07-02-2017 08:13 AM - edited 03-12-2019 06:26 AM
I have set up a lab with a fully licensed ASA+FP device in front of a TLS enabled SMTP server. Created a rule to decrypt SSL traffic using its own certificate+key, to a set of TCP ports to this SMTP server IP address. I also turned on file detection and SSL decryption on the ACL policies applied in the device. IPS/NAP policies are the default Balanced ones.
However when I email the EICAR file to an account on this server, I have no records on FMC that this file went thru. I was expecting, as FMC records a malware entry when I download the EICAR file from a web server, to have an entry recorded for the SMTP session as well.
Anyone could provide me more info on this?
Last but not least, I fully understand the performance limitations and impact of such scenario.
Appreciated for any hints/guidance.
07-03-2017 01:58 AM
Are you seeing a connection event at all? If not, make sure the routing is via the ASA and that the ASA class-map / policy-map redirects the traffic to the module.
If so, then what does it show?
07-03-2017 04:48 AM
I do see all the connection events being logged whenever the remote server talks to my internal SMTP server, so routing does not seems to be an issue.
I can see on the connection events basically a confirmation that all my rules are applied and matched, however the mail client still receives the eicar file.
[Edit] attached a picture instead of a clunky table - easier on the eyes.
[Edit 2] seems I forgot a few keywords on my OP. The file inspection do record a malware entry found during the HTTP transfer of the eicar file, but not from a SMTP attachment. This makes a world of a difference from my original question. Updating it accordingly to be clear should anyone else browses it.
07-03-2017 06:27 AM
I see the logic and would think it should all do as you originally intended.
This is a good question and I have sometimes wondered about the distinction myself - i.e., "If I have AMP for Networks on the FirePOWER device or module then why do I also need AMP licensing on an ESA?".
I'm moving this thread into the FirePOWER forum in hopes that one of the Cisco TAC staff who monitor that forum will chime in with an answer.
07-03-2017 08:06 AM
Hi Alexandre,
I've no idea why you your sensor is not intercepting the malware, but if were you I try to make things simple: have you tried to send the same attachement from a non SSL enabled mail server, in order to exclude decryption from the equation?
07-03-2017 08:56 AM
Hello Massimo.
Yes, I did. It does not change anything. See below for a plain SMTP session (no STARTTLS) output. And yet, FMC has the packets listed in the Connection Events, but no Malware has been recorded by the Files dashboard.
3 10:36:30.00 INFO: Opening connection to (mx.example.com) port (25)
3 10:36:30.00 <-- 220 *****************************************************
3 10:36:30.00 --> ehlo me.com
3 10:36:30.00 <-- 250-mx.example.com Hello netwin.netwinsite.com [198.1.73.205], pleased to meet you
3 10:36:30.00 <-- 250-ENHANCEDSTATUSCODES
3 10:36:30.00 <-- 250-PIPELINING
3 10:36:30.00 <-- 250-8BITMIME
3 10:36:30.00 <-- 250-SIZE
3 10:36:30.00 <-- 250-DSN
3 10:36:30.00 <-- 250-ETRN
3 10:36:30.00 <-- 250-AUTH DIGEST-MD5 CRAM-MD5
3 10:36:30.00 <-- 250-STARTTLS
3 10:36:30.00 <-- 250-XXXXXXXXA
3 10:36:30.00 <-- 250 XXXB
3 10:36:30.00 --> mail from:<hquest@example.com>
3 10:36:30.00 <-- 250 2.1.0 <hquest@example.com>... Sender ok
3 10:36:30.00 --> rcpt to:<hquest@example.com>
3 10:36:31.00 <-- 250 2.1.5 <hquest@example.com>... Recipient ok
3 10:36:31.00 --> DATA
3 10:36:31.00 <-- 354 Enter mail, end with "." on a line by itself
3 10:36:31.00 --> From: hquest@example.com
3 10:36:31.00 --> To: hquest@example.com
3 10:36:31.00 --> x-test-header: Test message from http://reputation-email.com
3 10:36:31.00 --> Mime-Version: 1.0
3 10:36:31.00 --> Content-Type: application/octet-stream;
3 10:36:31.00 --> Content-Disposition: attachment; filename="eicar.com";
3 10:36:31.00 --> Subject: Test message from reputation-email.com - EICAR test virus attached
3 10:36:31.00 -->
3 10:36:31.00 --> X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
3 10:36:31.00 --> .
3 10:36:31.00 <-- 250 2.0.0 v63FaU5D098202 Message accepted for delivery
3 10:36:31.00 --> quit
3 10:36:31.00 <-- 221 2.0.0 mx.example.com closing connection
07-03-2017 09:09 AM
Can you see the file transfer logged in Analysis/files/file events/table view?
07-03-2017 09:13 AM
Nope. I have a .jar file but not the SMTP attachments.
07-03-2017 09:20 AM
Sorry if I ask, but are sure that smtp protocol is enabled in your file policy for the right direction?
07-03-2017 09:37 AM
07-03-2017 09:41 AM
That's access policy, can you check file policy also?
07-03-2017 09:46 AM
Sorry, I missed file policy in your previous post.
If file policy is the same applied to http traffic afaik it should work, have you considered to open a tac case?
07-03-2017 09:53 AM
What about rule 2?
That rule seems to match any kind of traffic, that way rules 3 and 4 should never been matched.
Have tried to disable it?
07-03-2017 12:11 PM
Rule #2 is a monitor; it logs all traffic and moves down for next rules to be processed. Rule #3 is HTTP/HTTPS traffic only, so SMTP moves down to the next rule. Earlier I've posted another screen capture showing both monitor and mail inspection rules being matched, so I'm pretty certain the rules are being parsed and processed, however the attachment is not being detected/understood.
I will have a TAC case submit and will update later what the outcome is. Thanks anyway for your suggestions.
07-03-2017 02:36 PM
Well, so far good news and bad news.
The good news is, my rules are spot on for what I need.
The bad news is, TAC needs to research why FP is not finding the malware on SMTP traffic. And IMAP traffic. And POP3. Encrypted or not...
More to come.
Thanks again for all the suggestions.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide