- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
10-31-2019 02:08 AM
Hi all,
Since the moment we updated our threat database to 8204-5736 we see THOUSANDS of 'Tofsee TLS Fingerprint Detection' threat matches.
I assume they are false positives? Anyone else seeing the same?
It's skewing our monitoring stats significantly so I may need to create an exception.
Thanks.
11-06-2019 08:38 AM
For us, 8207_5750 was RELEASED at 20:53:04 EST and since we are set to update around midnight we still saw the Tofsee threat signatures occur until after the signature database was updated. This may have been what you saw? I agree though the signatures were too noisy to be released in the state they are in. But now that the Tofsee signature is gone, this content update released a nice new informational signature for "Non-RFC Compliant SSL Traffic on Port 443" that has begun acting up. Thus the circle of signature life continues..
11-06-2019 08:56 AM
@LRichman
Is that ( subtype eq spyware ) for the "Non-RFC Compliant SSL Traffic on Port 443"? Whats the signature ID for that?
I'm not seeing any hits for Non-RFC Compliant SSL Traffic on Port 443, but I would need to know what PAN is looking for for both signatures before I could determine why.
11-06-2019 09:06 AM
11-07-2019 01:31 AM
Hi all,
Just to confirm that our threat monitor has stopped logging the 30k+ alerts per hour for the Tofsee detection since the db update to 8207.
And I'm not seeing any problems with threat id 56112 as reported by LRichman (yet!)
11-07-2019 08:31 AM
The Tofsee storm has stopped for us as well. The weird thing was the updated applied and it appeared to take 2 hours for the threats to stop flagging, and thats on 7050 hardware. I'm just glad its over.
12-03-2019 01:56 PM
Are you still experiencing hits for "Non-RFC Compliant SSL Traffic on Port 443?" Threat ID 56112. I have seen a large uptick in this activity since Palo Alto updated the threat on 11-19-2019. Thanks.
12-03-2019 02:11 PM
We are still experiencing hits on that threat signature across multiple firewalls at this time. Due to the informational severity and recent holidays, I have not had a chance to investigate it much at all. I will probably end up opening a support case for clarification on this matter.
12-04-2019 12:45 AM
Yep, we're seeing continual 'Non-RFC Compliant SSL Traffic on Port 44' alerts too, but nothing like the volumes seen on the Tofsee threat.
04-26-2020 12:42 PM
I am seeing lots of alerts for
Name: Non-RFC Compliant SSL Traffic on Port 443
Unique Threat ID: 56112
to 31.13.70.50 which belongs to Facebook. However, the device (android mobile phone) that is causing the alerts does not have facebook app installed.
04-26-2020 02:54 PM
Hello
Few Non-RFC Complaint signatures that was introduced in late last year and non-RFC Compliant SSL Traffic on Port 443(56112) is one of them. Please note that the main aim behind the signature TID 56112 is to detect suspicious and non-RFC compliant SSL traffic on port 443 or applications sending non-SSL traffic using port 443 or indicate possible malicious activity.
You can capture the facebook traffic from the android device on your Firewall and check the traffic SSL protocol.
Best
Himani
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!