Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Ntopng SSLv3 and TLSv1.0

    Scheduled Pinned Locked Moved Traffic Monitoring
    11 Posts 4 Posters 3.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      dbennett
      last edited by

      Greetings!

      First off, LOVE this package!  I turn to it often.  But…  I'm concerned with a Qualys Guard scan report we recently did.

      Without going into details about the report, the only real concerns pointed to ntopng.  Specifically SSL and TLS versions that were allowed.

      Is there any tweaking that can be done to the configs so that I can limit which type of SSL / TLS versions are used?

      If not, is the next version going to resolve these vulnerabilities?  If the answer is no, that will be a great disappointment given that I'll have to remove it from our FWs.

      Looking forward to your answer.

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by

        In respect to your other thread talking about vulnerabilities your scanning from outside pointed out… Why would you have this open to the public internet anyway?

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        1 Reply Last reply Reply Quote 0
        • D
          dbennett
          last edited by

          Actually, I don't have it open (entirely) to the public, just for the scanning (Qualys) and then I disable the rule when the scanning is done.  If I don't allow the scans to penetrate, results show that they are being prevented from scanning OR that the target doesn't exist which violates the compliance level we wish to maintain.

          So the port 3000 isn't actually allowed via the WAN but their scans are incredibly thorough.

          Also, the two involves different hosts.  This post covers all my FW but the other one only involves a non production FW that we test configs on prior to production deployments.

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by

            "If I don't allow the scans to penetrate"

            What??  BS where did you get that information?? Now if you created a specific rule that BLOCKED their IP then that would be an invalid test.  But if this is suppose to be an assessment what is open/vulnerable from the public internet.. You sure and shit shouldn't create rules that give them more access then what your normal rules allow for.  If you don't allow ping, then they can not freaking even ping you, etc.

            If you created specific rules that gave access to wan that is different than your normal rules then the whole test is just BS…

            Are you saying you modified your wan rules that ALLOW access that is locked to specific IP/Ranges to include their IP?  That might have legit use, but to be honest not a real test of anything.  If I say had a rule that allowed my remote site to hit my vpn port.. And you allowed them to hit the port for their scan..  And they came back and said hey that vpn is open to xyz.. Ok might be of some value - but you have to take into account that only specific IP abc can even talk to it, so from a security assessment you would have to take that into consideration, etc.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            1 Reply Last reply Reply Quote 0
            • D
              dbennett
              last edited by

              Point taken and in the context that it was read, extremely valid.

              The scanning isn't to prove that the firewall works.  That is entirely different scanning and conversation.  The scanning that I'm performing right now is for Vulnerabilities, Malware, and SSL/TLS issues.  a.k.a; If the attack did penetrate (which our first scans show we were pretty good there), what would attackers have to work with from the inside which everyone should assume is the most vulnerable.

              Lastly, I was sold on Qualys in the past and my evaluations now haven't changed that.  The next level of evaluations has a virtual appliance that does the scanning from the inside out so NO rule manipulation needs to happen on the firewall.  But to get to that next step, I needed proof for the higher ups that the time spent would be worth it.

              I respect your post because I'm on the forum enough (can't say a lot but…) to know that you have posted to a number of 'not so bright' individuals that don't know what their doing.  Me, I would like to believe that I'm doing pretty good with what I've learned thus far AND that I've got a HECK of a lot more to learn (and I can't wait).

              So...  with ALL that said, and that I believe for the most part my WAN  and  DMZ are locked down pretty good, what are my options to limiting access to only the most secure versions SSL / TLS on ntopng?

              1 Reply Last reply Reply Quote 0
              • KOMK
                KOM
                last edited by

                Create an OpenVPN instance and then view your metrics through the secure connection.  Never expose your firewall internals on WAN.

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  I have used Qualys many times over the years for many different companies.. Have gone through multiple audits for security… Never do I recall or for that matter doing anything to the wan rules!!  Opening up the wan rules like that is not a valid test by any means..

                  I can understand scanning for vulnerabilities.. Have used qualys for this and nessus, now tenable, etc..  Scanning for vulnerabilities after you have opened the ports to expose something is not a valid test.. It just isn't in what context does it make sense to do that.  If your saying someone has already gained access to your firewall what is the point in saying that the redis your running on it is not current?  Your already F'd ;)

                  If you have the web gui exposed and they say hey your SSL version is bad.. Ok then..  But if its not exposed then its moot...

                  Now if they scan it from one of your local networks and tell you hey this is bad, then sure you need to mitigate that..  You either update the something, or patch it.  Or lock it down to limited access.. Like a management machine would be the only machine able to access the web gui, etc.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 0
                  • D
                    dbennett
                    last edited by

                    Scans.  No Scans.  How I came about finding out that an older insecure version of SSL/TLS is being used is moot.  The fact that its true isn't.

                    Are there plans in future versions of ntopng to make it more secure?  More specifically removing the option to use the less secure versions of SSL/TLS.

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      From my understanding from this
                      https://github.com/pfsense/FreeBSD-ports/pull/172

                      It uses the same settings as your webgui.. You can for sure used to be able to edit what the webgui uses in the /etc/inc/system.inc back prior to nginx.. I have not looked into changing this since back in march.. Here
                      https://forum.pfsense.org/index.php?topic=107775.0

                      When I scan my pfsense webgui for ssl I don't see it present ssl3 or tls 1..  What are you saying is not secure in presented ciphers?

                      
                      > sslscan pfsense.local.lan
                      Version: 1.11.0 Windows 64-bit (Mingw)
                      OpenSSL 1.0.2 22 Jan 2015
                      
                      Testing SSL server pfsense.local.lan on port 443
                      
                        TLS renegotiation:
                      Session renegotiation not supported
                      
                        TLS Compression:
                      Compression disabled
                      
                        Heartbleed:
                      TLS 1.2 not vulnerable to heartbleed
                      TLS 1.1 not vulnerable to heartbleed
                      TLS 1.0 not vulnerable to heartbleed
                      
                        Supported Server Cipher(s):
                      Preferred TLSv1.2  256 bits  ECDHE-RSA-AES256-GCM-SHA384   Curve P-256 DHE 256
                      Accepted  TLSv1.2  128 bits  ECDHE-RSA-AES128-GCM-SHA256   Curve P-256 DHE 256
                      Accepted  TLSv1.2  256 bits  DHE-RSA-AES256-GCM-SHA384     DHE 4096 bits
                      Accepted  TLSv1.2  128 bits  DHE-RSA-AES128-GCM-SHA256     DHE 4096 bits
                      Accepted  TLSv1.2  256 bits  ECDHE-RSA-AES256-SHA384       Curve P-256 DHE 256
                      Accepted  TLSv1.2  256 bits  ECDHE-RSA-AES256-SHA          Curve P-256 DHE 256
                      Accepted  TLSv1.2  256 bits  DHE-RSA-AES256-SHA256         DHE 4096 bits
                      Accepted  TLSv1.2  256 bits  DHE-RSA-AES256-SHA            DHE 4096 bits
                      Preferred TLSv1.1  256 bits  ECDHE-RSA-AES256-SHA          Curve P-256 DHE 256
                      Accepted  TLSv1.1  256 bits  DHE-RSA-AES256-SHA            DHE 4096 bits
                      
                        SSL Certificate:
                      Signature Algorithm: sha512WithRSAEncryption
                      RSA Key Strength:    4096
                      
                      Subject:  pfsense.local.lan
                      Altnames: DNS:pfsense.local.lan, IP Address:192.168.9.253, DNS:pfsense.wlan.local.lan, IP Address:192.168.2.253
                      Issuer:   pfsense-ca
                      
                      Not valid before: Jul  9 10:41:16 2016 GMT
                      Not valid after:  Jul  7 10:41:16 2026 GMT
                      
                      

                      Now I do use my own cert and not self signed but this really wouldn't have anything to do with it.  So what exactly are the issues with the ssl/tls that seeing.  Guess I could install the ntop package and take a look see.  But from that above pull ssl/tls was even available before and they adjusted it to use the same settings as the webgui.

                      edit: So need to find out if ntop package is using same as the webgui.  I just tested the webugi from outside with qualys.. Now clearly they are not going to trust my selfsigned.. But notice the A rating if you don't take into account the lack of trust.  To do so had to allow 443 into my wan rules..

                      certwebgui.jpg
                      certwebgui.jpg_thumb

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 0
                      • dennypageD
                        dennypage
                        last edited by

                        Ntopng runs its own web engine on port 3000, separate from the pfSense ui. I expect the issue of obsolete protocols will be resolved when the ntopng version moves to 2.4.

                        Regardless of what protocol and encryption is being used, one should not assume that the ntopng interface is secure. Under no circumstance should it be exposed to the internet.

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          "Under no circumstance should it be exposed to the internet."

                          Exfreackingactly!!!

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.