<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to Deny or Drop Replies in Allowed UDP Sessions in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-deny-or-drop-replies-in-allowed-udp-sessions/m-p/592859#M117996</link>
    <description>&lt;P&gt;Hi All,&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;I'm trying to address a hypothetical scenario where some solutions act only as listeners and do not need reply to the sender. &lt;BR /&gt;For example, a SIEM system listening on UDP port 514 does not reply to the log sender.&lt;/P&gt;
&lt;P&gt;In such a case, we configure rule as follows:&lt;BR /&gt;- Source: Log source&lt;BR /&gt;- Destination: SIEM server&lt;BR /&gt;- Service: UDP/514&lt;/P&gt;
&lt;P&gt;However, I’m concerned about a situation where the SIEM could be vulnerable, and an attacker could exploit the fact that all company devices have established sessions with the SIEM. This could allow the attacker to send malicious data back on the same session.&lt;/P&gt;
&lt;P&gt;Is there a way to configure the firewall to allow UDP sessions from the sender to the recipient but deny any replies from the recipient within the same session?&lt;/P&gt;
&lt;P&gt;I understand this doesn’t make sense for TCP due to the mandatory 3-way handshake, but my question is specifically about UDP.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
    <pubDate>Wed, 24 Jul 2024 06:24:03 GMT</pubDate>
    <dc:creator>RHC_Pa2020</dc:creator>
    <dc:date>2024-07-24T06:24:03Z</dc:date>
    <item>
      <title>How to Deny or Drop Replies in Allowed UDP Sessions</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-deny-or-drop-replies-in-allowed-udp-sessions/m-p/592859#M117996</link>
      <description>&lt;P&gt;Hi All,&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;I'm trying to address a hypothetical scenario where some solutions act only as listeners and do not need reply to the sender. &lt;BR /&gt;For example, a SIEM system listening on UDP port 514 does not reply to the log sender.&lt;/P&gt;
&lt;P&gt;In such a case, we configure rule as follows:&lt;BR /&gt;- Source: Log source&lt;BR /&gt;- Destination: SIEM server&lt;BR /&gt;- Service: UDP/514&lt;/P&gt;
&lt;P&gt;However, I’m concerned about a situation where the SIEM could be vulnerable, and an attacker could exploit the fact that all company devices have established sessions with the SIEM. This could allow the attacker to send malicious data back on the same session.&lt;/P&gt;
&lt;P&gt;Is there a way to configure the firewall to allow UDP sessions from the sender to the recipient but deny any replies from the recipient within the same session?&lt;/P&gt;
&lt;P&gt;I understand this doesn’t make sense for TCP due to the mandatory 3-way handshake, but my question is specifically about UDP.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 06:24:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-deny-or-drop-replies-in-allowed-udp-sessions/m-p/592859#M117996</guid>
      <dc:creator>RHC_Pa2020</dc:creator>
      <dc:date>2024-07-24T06:24:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to Deny or Drop Replies in Allowed UDP Sessions</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-deny-or-drop-replies-in-allowed-udp-sessions/m-p/592879#M118001</link>
      <description>&lt;P&gt;I'd first look at the likelihood of this happening:&lt;/P&gt;
&lt;P&gt;The attacker would need to be able to forge packets that use the same session parameters. Granted, for a sufficiently sophisticated attacker this should not be that difficult.&lt;/P&gt;
&lt;P&gt;The next step is that the firewall will perform several checks on the returning packet:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;App-ID where the firewall verifies if the packet being sent matches the expected behavior for the application. if the payload of the attacker's packet does not match the behavior of the app-id, it will be discarded&lt;/LI&gt;
&lt;LI&gt;Content-ID the returning packet will be scanned by the firewall's content engine and malware/vulnerabilities will be blocked&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;secondly, you could try to create a custom vulnerability that you set 'server2client' and trigger on any payload?&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 10:36:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-deny-or-drop-replies-in-allowed-udp-sessions/m-p/592879#M118001</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2024-07-24T10:36:46Z</dc:date>
    </item>
    <item>
      <title>Re: How to Deny or Drop Replies in Allowed UDP Sessions</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-deny-or-drop-replies-in-allowed-udp-sessions/m-p/592880#M118002</link>
      <description>&lt;P&gt;Thanks Dear,&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Yes, the scenario is unlikely.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;I don't know if I can create a custom vulnerability that matches any reply from specific server IP on UDP sessions.&lt;/P&gt;
&lt;P&gt;Is this possible?!&lt;BR /&gt;&lt;BR /&gt;Or can we override the stateful behavior on specific rule? so the reply for the connection will be already denied!?&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 10:52:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-deny-or-drop-replies-in-allowed-udp-sessions/m-p/592880#M118002</guid>
      <dc:creator>RHC_Pa2020</dc:creator>
      <dc:date>2024-07-24T10:52:27Z</dc:date>
    </item>
    <item>
      <title>Re: How to Deny or Drop Replies in Allowed UDP Sessions</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-deny-or-drop-replies-in-allowed-udp-sessions/m-p/593457#M118108</link>
      <description>&lt;P&gt;you can't change statefulness of the session&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i did think of another 2 'creative' hacks:&lt;/P&gt;
&lt;P&gt;1. you can attach that destination ip to it's own interface that has it's very own Virtual Router. on your default router you create a route that points to the other VR, but on the other VR you don't create a route back... that might work&lt;/P&gt;
&lt;P&gt;2. if you set up policy based forwarding you can punt packets towards your destination to the right interface, and then set a symmetric that points to a sinkhole IP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;both are 'hacks' so not entirely sure if they'll work as expected, but it's worth the try if this is important to you&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2024 08:00:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-deny-or-drop-replies-in-allowed-udp-sessions/m-p/593457#M118108</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2024-07-30T08:00:31Z</dc:date>
    </item>
  </channel>
</rss>

