<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Block Traffic Based Upon Countries Source. Vulnerability Protection and For a Specific Time Inte in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/block-traffic-based-upon-countries-source-vulnerability/m-p/75457#M41981</link>
    <description>&lt;P&gt;Blocking IP for informational events? Seems a bit harsh &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And do you have decryption rule for https traffic? Otherwise your IPS profile won't see much.&lt;/P&gt;</description>
    <pubDate>Wed, 30 Mar 2016 12:40:14 GMT</pubDate>
    <dc:creator>santonic</dc:creator>
    <dc:date>2016-03-30T12:40:14Z</dc:date>
    <item>
      <title>Block Traffic Based Upon Countries Source. Vulnerability Protection and For a Specific Time Interval</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-traffic-based-upon-countries-source-vulnerability/m-p/75453#M41979</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 20px;"&gt;My objective is block automatically traffic IP for a different time intervals Based upon Countries (Top attack) and applying a vulnerability profile.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 20px;"&gt;This is my Vulnerability Protection Profile and his rules:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Rules (1-3600 sec). I don't want block an IP for a long time.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1&amp;nbsp;&lt;EM&gt;test Critical1800&lt;/EM&gt;. Where 1800sec=30minutes&lt;/P&gt;
&lt;P&gt;2 &lt;EM&gt;test High&amp;nbsp;1200&lt;/EM&gt;. Where 1200sec=20minutes&lt;/P&gt;
&lt;P&gt;3 &lt;EM&gt;test Medium 900&lt;/EM&gt;. Where 900sec=15 minutes&lt;/P&gt;
&lt;P&gt;4 &lt;EM&gt;test Low 600&lt;/EM&gt;. Where 600sec=10 minutes&lt;/P&gt;
&lt;P&gt;5 &lt;EM&gt;test Informational 300&lt;/EM&gt;. &amp;nbsp; Where 300sec =&amp;nbsp;5minutes&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="8Z5bcjp" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/3270i84046C265495D58C/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="8Z5bcjp" alt="8Z5bcjp" /&gt;&lt;/span&gt;﻿&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="4KvzKau" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/3271iACAC92EB500C8E7A/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="4KvzKau" alt="4KvzKau" /&gt;&lt;/span&gt;﻿&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://cert.europa.eu/cert/filteredition/es/ThreatsStrategic.html" target="_blank"&gt;https://cert.europa.eu/cert/filteredition/es/ThreatsStrategic.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1sn4Sub" style="width: 301px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/3273i6F7B61AF61030239/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="1sn4Sub" alt="1sn4Sub" /&gt;&lt;/span&gt;﻿&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Security policies:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="UN5P1bt" style="width: 600px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/3274i39FC9A778EC6CB52/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="UN5P1bt" alt="UN5P1bt" /&gt;&lt;/span&gt;﻿&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What do you think? Do you think that it can work?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;dicu&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2016 11:46:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-traffic-based-upon-countries-source-vulnerability/m-p/75453#M41979</guid>
      <dc:creator>SOC_CSG</dc:creator>
      <dc:date>2016-03-30T11:46:30Z</dc:date>
    </item>
    <item>
      <title>Re: Block Traffic Based Upon Countries Source. Vulnerability Protection and For a Specific Time Inte</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-traffic-based-upon-countries-source-vulnerability/m-p/75457#M41981</link>
      <description>&lt;P&gt;Blocking IP for informational events? Seems a bit harsh &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And do you have decryption rule for https traffic? Otherwise your IPS profile won't see much.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2016 12:40:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-traffic-based-upon-countries-source-vulnerability/m-p/75457#M41981</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2016-03-30T12:40:14Z</dc:date>
    </item>
    <item>
      <title>Re: Block Traffic Based Upon Countries Source. Vulnerability Protection and For a Specific Time Inte</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-traffic-based-upon-countries-source-vulnerability/m-p/75469#M41990</link>
      <description>&lt;P&gt;&lt;SPAN style="line-height: 20px;"&gt;This doesn't seem so strict If we consider that only applies to top x countries sources attacks.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 20px;"&gt;If you apply this filter&amp;nbsp;( severity contains 'informational' ) displaying&amp;nbsp;109 threats. Host "client" 21 threats and Host "server" 88 threats.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 20px;"&gt;I think there&amp;nbsp;are important signature Host "server" with &lt;SPAN&gt;CVE-20xx-xxxx&amp;nbsp;&lt;/SPAN&gt;CVE-2015-xxxx and CVE-2016-xxxx:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 20px;"&gt;ID&amp;nbsp;37784&amp;nbsp;OpenSSL DTLS Handshake Memory Leak Vulnerability &amp;nbsp;CVE-2015-0206&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 20px;"&gt;ID 38924&amp;nbsp;SSL Version 2 Weak RSA Cipher Detected&amp;nbsp;CVE-2016-0800&amp;nbsp;CVE-2016-0703&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 20px;"&gt;We have a&amp;nbsp;&lt;SPAN&gt;decryption rule as you have said.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;dicu&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2016 13:52:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-traffic-based-upon-countries-source-vulnerability/m-p/75469#M41990</guid>
      <dc:creator>SOC_CSG</dc:creator>
      <dc:date>2016-03-30T13:52:40Z</dc:date>
    </item>
    <item>
      <title>Re: Block Traffic Based Upon Countries Source. Vulnerability Protection and For a Specific Time Inte</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-traffic-based-upon-countries-source-vulnerability/m-p/75540#M42014</link>
      <description>&lt;P&gt;This is an example of what I want to avoid:&lt;/P&gt;
&lt;P&gt;Source IP&amp;nbsp;200.0.90.90&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Destination Port 22&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tnN2VE8" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/3286i76CAF498EEB79C13/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="tnN2VE8" alt="tnN2VE8" /&gt;&lt;/span&gt;﻿&lt;/P&gt;
&lt;P&gt;As you can see I have a policy at the very bottom. &amp;nbsp;To me this means that the source IP 200.0.90.90 has performed a scan network to port 22. It also means that this IP has conducted a test to all other policies that I have above.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think if I applied what I posted probably detected as:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE width="757"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="43"&gt;ID&lt;/TD&gt;
&lt;TD width="546"&gt;Name&lt;/TD&gt;
&lt;TD width="70"&gt;Severity&lt;/TD&gt;
&lt;TD width="98"&gt;CVE&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;40015&lt;/TD&gt;
&lt;TD&gt;SSH User Authentication Brute-force Attempt&lt;/TD&gt;
&lt;TD&gt;High&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;38763&lt;/TD&gt;
&lt;TD&gt;OpenSSH Roaming Feature Information Disclosure Vulnerability&lt;/TD&gt;
&lt;TD&gt;Critical&lt;/TD&gt;
&lt;TD&gt;CVE-2016-0777&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;EM&gt;37496&lt;/EM&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;EM&gt;OzymanDNS SSH Traffic Evasion Applciation Detection&lt;/EM&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;EM&gt;Informatio&lt;/EM&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;37304&lt;/TD&gt;
&lt;TD&gt;Gitlab Ssh Key Upload Remote Command Execution Vulnerability&lt;/TD&gt;
&lt;TD&gt;High&lt;/TD&gt;
&lt;TD&gt;CVE-2013-4490&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;EM&gt;36213&lt;/EM&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;EM&gt;OpenSSH AES-GCM Auth Remote Code Execution Vulnerability&lt;/EM&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;EM&gt;Low&lt;/EM&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;EM&gt;CVE-2013-4548&lt;/EM&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;EM&gt;36212&lt;/EM&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;EM&gt;OpenSSH AES-GCM Auth Remote Code Execution Vulnerability&lt;/EM&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;EM&gt;Low&lt;/EM&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;EM&gt;CVE-2013-4548&lt;/EM&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;EM&gt;31914&lt;/EM&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;EM&gt;SSH2 Login Attempt&lt;/EM&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;EM&gt;Informatio&lt;/EM&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;30512&lt;/TD&gt;
&lt;TD&gt;Putty SSH Client transport layer protocol incorrect length field buffer overflow vulnearbility&lt;/TD&gt;
&lt;TD&gt;High&lt;/TD&gt;
&lt;TD&gt;CVE-2002-1359&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;30511&lt;/TD&gt;
&lt;TD&gt;SecureCRT SSH1 Identifier String Buffer Overflow Vulnerability&lt;/TD&gt;
&lt;TD&gt;Medium&lt;/TD&gt;
&lt;TD&gt;CVE-2002-1059&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;30509&lt;/TD&gt;
&lt;TD&gt;OpenSSH sshd Identical Blocks Denial of Service&lt;/TD&gt;
&lt;TD&gt;High&lt;/TD&gt;
&lt;TD&gt;CVE-2006-4924&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;30508&lt;/TD&gt;
&lt;TD&gt;SSH CRC-32 Compensation Attack Detector Vulnerability&lt;/TD&gt;
&lt;TD&gt;Critical&lt;/TD&gt;
&lt;TD&gt;CVE-2001-0144&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;30506&lt;/TD&gt;
&lt;TD&gt;FreeFTPD/FreeSSHD SSH Server Remote Buffer Overflow Vulnerability&lt;/TD&gt;
&lt;TD&gt;High&lt;/TD&gt;
&lt;TD&gt;CVE-2006-2407&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 20px;"&gt;The Source IP have bad reputation&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 20px;"&gt;&lt;A href="https://cymon.io/200.0.90.90" target="_blank"&gt;https://cymon.io/200.0.90.90&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.abuseipdb.com/report-history/200.0.90.90" target="_blank"&gt;https://www.abuseipdb.com/report-history/200.0.90.90&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;dicu&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2016 08:17:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-traffic-based-upon-countries-source-vulnerability/m-p/75540#M42014</guid>
      <dc:creator>SOC_CSG</dc:creator>
      <dc:date>2016-03-31T08:17:42Z</dc:date>
    </item>
    <item>
      <title>Re: Block Traffic Based Upon Countries Source. Vulnerability Protection and For a Specific Time Inte</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-traffic-based-upon-countries-source-vulnerability/m-p/75542#M42016</link>
      <description>&lt;P&gt;You've masked destination IP but yeah; I guess&amp;nbsp;&lt;SPAN&gt;200.0.90.90 &amp;nbsp;has performed port scan for port 22 (at least).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;But your action is set to 'drop' so this traffic will never hit any security profile (including IPS).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The only way this IP will be blocked by IPS is if you have port 22 open on one of your public servers and if the client triggers some IPS signature.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Better way to defend against this traffic is SYN-cookie and TCP port scan protectiion, both part of Zone Protection.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2016 08:40:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-traffic-based-upon-countries-source-vulnerability/m-p/75542#M42016</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2016-03-31T08:40:12Z</dc:date>
    </item>
    <item>
      <title>Re: Block Traffic Based Upon Countries Source. Vulnerability Protection and For a Specific Time Inte</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-traffic-based-upon-countries-source-vulnerability/m-p/75546#M42017</link>
      <description>&lt;P&gt;Hello Santonic&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I agree; For this traffic won't be applied an IPS(block) security profile . If this doesn't meet any of the security policies that allow.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- I have already&amp;nbsp;a protection zone profile.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I know this other way "Dynamic Block List".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;dicu&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2016 10:12:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-traffic-based-upon-countries-source-vulnerability/m-p/75546#M42017</guid>
      <dc:creator>SOC_CSG</dc:creator>
      <dc:date>2016-03-31T10:12:22Z</dc:date>
    </item>
    <item>
      <title>Re: Block Traffic Based Upon Countries Source. Vulnerability Protection and For a Specific Time Inte</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-traffic-based-upon-countries-source-vulnerability/m-p/75787#M42075</link>
      <description>&lt;P&gt;Hello again&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And how about if we implement for this design a honeypot system?&lt;/P&gt;
&lt;P&gt;Does anyone know if someone has implemented? e.g. Kippo&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.behindthefirewalls.com/2014/02/ssh-honeynet-kippo-kali-and-raspberry-pi.html" target="_blank"&gt;http://www.behindthefirewalls.com/2014/02/ssh-honeynet-kippo-kali-and-raspberry-pi.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.csoonline.com/article/2115901/data-protection/all-about-honeypots-and-honeynets.html" target="_blank"&gt;http://www.csoonline.com/article/2115901/data-protection/all-about-honeypots-and-honeynets.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;dicu&lt;/P&gt;</description>
      <pubDate>Tue, 05 Apr 2016 15:05:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-traffic-based-upon-countries-source-vulnerability/m-p/75787#M42075</guid>
      <dc:creator>SOC_CSG</dc:creator>
      <dc:date>2016-04-05T15:05:00Z</dc:date>
    </item>
  </channel>
</rss>

