Network Firewall sometimes misses L7

0

Using AWS Network Firewall with one Suricata rule group in strict rule order, dropping established connections.

The firewall is in another VPC connected to main VPC using TGW (firewall VPC attachment is set to appliance mode)

Allowing TLS and HTTP towards the Internet is not enough as sometimes it misses the layer 7, seeing only TCP/443 or TCP/80.

rule group looks like this:

pass http 10.10.0.0/16 any -> any 80 (sid:1;)

pass tcp 10.10.0.0/16 any -> any 80 (sid:2;)

pass tls 10.10.0.0/16 any -> any 443 (sid:3;)

pass tcp 10.10.0.0/16 any -> any 443 (sid:4;)

If I'm not using rules 2 and 4 I get occasional drops and logs show no "app_proto" only TCP port.

This is just an example, this happens not only towards the Internet and not only for these L7 protocols also SSH for example.

  • it sometimes looks like this in the logs, when it seem to be the same session, when one record shows no app_proto, mostly the most recent log timestamp src_ip src_port dest_ip proto dest_port app_proto az 2022-02-20T11:15:24.000 10.10.0.225 45214 32.24.176.158 TCP 443 eu-west-1a 2022-02-20T11:15:24.000 10.10.0.225 45214 32.24.176.158 TCP 443 tls eu-west-1a 2022-02-20T11:15:24.000 10.10.0.225 45214 32.24.176.158 TCP 443 tls eu-west-1a 2022-02-20T11:15:24.000 10.10.0.225 45214 32.24.176.158 TCP 443 tls eu-west-1a and for some destinations it never gets the L7 protocol

1개 답변
0

Hi,

Currently AWS Network Firewall does not support TLS decryption. This is why you cannot identify what app is running on port 443.

Reference: https://aws.amazon.com/network-firewall/faqs/

** Q: Can AWS Network Firewall inspect encrypted traffic? **

AWS Network Firewall does not currently support deep packet inspection for encrypted traffic. To work around this limitation, you can decrypt traffic using a Network Load Balancer (NLB) before sending it to an AWS Network Firewall endpoint. Also, for HTTPS traffic, AWS Network Firewall can inspect the domain name provided by the Server Name Indicator (SNI) during the TLS handshake.

Best, Diego

AWS
전문가
답변함 2년 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인