-
Notifications
You must be signed in to change notification settings - Fork 957
Improved Cisco VPN detection. #1534
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
* looks like TLS traffic, but seems related to Cisco VPN Signed-off-by: lns <[email protected]>
|
Kudos, SonarCloud Quality Gate passed!
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@utoni, could you give me some time before merging that, please?
Naturalmente. |
|
@utoni , thanks for your patience. I see the goal here: restore CiscoVPN classification for the flow I agree with that goal. However, what I don't really like is adding a (small) overhead to all the TLS flows, always looking for a CiscoVPN matching: it seems overkilling. This is my concern about that patch. Some thoughts about Anyconnect. First thing first: AFAIU, to use anyconnect you need a Cisco licence and I didn't find a lot of documentation, nor some other traces: therefore, I am not able to thoroughly test it. Looking at the code, this protocol is recognized via some patterns (and some ports):
Some words about the ports. No idea where 8008/8009 come from; the only official reference I found about 10000 is years old (https://community.cisco.com/t5/vpn/what-are-the-ports-used-by-cisco-vpn-client/td-p/260713) and it is about IPSEC over UDP (in that case the first bytes of the packets are always the SPI, i.e. some random number). The only reason nDPI seems to match some CiscoVPN flows is because (D)TLS dissector doesn't handle DTLS 1.0 (but only newer versions); If I add support for it, all these flows are classified as DTLS. Bottom line: CiscoVPN dissector is extremely weak in the first place and it seems to search only for mid-flows which are virtually identical to standard TLS/DTLS traffic. Maybe we are able to detect CiscoVPN if we have the initial TLS/DTLS handshakes but all bets seem off for mid-flows. After that rant (sorry!), I am not opposing this patch anyway: feel free to merge it, if you think it might be useful! |
So we need to find/create a decent pcap first to verify the dissector results.
Do you think that this small overhead may have measurable performance impacts?
So we will need help from someone who uses Cicsco and nDPI. Maybe someone from the community can help us here.
Agreed. I am in general not a friend of port based DPI. But I guess for proprietary applications it may work. Nevertheless, we need to get our hands on some real traffic, not that midstream nonsense.
In that case I would support the removal of that sus cisco dissector until we have some usable pcaps. |
|
Will close this PR and try something else. |
…ioned in PR ntop#1534. Signed-off-by: lns <[email protected]>
…ioned in PR ntop#1534. Signed-off-by: lns <[email protected]>
…ioned in PR ntop#1534. Signed-off-by: lns <[email protected]>
…ioned in PR #1534. (#1543) Signed-off-by: lns <[email protected]>
Signed-off-by: lns [email protected]