This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Why "*.discordapp.com" is on the Managed TLS Exclusion List on v18?

Hi,

 

Nowadays there's lot's of malware going through discord, I would like to know why "discordapp[.]com" is on the Managed TLS Exclusion List.

Currently the DPI Engine of v18 is capable of fully decrypting the connection, of course with the XG CA installed on the machine, so It doesn't make sense having it on the exclusion list. Can we at least be able to edit that list?

 

Here's an example of a malware being sent over discord:

Be careful opening this link, It has been identified as "Troj/Bbindi-W".

https :// cdn [.] discordapp [.] com/attachments/ 14836703273025566/ 714838662537281616/ nexo.exe

 

Since the domain has on the exclusion list, the malware passed through XG without any issue, there has already a SSL/TLS Decrypt Rule in place over the machine that accessed this domain.

 

Thanks!



This thread was automatically locked due to age.
Parents
  • Hi together,

    I ended up in removing the managed list from the exclusions and build my own specific ones, one for Apple or MS as they contain many domains and the standard local exclusion list for some specific domains/apps etc. which can easily be done in the log viewer.

    These are the reasons for my decision:

    - The managed list contains many world-wide domains and services I will never ever use. The list will grow continuously and probably adds an overhead in terms of performance.

    - There are already some examples in the list that don't make sense, e.g. apple.com is excluded which will contain all subdomains anyway. But some *.apple.com subdomains were added to the list as well... (?)

    - As your example with discord shows: The list is sometimes not really necessary. E.g. I haven't noticed any problems using adobe, citrix, vmware or aws, yet - although the list would exclude them.

    - I'm simply interested in this stuff from a security and web architecture perspective and as long as this is manageable with little time I happy with it.

    Best Regards

    Dom

  • Apple introduce and remove so many sub-domains under the .apple.com FQDN that it's impossible not to exclude the whole thing - as they have new services, new update servers go love, some get removed, it's hard to keep track.

    Tim Grantham

    Enterprise Architect & Business owner

Reply
  • Apple introduce and remove so many sub-domains under the .apple.com FQDN that it's impossible not to exclude the whole thing - as they have new services, new update servers go love, some get removed, it's hard to keep track.

    Tim Grantham

    Enterprise Architect & Business owner

Children
No Data