How does Suricata handle encrypted traffic?

Started by Misterbister, September 02, 2018, 11:10:03 PM

Previous topic - Next topic
Hi!

I have been looking over documentation to try to understand how OPNsense and Suricata handles encrypted traffic. Can the IPS do anyting at all without decrypting it? I cannot find a place where I can add an intercept-ssl certificate in order to decrypt data streams.

Any insight is greatly appreciated.

Can I hope for any kind of protection even if the data streams remain encrypted?

Best regards

Jonas

My understanding is Suricata (and Snort) can only scan the unencrypted portion (headers) of HTTPS connections but not the actual payload itself. They would need some sort of decryption engine to decrypt the traffic and scan the payload, or perhaps some interface between the web proxy and IDS/IPS since the web proxy has the capability to decrypt HTTPS traffic using a MIM method.

The only protection I'm aware of for decrypted HTTPS traffic is with a virus scanner which OPNsense uses ClamAV.

Only works with Proxy but you need the CA trusted at the client



What about JA3 and JA3S fingerprinting or does this just came with Sensei ?

It can work with it, but this is the part which is not yet encrypted.

+ Is this is still tha state ?


It's not supported.  Suricata uses fingerprinting on encrypted traffic.  The packets are not opened, thus MITM is not happening.  In order to open encrypted traffic i.e. squid, the software would need a certificate authority and have it installed on the computer accessing it.  However, suricata does not have an area to instruct it to utilize a certificate authority.


ref.
https://forum.opnsense.org/index.php?topic=22772.0