<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic h323-message-body values in Custom Signatures</title>
    <link>https://live.paloaltonetworks.com/t5/custom-signatures/h323-message-body-values/m-p/68702#M16</link>
    <description>&lt;P&gt;We seem to have a new h.225/h.323 scanning campaign going on that disturbs meetings. The strings that seem to be the same throughout are "productId: MERA RTU" and "versionId: 4.4.0-06a".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So I've tried two different methods of catching this traffic. Custom threat signatures and custom apps with the same pattern matched, but neither work. Here's a sample custom threat signature:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&amp;lt;vulnerability-threat version="6.1.0"&amp;gt;
  &amp;lt;entry name="42006"&amp;gt;
    &amp;lt;signature&amp;gt;
      &amp;lt;standard&amp;gt;
        &amp;lt;entry name="H323 productId MERA RTU"&amp;gt;
          &amp;lt;and-condition&amp;gt;
            &amp;lt;entry name="And Condition 1"&amp;gt;
              &amp;lt;or-condition&amp;gt;
                &amp;lt;entry name="Or Condition 1"&amp;gt;
                  &amp;lt;operator&amp;gt;
                    &amp;lt;pattern-match&amp;gt;
                      &amp;lt;pattern&amp;gt;\x4d45524120525455\x&amp;lt;/pattern&amp;gt;
                      &amp;lt;context&amp;gt;unknown-req-tcp-payload&amp;lt;/context&amp;gt;
                    &amp;lt;/pattern-match&amp;gt;
                  &amp;lt;/operator&amp;gt;
                &amp;lt;/entry&amp;gt;
              &amp;lt;/or-condition&amp;gt;
            &amp;lt;/entry&amp;gt;
          &amp;lt;/and-condition&amp;gt;
          &amp;lt;order-free&amp;gt;yes&amp;lt;/order-free&amp;gt;
          &amp;lt;scope&amp;gt;protocol-data-unit&amp;lt;/scope&amp;gt;
        &amp;lt;/entry&amp;gt;
      &amp;lt;/standard&amp;gt;
    &amp;lt;/signature&amp;gt;
    &amp;lt;default-action&amp;gt;
      &amp;lt;alert/&amp;gt;
    &amp;lt;/default-action&amp;gt;
    &amp;lt;threatname&amp;gt;H323 MERA Test 4&amp;lt;/threatname&amp;gt;
    &amp;lt;severity&amp;gt;high&amp;lt;/severity&amp;gt;
    &amp;lt;direction&amp;gt;client2server&amp;lt;/direction&amp;gt;
    &amp;lt;affected-host&amp;gt;
      &amp;lt;server&amp;gt;yes&amp;lt;/server&amp;gt;
    &amp;lt;/affected-host&amp;gt;
  &amp;lt;/entry&amp;gt;
&amp;lt;/vulnerability-threat&amp;gt;&lt;/PRE&gt;
&lt;P&gt;I've also tried matching with the versionId pattern (\x342e342e302d303661\x) or the word "MERA", both fail.&amp;nbsp;Any idea how to catch this with a signature?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here are the relevant parts of the pcap:&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/1378iBBEC906D419DC0E8/image-size/original?v=mpbl-1&amp;amp;px=-1" border="0" alt="Screenshot 2015-11-26 16.21.20.png" title="Screenshot 2015-11-26 16.21.20.png" /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've a case open with support, but our partner support can be slow...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Will&lt;/P&gt;</description>
    <pubDate>Thu, 26 Nov 2015 13:25:52 GMT</pubDate>
    <dc:creator>Froning</dc:creator>
    <dc:date>2015-11-26T13:25:52Z</dc:date>
    <item>
      <title>h323-message-body values</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/h323-message-body-values/m-p/68702#M16</link>
      <description>&lt;P&gt;We seem to have a new h.225/h.323 scanning campaign going on that disturbs meetings. The strings that seem to be the same throughout are "productId: MERA RTU" and "versionId: 4.4.0-06a".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So I've tried two different methods of catching this traffic. Custom threat signatures and custom apps with the same pattern matched, but neither work. Here's a sample custom threat signature:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&amp;lt;vulnerability-threat version="6.1.0"&amp;gt;
  &amp;lt;entry name="42006"&amp;gt;
    &amp;lt;signature&amp;gt;
      &amp;lt;standard&amp;gt;
        &amp;lt;entry name="H323 productId MERA RTU"&amp;gt;
          &amp;lt;and-condition&amp;gt;
            &amp;lt;entry name="And Condition 1"&amp;gt;
              &amp;lt;or-condition&amp;gt;
                &amp;lt;entry name="Or Condition 1"&amp;gt;
                  &amp;lt;operator&amp;gt;
                    &amp;lt;pattern-match&amp;gt;
                      &amp;lt;pattern&amp;gt;\x4d45524120525455\x&amp;lt;/pattern&amp;gt;
                      &amp;lt;context&amp;gt;unknown-req-tcp-payload&amp;lt;/context&amp;gt;
                    &amp;lt;/pattern-match&amp;gt;
                  &amp;lt;/operator&amp;gt;
                &amp;lt;/entry&amp;gt;
              &amp;lt;/or-condition&amp;gt;
            &amp;lt;/entry&amp;gt;
          &amp;lt;/and-condition&amp;gt;
          &amp;lt;order-free&amp;gt;yes&amp;lt;/order-free&amp;gt;
          &amp;lt;scope&amp;gt;protocol-data-unit&amp;lt;/scope&amp;gt;
        &amp;lt;/entry&amp;gt;
      &amp;lt;/standard&amp;gt;
    &amp;lt;/signature&amp;gt;
    &amp;lt;default-action&amp;gt;
      &amp;lt;alert/&amp;gt;
    &amp;lt;/default-action&amp;gt;
    &amp;lt;threatname&amp;gt;H323 MERA Test 4&amp;lt;/threatname&amp;gt;
    &amp;lt;severity&amp;gt;high&amp;lt;/severity&amp;gt;
    &amp;lt;direction&amp;gt;client2server&amp;lt;/direction&amp;gt;
    &amp;lt;affected-host&amp;gt;
      &amp;lt;server&amp;gt;yes&amp;lt;/server&amp;gt;
    &amp;lt;/affected-host&amp;gt;
  &amp;lt;/entry&amp;gt;
&amp;lt;/vulnerability-threat&amp;gt;&lt;/PRE&gt;
&lt;P&gt;I've also tried matching with the versionId pattern (\x342e342e302d303661\x) or the word "MERA", both fail.&amp;nbsp;Any idea how to catch this with a signature?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here are the relevant parts of the pcap:&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/1378iBBEC906D419DC0E8/image-size/original?v=mpbl-1&amp;amp;px=-1" border="0" alt="Screenshot 2015-11-26 16.21.20.png" title="Screenshot 2015-11-26 16.21.20.png" /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've a case open with support, but our partner support can be slow...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Will&lt;/P&gt;</description>
      <pubDate>Thu, 26 Nov 2015 13:25:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/h323-message-body-values/m-p/68702#M16</guid>
      <dc:creator>Froning</dc:creator>
      <dc:date>2015-11-26T13:25:52Z</dc:date>
    </item>
    <item>
      <title>Re: h323-message-body values</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/h323-message-body-values/m-p/68705#M17</link>
      <description>I just did a quick look and it looks like H323 also seems to use UDP so you might want to and the same pattern but the a udp context. I could be completely wrong though.</description>
      <pubDate>Thu, 26 Nov 2015 13:53:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/h323-message-body-values/m-p/68705#M17</guid>
      <dc:creator>murphyj</dc:creator>
      <dc:date>2015-11-26T13:53:45Z</dc:date>
    </item>
    <item>
      <title>Re: h323-message-body values</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/h323-message-body-values/m-p/68710#M18</link>
      <description>&lt;P&gt;Hello murphj,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The initial session setup is an h.225 connection on tcp/1720, which is where this value is found.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Will&lt;/P&gt;</description>
      <pubDate>Thu, 26 Nov 2015 14:27:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/h323-message-body-values/m-p/68710#M18</guid>
      <dc:creator>Froning</dc:creator>
      <dc:date>2015-11-26T14:27:19Z</dc:date>
    </item>
    <item>
      <title>Re: h323-message-body values</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/h323-message-body-values/m-p/68715#M19</link>
      <description>&lt;P&gt;I've reviewed some of the documentation available, and I don't believe we have any exposed contexts to make signatures for h225/h323 traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't believe attempting to match this as unknown-req-tcp-payload will work given that the traffic is likely being interpreted by the correct decoder and isn't technically "unknown."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A custom application may be possible; I have less experience here, but am willing to investigate when I return to the office on Monday.&amp;nbsp;If you attach a full packet capture, I can toy around with it in my lab to see what is possible?&lt;/P&gt;</description>
      <pubDate>Thu, 26 Nov 2015 16:25:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/h323-message-body-values/m-p/68715#M19</guid>
      <dc:creator>rcole</dc:creator>
      <dc:date>2015-11-26T16:25:58Z</dc:date>
    </item>
    <item>
      <title>Re: h323-message-body values</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/h323-message-body-values/m-p/68716#M20</link>
      <description>&lt;P&gt;Hello rcole,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for the reply.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This sounds about right. The PAN totally sees it as an h.225 app, and so it makes sense that it's not "unknown".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I didn't see a place to attach a file, so here's a link to dropbox:&amp;nbsp;&lt;A href="https://db.tt/Enpgfaz3" target="_self"&gt;h225-fw.pcap&lt;/A&gt;&amp;nbsp;It's not sanitized, but there's nothing you can't find out from a scan...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I tried setting up a custom app, but the signature options I saw were&amp;nbsp;the same. Hopefully, you'll have more success.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Will&lt;/P&gt;</description>
      <pubDate>Thu, 26 Nov 2015 17:54:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/h323-message-body-values/m-p/68716#M20</guid>
      <dc:creator>Froning</dc:creator>
      <dc:date>2015-11-26T17:54:16Z</dc:date>
    </item>
    <item>
      <title>Re: h323-message-body values</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/h323-message-body-values/m-p/68768#M21</link>
      <description>&lt;P&gt;Froning:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've verified your findings, and you are correct; it appears the exposed decoder contexts for custom applications are pretty much identical to the ones used in custom vulnerability signature creation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm not certain that with the currently exposed contexts we would be able to write a custom signature/app to match this traffic; if a way exists, I'm not seeing it. Can the scan be blocked by it's originating IP with a security policy?&lt;/P&gt;</description>
      <pubDate>Sat, 28 Nov 2015 15:00:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/h323-message-body-values/m-p/68768#M21</guid>
      <dc:creator>rcole</dc:creator>
      <dc:date>2015-11-28T15:00:23Z</dc:date>
    </item>
    <item>
      <title>Re: h323-message-body values</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/h323-message-body-values/m-p/68769#M22</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/28524"&gt;@rcole&lt;/a&gt; wrote:&lt;BR /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm not certain that with the currently exposed contexts we would be able to write a custom signature/app to match this traffic; if a way exists, I'm not seeing it. Can the scan be blocked by it's originating IP with a security policy?&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;At this point we've seen 230+ unique IPs with 10-15 new ones each day, so unfortunately blocking based on source IP isn't going to work. I have the pattern identified, which means&amp;nbsp;I can put something together, but the PAN is supposed to make my life easy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I appreciate you looking into this for me. I asked my partner support team to escalate the ticket to PAN, so hopefully we get something from them.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Will&lt;/P&gt;</description>
      <pubDate>Sat, 28 Nov 2015 16:33:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/h323-message-body-values/m-p/68769#M22</guid>
      <dc:creator>Froning</dc:creator>
      <dc:date>2015-11-28T16:33:00Z</dc:date>
    </item>
  </channel>
</rss>

