<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Unencrypted SSL Traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unencrypted-ssl-traffic/m-p/710959#M87812</link>
    <description>&lt;P&gt;I have a IPS 4215 and receive serveral notification for Unencrypted SSL Traffic, sig ID = 6005. Does anybody have any ides on how to eliminate these event. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 10:25:02 GMT</pubDate>
    <dc:creator>siscisco05</dc:creator>
    <dc:date>2019-03-10T10:25:02Z</dc:date>
    <item>
      <title>Unencrypted SSL Traffic</title>
      <link>https://community.cisco.com/t5/network-security/unencrypted-ssl-traffic/m-p/710959#M87812</link>
      <description>&lt;P&gt;I have a IPS 4215 and receive serveral notification for Unencrypted SSL Traffic, sig ID = 6005. Does anybody have any ides on how to eliminate these event. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 10:25:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unencrypted-ssl-traffic/m-p/710959#M87812</guid>
      <dc:creator>siscisco05</dc:creator>
      <dc:date>2019-03-10T10:25:02Z</dc:date>
    </item>
    <item>
      <title>Re: Unencrypted SSL Traffic</title>
      <link>https://community.cisco.com/t5/network-security/unencrypted-ssl-traffic/m-p/710960#M87814</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have not had reports of false positives for this signature, at least none that I can recall. Is there a chance that there is some application that might be using the standard SSL port but sending unencrypted text in that connection?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It may help if you can enabled verbose alerts for that signature so we can begin to take a closer look.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it always the same attacker/victim pair, the same attacker or the same victim? Might there be anything unique about the host machines involved?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Jan 2007 12:35:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unencrypted-ssl-traffic/m-p/710960#M87814</guid>
      <dc:creator>wsulym</dc:creator>
      <dc:date>2007-01-11T12:35:38Z</dc:date>
    </item>
    <item>
      <title>Re: Unencrypted SSL Traffic</title>
      <link>https://community.cisco.com/t5/network-security/unencrypted-ssl-traffic/m-p/710961#M87817</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Public facing web servers will see this alert a lot. how this sig works is hidden, however...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the kids these days are trying http on just about every port, including 443. also, an apache web server configured for ssl on port 443 will respond to a non-ssl request with an HTTP 200 and an explaination of the problem.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Jan 2007 14:25:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unencrypted-ssl-traffic/m-p/710961#M87817</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2007-01-11T14:25:59Z</dc:date>
    </item>
  </channel>
</rss>

