File: README.ssl

package info (click to toggle)
snort 2.9.2.2-3
  • links: PTS, VCS
  • area: main
  • in suites: wheezy
  • size: 53,752 kB
  • sloc: ansic: 214,625; sh: 13,872; makefile: 2,574; yacc: 505; perl: 496; lex: 260; sql: 213; sed: 14
file content (118 lines) | stat: -rw-r--r-- 3,985 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
Overview
========

Encrypted traffic should be ignored by Snort for both performance reasons and
to reduce false positives.  The SSL Dynamic Preprocessor (SSLPP) inspects SSL
and TLS traffic and optionally determines if and when to stop inspection of it.

Typically, SSL is used over port 443 as HTTPS.  By enabling the SSLPP to
inspect port 443, only the SSL handshake of each connection will be
inspected.  Once the traffic is determined to be encrypted, no further
inspection of the data on the connection is made.

SSL Detection and Decoding
==========================

Each packet containing SSL traffic has an unencrypted portion that provides
some information about the traffic itself, and the state of the connection.
SSLPP uses this information to determine whether or not a handshake is 
occurring or if a handshake previously occurred.

By default, SSLPP looks for a handshake followed by encrypted traffic 
traveling to both sides.  If one side responds with an indication that 
something has failed, such as the handshake, the session is not marked as
encrypted.  Verifying that faultless encrypted traffic is sent from both 
endpoints ensures two things: the last client-side handshake packet was not 
crafted to evade Snort, and that the traffic is legitimately encrypted.

In some cases, especially when packets may be missed, the only observed 
response from one endpoint will be TCP ACKs.  Therefore, if a user knows that
server-side encrypted data can be trusted to mark the session as encrypted, the
user should use the 'trustservers' option, documented below.


Rule Options
============

SSLPP enables two new rule options: ssl_state and ssl_version.

The ssl_state keyword takes the following identifiers as arguments:

    client_hello
    server_hello
    client_keyx
    server_keyx
    unknown

The ssl_version keyword takes the following identifiers as arguments:

    sslv2
    sslv3
    tls1.0
    tls1.1
    tls1.2

More than one identifier can be specified, to either rule keyword, via a comma
separated list.  Lists of identifiers are OR'ed together, such that if any
of them match, the rule option will match.

The option will match if the connection is currently in any one of the OR'ed
states.  To ensure the connection has reached each of a set of states, multiple
rules using the ssl_state rule option should be used.

The rule options support negation.  Some examples:

    # Not client hello
    ssl_state:!client_hello;

    # server hello OR not client hello
    ssl_state:server_hello,!client_hello;

    # server hello AND not server key exchange
    ssl_state:server_hello; ssl_state:!server_keyx;

    # not sslv2
    ssl_version:!sslv2;

    # sslv3 and not sslv2
    ssl_version:sslv3; ssl_version:!sslv2;


Usage
=====

SSLPP supports the following options:

  ports                -   Space separated list of ports, enclosed in braces
    
  noinspect_encrypted  -   Disables inspection of encrypted traffic 
                            (default off)

  trustservers         -   Disables the requirement that both sides of 
                            Application data must be observed (default off)
                            This requires noinspect_encrypted to be useful.

For example, to make SSLPP observe ports 443 and 994, and if you trust the
servers to not be comprised or potentially malicious, use:

    preprocessor ssl: ports { 443 994 }, trustservers, noinspect_encrypted
       
By default, SSLPP listens on the following ports:

    443     HTTPS
    465     SMTPS   
    563     NNTPS   
    636     LDAPS
    989     FTPS        
    992     TelnetS 
    993     IMAPS
    994     IRCS        
    995     POPS

    Important note: Stream4 or Stream5 should be explicitly told to reassemble
                    traffic on these ports, or else the SSL preprocessor will
                    be trivially evadable.

    To add reassembly on port 443 to Stream5, use 'ports both 443' in the 
    Stream5 configuration.