Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

does SSLproxy forward the SSL decrypted traffic to NIDS (for example to a suricata server) for analyze? is possible? #34

Open
scdit46 opened this issue Oct 13, 2021 · 1 comment

Comments

@scdit46
Copy link

scdit46 commented Oct 13, 2021

does SSLproxy forward the SSL decrypted traffic to NIDS (for example to a suricata server) for analyze?
is possible?
ssl-decrypt

@sonertari
Copy link
Owner

If your NIDS is a passive IDS, then you can use the mirroring options in SSLproxy. So you can send decrypted (emulated) packets to an IDS. See the documentation for MirrorIf and MirrorTarget options. Note that for mirroring you can also use SSLsplit instead of SSLproxy.

If your NIDS is an active inline IPS, then you can use divert sockets support of your packet filter, such as the divert-packet rules in OpenBSD/pf. In fact, the UTMFW project configures pf with divert-packet rules to inspect the packets decrypted by SSLproxy and destined to UTM services. The configuration on UTMFW is for the loopback interface, but you can also divert decyrpted packets to a remote address, using the ua and ra proxyspec options, and then configure your IPS at that remote address to inspect those packets using divert sockets (but you may have to use a dummy listening program like lp in the sources, so that the listening program returns the packets to sslproxy listening on the ra address). See the README and other documentation for the related proxyspec options.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants