Securing Greenfield Service Provider Clients

Matthias Luft nanog at c7f.de
Fri Oct 9 19:46:43 UTC 2020


CJ,

On 09.10.20 15:09, Christopher J. Wolff wrote:
> Dear Nanog;
> 
> Hope everyone is getting ready for a good weekend.� I�m working on a 
> greenfield service provider network and I�m running into a security 
> challenge.� I hope the great minds here can help.
> 
> Since the majority of traffic is SSL/TLS, encrypted malicious content 
> can pass through even an �NGFW� device without detection and classification.
> 
> Without setting up SSL encrypt/decrypt through a MITM setup and handing 
> certificates out to every client, is there any other software/hardware 
> that can perform DPI and/or ssl analysis so I can prevent encrypted 
> malicious content from being downloaded to my users?
> 
> Have experience with Palo and Firepower but even these need the MITM 
> approach.� I appreciate any advice anyone can provide.

I think this most likely needs to develop into a bigger discussion, but 
TLS introspection will (and must, otherwise we would have big problems ) 
rely on a MITM setup.

DNS- and reputation-based filtering was already mentioned, there is also 
this work on detecting malware aspects by TLS anomalies:
https://www.imperial.ac.uk/media/imperial-college/faculty-of-engineering/computing/public/1819-pg-projects/Detecting-Malware-in-TLS-Traf%EF%AC%81c.pdf

I'm not aware whether there are service provider network-grade tools for 
this available though.

Thanks,
Matthias


More information about the NANOG mailing list