<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SFTP application inspection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/sftp-application-inspection/m-p/1099303#M896314</link>
    <description>&lt;P&gt;Does anyone know if the ASA5500 support  application inspection on SFTP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 13:45:02 GMT</pubDate>
    <dc:creator>gplouffe</dc:creator>
    <dc:date>2019-03-11T13:45:02Z</dc:date>
    <item>
      <title>SFTP application inspection</title>
      <link>https://community.cisco.com/t5/network-security/sftp-application-inspection/m-p/1099303#M896314</link>
      <description>&lt;P&gt;Does anyone know if the ASA5500 support  application inspection on SFTP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:45:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sftp-application-inspection/m-p/1099303#M896314</guid>
      <dc:creator>gplouffe</dc:creator>
      <dc:date>2019-03-11T13:45:02Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP application inspection</title>
      <link>https://community.cisco.com/t5/network-security/sftp-application-inspection/m-p/1099304#M896315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;====================&lt;/P&gt;&lt;P&gt;SFTP - FTP over SSH:&lt;/P&gt;&lt;P&gt;====================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SFTP (SSH File Transfer Protocol), sometimes called Secure File Transfer&lt;/P&gt;&lt;P&gt;Protocol is a network protocol that provides file transfer and&lt;/P&gt;&lt;P&gt;manipulation functionality over any reliable data stream. It is&lt;/P&gt;&lt;P&gt;typically used with version two of the SSH protocol (TCP port 22) to&lt;/P&gt;&lt;P&gt;provide secure file transfer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SFTP is **not** FTP run over SSH, but rather a new protocol designed&lt;/P&gt;&lt;P&gt;from the ground up by the IETF SECSH working group. The protocol is not&lt;/P&gt;&lt;P&gt;yet an Internet standard.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Port used: 22(TCP)&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall Perspective of SFTP-&lt;/P&gt;&lt;P&gt;-----------------------------&lt;/P&gt;&lt;P&gt;Now, this is a firewall friendly stuff, reason being, all communication&lt;/P&gt;&lt;P&gt;is happening over port 22 (TCP). Hence, depending on setup, don't need&lt;/P&gt;&lt;P&gt;to configure much on firewall-&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Server----I(ASA)O----client&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Server inside, client outside, normally, need to have static mapping for&lt;/P&gt;&lt;P&gt;the server and open port 22 to the server's mapped IP for traffic to&lt;/P&gt;&lt;P&gt;flow through.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;client----I(ASA)O----Server&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Client inside, server outside, just need to open outbound access and&lt;/P&gt;&lt;P&gt;client should be able to access SFTP server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FTP Inspection required: NO (Not a FTP protocol).&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Please check my next post.....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Sep 2008 20:12:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sftp-application-inspection/m-p/1099304#M896315</guid>
      <dc:creator>suschoud</dc:creator>
      <dc:date>2008-09-16T20:12:37Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP application inspection</title>
      <link>https://community.cisco.com/t5/network-security/sftp-application-inspection/m-p/1099305#M896316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;====================&lt;/P&gt;&lt;P&gt;FTPS - FTP over SSL:&lt;/P&gt;&lt;P&gt;====================&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;FTPS (S after FTP) is a super-set of the same FTP protocol, as it allows&lt;/P&gt;&lt;P&gt;for encryption of the connection over an SSL/TLS encrypted socket. There&lt;/P&gt;&lt;P&gt;are two modes this can be achieved-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i&amp;gt; Implicit FTPS&lt;/P&gt;&lt;P&gt;ii&amp;gt; Explicit FTPS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FTPS as a whole is not firewall friendly, refer to following scenarios&lt;/P&gt;&lt;P&gt;to understand why.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;------------------&lt;/P&gt;&lt;P&gt;(I) Implicit FTPS-&lt;/P&gt;&lt;P&gt;------------------&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;In Implicit FTPS, basically it is a SSL encrypting socket wrapped around&lt;/P&gt;&lt;P&gt;the entire communication from the point of connection initiation. To&lt;/P&gt;&lt;P&gt;separate this from normal FTP, IFTPS was assigned a standard port&lt;/P&gt;&lt;P&gt;990(TCP), compared to normal FTP which uses 21(TCP). Note that this mode&lt;/P&gt;&lt;P&gt;is far less common than the explicit mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&amp;gt; Inbound IFTPS Scenarios:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Server----I(ASA)O----client&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a) Inbound Implicit FTPS, Passive Client [####FAILS####]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client connects to server's public IP on port 990, authenticates over&lt;/P&gt;&lt;P&gt;TLS (AUTH command). After authentication for data protection, client&lt;/P&gt;&lt;P&gt;uses command PROT. After this client enters passive mode using PASV&lt;/P&gt;&lt;P&gt;command. When server receives PASV command, it generates a message in&lt;/P&gt;&lt;P&gt;which client is informed about the port it needs to connect to for data&lt;/P&gt;&lt;P&gt;transfer. However, server uses its own private IP address in the&lt;/P&gt;&lt;P&gt;communication and because this goes over encrypted session, firewall&lt;/P&gt;&lt;P&gt;cannot modify/translate the payload to the public IP of server. Hence,&lt;/P&gt;&lt;P&gt;client receives private IP address of the server and is unable to&lt;/P&gt;&lt;P&gt;connect for data connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inspection Required: No, will not help anyways.&lt;/P&gt;&lt;P&gt;Can we make this work through ASA: No (Opening all the ports to the&lt;/P&gt;&lt;P&gt;server will not make this work).&lt;/P&gt;&lt;P&gt;Workaround: Use Active client, see below.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;b) Inbound Implicit FTPS, Active Client [####WORKS####]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client connects to server public IP on port 990, authenticates over TLS&lt;/P&gt;&lt;P&gt;(AUTH). After authentication for data protection uses command PROT, then&lt;/P&gt;&lt;P&gt;client sends a PORT command over the encrypted session. Server&lt;/P&gt;&lt;P&gt;calculates the port to which it needs to connect to the client and&lt;/P&gt;&lt;P&gt;initiates the connection to the port from source-port TCP/989&lt;/P&gt;&lt;P&gt;(ftps-data), in normal FTP port TCP/20 (ftp-data). Outbound connection&lt;/P&gt;&lt;P&gt;works fine because, by default outbound traffic is permitted on ASA.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Inspection Required: No.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&amp;gt; Outbound IFTPS Scenarios:&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;client----I(ASA)O----Server &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a) Outbound Implicit FTPS, Active Client [####FAILS####]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client connects to server public IP on port 990, authenticates over&lt;/P&gt;&lt;P&gt;TLS(AUTH). After authentication for data protection uses command PROT,&lt;/P&gt;&lt;P&gt;then client sends a PORT command over the encrypted session. However,&lt;/P&gt;&lt;P&gt;because this PORT command is being sent over encrypted session, server&lt;/P&gt;&lt;P&gt;receives a Private IP address of the Client. Due to this, server is&lt;/P&gt;&lt;P&gt;unable to initiate data connection to the Client and FTP fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inspection Required: No, will not help anyways.&lt;/P&gt;&lt;P&gt;Can we make this work through ASA: No (Opening all the ports to the&lt;/P&gt;&lt;P&gt;server will not make this work).&lt;/P&gt;&lt;P&gt;Workaround: Use Active client, see below.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;b) Outbound Implicit FTPS, Passive Client [####WORKS####]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client connects to server public IP on port 990, authenticates over&lt;/P&gt;&lt;P&gt;TLS(AUTH). After authentication for data protection uses command PROT.&lt;/P&gt;&lt;P&gt;After this client enters passive mode using PASV command. When server&lt;/P&gt;&lt;P&gt;receives PASV command, it generates a message in which client is&lt;/P&gt;&lt;P&gt;informed about the port it needs to connect to for data transfer. Client&lt;/P&gt;&lt;P&gt;calculates this port and initiates a outbound connection on this new&lt;/P&gt;&lt;P&gt;port and establishes SSL connection for data transfer. As this is an&lt;/P&gt;&lt;P&gt;outbound connection, everything works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inspection Required: No.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please check my next post........&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Sep 2008 20:14:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sftp-application-inspection/m-p/1099305#M896316</guid>
      <dc:creator>suschoud</dc:creator>
      <dc:date>2008-09-16T20:14:07Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP application inspection</title>
      <link>https://community.cisco.com/t5/network-security/sftp-application-inspection/m-p/1099306#M896317</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;(II) Explicit FTPS-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Soon after FTPS was in use some smart people decided it would be best if&lt;/P&gt;&lt;P&gt;we could have an FTP server that could support unencrypted as well as&lt;/P&gt;&lt;P&gt;encrypted connections, and do it all over the same port. To accommodate&lt;/P&gt;&lt;P&gt;this the "explicit" FTPS protocol connection begins as a normal&lt;/P&gt;&lt;P&gt;unencrypted FTP session over FTP's standard port 21. The client then&lt;/P&gt;&lt;P&gt;explicitly informs the server that it wants to encrypt the connection by&lt;/P&gt;&lt;P&gt;sending an "AUTH TLS" command to the server. At that point the&lt;/P&gt;&lt;P&gt;FTPS-enabled server and the client begin the SSL or TLS handshake and&lt;/P&gt;&lt;P&gt;further communications happen encrypted. Note that most (if not all)&lt;/P&gt;&lt;P&gt;explicit FTPS servers can be optionally configured to require&lt;/P&gt;&lt;P&gt;encryption, so it will deny clients that attempt to transfer data&lt;/P&gt;&lt;P&gt;unencrypted. Often this can be configured on a user by user basis.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;-&amp;gt; Inbound EFTPS Scenarios:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Server----I(ASA)O----client&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a) Inbound Explicit FTPS, Passive Client [####FAILS####]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client connects to server public IP on port 21, authenticates over&lt;/P&gt;&lt;P&gt;TLS(AUTH). After authentication for data protection uses command PROT.&lt;/P&gt;&lt;P&gt;After this client enters passive mode using PASV command. When server&lt;/P&gt;&lt;P&gt;receives PASV command, it generates a message in which client is&lt;/P&gt;&lt;P&gt;informed about the port it needs to connect to for data transfer.&lt;/P&gt;&lt;P&gt;However, server uses its own private IP address in the communication and&lt;/P&gt;&lt;P&gt;because this goes over encrypted session, firewall cannot&lt;/P&gt;&lt;P&gt;modify/translate the payload to the public IP of server. Hence, client&lt;/P&gt;&lt;P&gt;receives private IP address of the sever and is unable to connect for&lt;/P&gt;&lt;P&gt;data connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can we make this work through ASA: Yes. See details below-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If client in this scenario are capable of using CCC (Clear channel&lt;/P&gt;&lt;P&gt;command), the FTP client connects to the server, negotiates a secure&lt;/P&gt;&lt;P&gt;connection, authenticates (sends user and password) and reverts back to&lt;/P&gt;&lt;P&gt;plaintext(control-channel). Next, enable FTP inspection. Now, when&lt;/P&gt;&lt;P&gt;server responds with the port client needs to connect to, firewall would&lt;/P&gt;&lt;P&gt;be able to intercept it and translate IP address in payload and also&lt;/P&gt;&lt;P&gt;open the connection accordingly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: Not all FTP clients/servers might support CCC command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inspection Required: Yes, along with CCC command from client.&lt;/P&gt;&lt;P&gt;Workaround: See above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;b) Inbound Explicit FTPS, Active Client [####WORKS####]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client connects to server public IP on port 21, authenticates over&lt;/P&gt;&lt;P&gt;TLS(AUTH). After authentication for protection uses command PROT, then&lt;/P&gt;&lt;P&gt;client sends a PORT command over the encrypted session. Server&lt;/P&gt;&lt;P&gt;calculates the port to which it needs to connect to the client and&lt;/P&gt;&lt;P&gt;initiates the connection to the port from source-port 20 (ftp-data).&lt;/P&gt;&lt;P&gt;Outbound connection works fine because, by default outbound traffic is&lt;/P&gt;&lt;P&gt;permitted on ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inspection Required: No.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&amp;gt; Outbound EFTPS Scenarios:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;client----I(ASA)O----Server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a) Outbound Explicit FTPS, Active Client [####FAILS####]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client connects to server public IP on port 21, authenticates over TLS.&lt;/P&gt;&lt;P&gt;After authentication for protection uses command PROT P, then client&lt;/P&gt;&lt;P&gt;sends a PORT command over the encrypted session. However, because this&lt;/P&gt;&lt;P&gt;PORT command is being sent over encrypted session, server receives a&lt;/P&gt;&lt;P&gt;Private IP address of the Client. Due to this, server is unable to&lt;/P&gt;&lt;P&gt;initiate data connection to the Client and FTP fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can we make this work through ASA: Yes, see explanation of workaround&lt;/P&gt;&lt;P&gt;for "Inbound Explicit FTPS, Passive Client"&lt;/P&gt;&lt;P&gt;Inspection Required: See "Inbound Explicit FTPS, Passive Client"&lt;/P&gt;&lt;P&gt;Workaround: See "Inbound Explicit FTPS, Passive Client"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;check the next and the last post to answer ur question.....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Sep 2008 20:15:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sftp-application-inspection/m-p/1099306#M896317</guid>
      <dc:creator>suschoud</dc:creator>
      <dc:date>2008-09-16T20:15:50Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP application inspection</title>
      <link>https://community.cisco.com/t5/network-security/sftp-application-inspection/m-p/1099307#M896318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;b) Outbound Explicit FTPS, Passive Client [####WORKS####]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client connects to server public IP on port 21, authenticates over TLS.&lt;/P&gt;&lt;P&gt;After authentication for protection uses command PROT P. After this&lt;/P&gt;&lt;P&gt;client enters passive mode using PASV command. When server receives PASV&lt;/P&gt;&lt;P&gt;command, it generates a message in which client is informed about the&lt;/P&gt;&lt;P&gt;port it needs to connect to for data transfer. Client calculates this&lt;/P&gt;&lt;P&gt;port and initiates a outbound connection on this new port and&lt;/P&gt;&lt;P&gt;establishes SSL connection for data transfer. As this is an outbound&lt;/P&gt;&lt;P&gt;connection, everything works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inspection Required: No.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate if helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sushil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Sep 2008 20:16:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sftp-application-inspection/m-p/1099307#M896318</guid>
      <dc:creator>suschoud</dc:creator>
      <dc:date>2008-09-16T20:16:13Z</dc:date>
    </item>
  </channel>
</rss>

