Securing Greenfield Service Provider Clients
Matthias Luft
nanog at c7f.de
Fri Oct 9 19:46:43 UTC 2020
CJ,
On 09.10.20 15:09, Christopher J. Wolff wrote:
> Dear Nanog;
>
> Hope everyone is getting ready for a good weekend.� I�m working on a
> greenfield service provider network and I�m running into a security
> challenge.� I hope the great minds here can help.
>
> Since the majority of traffic is SSL/TLS, encrypted malicious content
> can pass through even an �NGFW� device without detection and classification.
>
> Without setting up SSL encrypt/decrypt through a MITM setup and handing
> certificates out to every client, is there any other software/hardware
> that can perform DPI and/or ssl analysis so I can prevent encrypted
> malicious content from being downloaded to my users?
>
> Have experience with Palo and Firepower but even these need the MITM
> approach.� I appreciate any advice anyone can provide.
I think this most likely needs to develop into a bigger discussion, but
TLS introspection will (and must, otherwise we would have big problems )
rely on a MITM setup.
DNS- and reputation-based filtering was already mentioned, there is also
this work on detecting malware aspects by TLS anomalies:
https://www.imperial.ac.uk/media/imperial-college/faculty-of-engineering/computing/public/1819-pg-projects/Detecting-Malware-in-TLS-Traf%EF%AC%81c.pdf
I'm not aware whether there are service provider network-grade tools for
this available though.
Thanks,
Matthias
More information about the NANOG
mailing list