<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Passive FTP traffic (TCP/30200 - 30220) causing multiple IPS false positives in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Passive-FTP-traffic-TCP-30200-30220-causing-multiple-IPS-false/m-p/190555#M31935</link>
    <description>&lt;P&gt;Thanks Timothy, I think this will be what we do. Another incident happened yesterday, this time a new protection "VMware Multiple Products NAT Service Buffer Overflow".&lt;/P&gt;&lt;P&gt;I've requested a list of systems from the customer that are using this vsftpd on this port range, so that we can tighten it up like you say. I was hoping to only apply it to 3 or 4 protections, for a while it seemed to be only triggering these, but as we see yesterday new ones are popping up still.&lt;/P&gt;&lt;P&gt;We have got a TAC case open too and have provided some pcaps, so we will see if that helps also.&lt;/P&gt;</description>
    <pubDate>Fri, 25 Aug 2023 09:03:45 GMT</pubDate>
    <dc:creator>Parabol</dc:creator>
    <dc:date>2023-08-25T09:03:45Z</dc:date>
    <item>
      <title>Passive FTP traffic (TCP/30200 - 30220) causing multiple IPS false positives</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Passive-FTP-traffic-TCP-30200-30220-causing-multiple-IPS-false/m-p/190152#M31855</link>
      <description>&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;Hi all,&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;We have an unusual problem at the moment where we've had multiple different IPS false positive incidents in the past 1-month. Each time we have reactively added an IPS exception for the systems involved, but the frequency of the occurrences is very concerning.&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;In all instances, the traffic involved is TCP/30200-30220. The systems involved are using&amp;nbsp;vsftpd (a Unix/Linux FTP server application) to transfer data, and the passive ports are defined as such:&lt;/FONT&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;pasv_min_port: 30200&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;pasv_max_port: 30220&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;The main protection triggering has been - &lt;STRONG&gt;Malicious Payload Encoding Remote Code Execution&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;But it has also triggered:&lt;/FONT&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;Ipswitch WS_FTP Server commands buffer overflow denial of service&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;Internet Explorer FTP Response Parsing Memory Corruption (MS07-016)&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Obviously we could change the protection behavior to detect or inactive, but this isn't ideal for us from a security view.&lt;/P&gt;&lt;P&gt;Has anybody else observed anything similar? Our solution at the moment is reactively added exceptions, but this isn't sustainable if it keeps continuing with new systems, and new protections.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Although one thing I've noticed is that all the triggered protections have a "Medium confidence", and so is this just an expected byproduct of enabling such protections?&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2023 13:55:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Passive-FTP-traffic-TCP-30200-30220-causing-multiple-IPS-false/m-p/190152#M31855</guid>
      <dc:creator>Parabol</dc:creator>
      <dc:date>2023-08-22T13:55:14Z</dc:date>
    </item>
    <item>
      <title>Re: Passive FTP traffic (TCP/30200 - 30220) causing multiple IPS false positives</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Passive-FTP-traffic-TCP-30200-30220-causing-multiple-IPS-false/m-p/190159#M31857</link>
      <description>&lt;P&gt;Cant say I ever experienced this in R80+, but, just wondering, how is your IPS profile configured? Is it set to optimized (default) policy? Personally, in the meantime, maybe try doing below?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/22168i5FBDFDF575725AD5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2023 14:14:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Passive-FTP-traffic-TCP-30200-30220-causing-multiple-IPS-false/m-p/190159#M31857</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-08-22T14:14:36Z</dc:date>
    </item>
    <item>
      <title>Re: Passive FTP traffic (TCP/30200 - 30220) causing multiple IPS false positives</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Passive-FTP-traffic-TCP-30200-30220-causing-multiple-IPS-false/m-p/190188#M31860</link>
      <description>&lt;P&gt;Unless you can determine the precise reason for the falses you are kind of stuck, and doing so will require a TAC case.&lt;/P&gt;
&lt;P&gt;My guess is that these Medium Confidence protections have a fairly short set of bytes they are pattern matching for and that sequence of bytes happens to be showing up in your data streams occasionally.&amp;nbsp; &amp;nbsp;Not perfect from a security perspective, but you could add an IPS blade-based exception only matching your passive ports like this, I was hoping to find a way to confine this exception only to FTP protocol traffic but that doesn't appear possible (you can try setting protocol FTP on the range object but I'm pretty sure that won't work).&amp;nbsp; If you can tighten up the exception's source and/or destination to only internal networks or only those that use vsftpd that would be helpful:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ips_exception.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/22171i1685A73E43BE9BC6/image-size/large?v=v2&amp;amp;px=999" role="button" title="ips_exception.png" alt="ips_exception.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2023 19:19:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Passive-FTP-traffic-TCP-30200-30220-causing-multiple-IPS-false/m-p/190188#M31860</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-08-22T19:19:39Z</dc:date>
    </item>
    <item>
      <title>Re: Passive FTP traffic (TCP/30200 - 30220) causing multiple IPS false positives</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Passive-FTP-traffic-TCP-30200-30220-causing-multiple-IPS-false/m-p/190555#M31935</link>
      <description>&lt;P&gt;Thanks Timothy, I think this will be what we do. Another incident happened yesterday, this time a new protection "VMware Multiple Products NAT Service Buffer Overflow".&lt;/P&gt;&lt;P&gt;I've requested a list of systems from the customer that are using this vsftpd on this port range, so that we can tighten it up like you say. I was hoping to only apply it to 3 or 4 protections, for a while it seemed to be only triggering these, but as we see yesterday new ones are popping up still.&lt;/P&gt;&lt;P&gt;We have got a TAC case open too and have provided some pcaps, so we will see if that helps also.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2023 09:03:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Passive-FTP-traffic-TCP-30200-30220-causing-multiple-IPS-false/m-p/190555#M31935</guid>
      <dc:creator>Parabol</dc:creator>
      <dc:date>2023-08-25T09:03:45Z</dc:date>
    </item>
  </channel>
</rss>

