10-30-2009 12:31 PM - edited 03-10-2019 04:48 AM
10-30-2009 01:48 PM
With the ASA you can block using the MPF. Here's a config example for blocking P2P.
http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00808c38a6.shtml
10-30-2009 02:03 PM
Thinking about this some more, you can also block at your edge router using NBAR. Depending on your traffic levels and the router platform, that may not be feasible.
11-02-2009 05:52 AM
I'm not sure that the pix will block the tls encrypted traffic.(limewire/gnutella) Any suggestions for that?
11-02-2009 06:22 AM
It's encrypted?
11-02-2009 06:43 AM
Thats what they are reporting.
"Though the NIO Socket tutorial showed you how to connect to sockets and non-blocking transmit data across channels, you might want more security in the socket connections. Transport Layer Security, TLS, (http://en.wikipedia.org/wiki/Secure_Sockets_Layer) which provides secure communications on the Internet for data transfers is represented in the LimeWire NIO via the TLSNIOSocket class. "
11-02-2009 06:46 AM
Wow if it's encrypted at the Transport layer, there isn't much you can do. Does the application query limewire.com to get the seeders info? Maybe a packet capture will help in determining what the app initially does so you can block it.
11-02-2009 07:42 AM
I'm not about to start speaking for the signature team here at Cisco, but you can "sometimes" do something with encrypted data. Cisco IPS has had (technically still does) signatures that are based on traditional cryptographic traffic analysis. A packet capture is the place to start...preferrably under controlled conditions so that you can positively eliminate "other" traffic. In fact, a bunch of packet captures are usually better. Comparing all the captures, you have to look for patterns and trends. Things like predictable packet contents at certain offsets and packet exchange series of intermediate length, say 5 or 6 in each direction, for which there is some repeatable characteristic across all of the packet captures.
Lets say you find something, then what? Depending on what you find, you can write a series of Atomic IP or Multistring, or String TCP (to name the top 3) signatures and combine them using one or two layers of Meta. You might also be able to write a Service Generic signature (I wouldn't try this without Cisco's signature team's help). Ultimately, Cisco could hard code a signature into P2P (thats what that engine is for) that would directly process packets.
I realize this doesn't provide an answer to the topic's thread, but I thought I'd let you know that encryption doesn't automatically equate to impossible. It might, it might not...depends on how clever each side is ;-)
Scott Cothrell
Cisco IPS Dev.
11-02-2009 07:47 AM
Good to know Scott, thanks. I guess I was looking at it more from the firewall/router side as I'm still working on my IDS knowledge.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide