@Sorin_Gogean wrote:
I might got confused 😊 but still, I would define FQDN objects for each FQDN required to be allowed ...
And you are aware of this.... The FQDN issue you refer is the fact that you would expect to have an object like *.endpoint.ingress.rapid7.com (with or without the *) that would cover whatever@#$@#$@#.endpoint.ingress.rapid7.com - and that is not correct. for that you need non-FQDN that does DNS and reverse DNS....
What you need ( and we do too for some traffic) is somethingA.endpoint.ingress.rapid7.com FQDN Object and somethingB.endpoint.ingress.rapid7.com and somother.endpoint.ingress.rapid7.com .
Those will match whatever cloud will respond for those 3 names somethingA/somethingB or somother on whatever protocol is used.
As you noted, yes I am aware and I stated this exact thing. "FQDN domain objects: Does not support wildcards. Must enter the exact FQDN for any possible host.subdomain.domain."
With that said, I was not clear however, that the vendor in this case does not document exactly what those hosts are. They simply provide the wildcard domain only. So this is not an option.
Also this question is not specifically about one vendor. That was just one example. This is becoming more problematic as more vendors move to large cloud providers so I'm trying to get a proper handle on it.
@Sorin_Gogean wrote:...
In response to What happens if the IP changes and/or the cloud provider provides different IPs as part of load balancing and/or geo-DNS? In short I see a potential caching problem with this method. for that particular connection will be allowed by the firewall, for new connections the detection process will be the same....
So in case it will happen once every month... so be it.... we can't have dynamic like we would really want.
Not so much worried about dynamic IPs, per se. I'm talking about static IPs that are part of some type of either DNS load balancer type situation. I've used such a service where the DNS server only responds with a single IP (of many) depending on which backend server is active at the time. This can change very frequently based on load. Alternatively Clouds also use region based failover where the DNS record could potentially completely change to another region/IP from either a load or outage perspective.
I can't have my firewall deny a connection because it hasn't yet resolved/cached the current IP in these scenarios.
@Sorin_Gogean wrote:
PS: I recommended URL/App because our Rapid7 servers talks to outside only 80/443 - therefore I assumed it's Rapid7 related only
Even though this extends further than Rapid7, I'm curious as to how you have your policy set up. My situation for this particular case, it's not just about a single Rapid7 server. We are deploying Rapid7 agents throughout our enterprise and these clients need to hit Rapid7 servers on the internet. The problem is I have protected networks that have no internet access so when we open this up we ONLY want those networks/servers to have access to Rapid7 servers ONLY.
If I'm using URL/App, I still have to set up a security policy to go along with it. So my question on what to do on the security side still applies. With that said though, as noted it's not just about Rapid7 and I have cases where systems need to do non-HTTP protocols to cloud hosted systems as well, so the URL/App filtering is not an option.