case?

    Of course a license is needed for that.

  • In reply to Prism:

    So i have to change the default port to 990. But other then that it will not scan it ;) BUG ?

  • In reply to Roman klisiewicz:

    The default port of FTP (Plain-Text) is 21, the default port of FTPS (TLS Encrypted) is 990.

    Why XG isn't scanning the decrypted FTPS traffic? I don't know. It probably doesn't support it right now.

     

    It's better for you to wait for a answer from a Sophos Employee.

     

    Roman klisiewicz
    So i have to change the default port to 990. But other then that it will not scan it ;) BUG ?

    XG doesn't recognize FTP or Decrypted FTPS on non-standard ports, if you can, run only on their default ports.

     

    Also the first issue you had with HTTPS traffic not being scanned with DPI - You need to create a Decrypt rule (LAN=>WAN) on the SSL/TLS Inspection tab. Or else it won't decrypt it.

     

    Thanks!

  • In reply to Prism:

    In theory, with the new DPI, http/s traffic on whatever port the traffic is running, it should be decrypted.

    Here we are talking about FTPS service, which uses TLS but the service is FTP and not HTTP/S.

    could you clarify?

    Thanks

  • In reply to lferrara:

    Interesting, i would say, with DPI, yes. 

    For HTTP/s on any Port, it works like this way. Now i am not sure, if the same applies for FTP. 

    But you run in other technical challenges. Is your FTP Client able to work with an Decryption Certificate? 

    Filezilla actually supports that, you could use a Switch to allow Man-in-the-Middle.

    Not sure about other FTP Clients. 

  • In reply to LuCar Toni:

    LuCar Toni
    But you run in other technical challenges. Is your FTP Client able to work with an Decryption Certificate? 

    Yes, it works!, If you enable TLS Decryption on XG most FTP clients will ask you if you trust the new certificate for the connection. Later on looking at logs you can successfully see that the TLS session has been decrypted.

    The problem here, XG It's not scanning the traffic. Its only scanning default plain-text FTP over port 21.

    On the log viewer and on the Flow Monitor, It doesn't even detect it as FTPS, It shows as TLS connection over non-standard port. While XG in the applications tab have FTPS as a detectable application.

     

    Thanks!

  • In reply to Prism:

    Can you please show how did ypu setup you fw policy for ftps traffic also rules for ssl/tls tondecrypt the traffic. ive got set it but cant get work regarding to decrypting traffic in logs. ;]

  • In reply to Prism:

    Prism,

    can you try to enable decrypt and scan on the firewall rule where you are allowing the FTPS traffic to see if the malware is detected?

    Thanks

  • In reply to lferrara:

    ofcourse ive have set it up but i cant detect any traffic on the rule.

     This is how service is configured. 

     And more detailed 

    ALSO FIREWALL RULE.

    Ticked A security features - maybe here must be selected sth else ?

  • In reply to lferrara:

    Hi Luk,

    Already tried this.

    FTPS traffic is decrypted but isn't scanned.

     

    Thanks!

  • In reply to Roman klisiewicz:

    I'm using FTPS on passive mode, TLS connection happens over Port 990.
     
    Data is transmitted over Ports 40100:40200.
     
     

     

    Thanks!

  • In reply to Prism:

    Please open a ticket with support and report the ID here.

    Regards

  • In reply to lferrara:

    I'm a Home User, the best I can do right now is wait for v18.5 and hope something change about how traffic is scanned on XG, Currently with the new DPI engine is only port agnostic for HTTP traffic, I hope it's fully port agnostic in the future.

    Also there's already an Idea, in Sophos Ideas for XG, for FTP scan on any port. The Idea has made in 2017.

    https://ideas.sophos.com/forums/330219-xg-firewall/suggestions/32248618-ftp-tracking

     

    FTP connections are currently only tracked on:

    SFVH_SO01_SFOS 18.0.0 GA-Build321# cat /etc/snort/etc/snort.conf | grep "run ftp servers on" -A 2
    # List of ports you run ftp servers on
    portvar FTP_PORTS [21,2100,3535]

     

    Thanks!