meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, October 19th 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 19 October 2016

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. #SSL/#SSH Confusion; #Dyre is Back; How Stolen iPhones are Unlocked;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, October 19th, 2016 edition of the Sands and the Storm Center's Stormcast.

0:07.7

My name is Johannes Ulrich, and the day I'm recording from Baltimore, Maryland.

0:12.0

Thanks to data submitted by a listener, we came across an interesting behavior of Windows 10 and certain types of proxies.

0:22.6

These proxies are different from normal proxies in the way that they are in front of

0:29.3

multiple servers that actually serve different protocols.

0:34.1

In this particular case, we do have an HTTP web server. We do have an SSH server

0:41.6

behind the same proxy listening on the same port. This is commonly done to be able to expose

0:48.7

multiple services on Port 443 if, for example, corporate networks only allow outbound port 443 traffic.

0:58.0

The proxy will receive the connection and then decide which one of the servers behind it is most appropriate to answer.

1:09.0

Now apparently what's happening here is that Windows 10 is rather

1:14.5

specific in its initial client hello. If you're connecting with Internet Explorer or Edge to a web

1:21.9

server, the first client Hello will only allow for TLS 1.2. If that fails, then it will allow anything between TLS1.0 and 1.2.

1:35.3

Now, in this particular case, if the web server behind that proxy doesn't support TLS 1.2,

1:42.3

then the proxy will actually forward the connection to the SSH server.

1:47.0

The very interesting observation that you'll end up with here is that you have a web browser connecting to what looks like to be a website,

1:56.0

but in return you're getting an SSH banner. Of course, in the Explorer will then reissue the client Hello in the version variable

2:04.6

way and the connection will succeed.

2:07.4

There will be a little bit of delay, but if you have an intrusion detection system that alerts

2:11.9

you on SH banners on odd ports, you will get an alert that you just connected to an SSH server on port

2:21.1

443, which is correct.

2:23.4

The one proxy that I was able to reproduce this behavior with is HA proxy.

2:28.7

There is a very similar proxy SSLH, which works similarly but seems to be dealing better with these TLS1.2 handshakes.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.