This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

PCI Compliance with connected REDs. Auto-fail. Sophos gave up.

We have a recorded instance of a Sophos XG (v17+) failing a PCI compliance scan (by a major provider) because they use RED appliances.   I asked if Sophos could provide me with mitigation policy or something I could give the PCI compliance vendor an exception basis.

Support eventually came back with:

Sophos RED communication is designed to use self-signed certificates between the XG and RED devices.  Self-signed certificates will fail/warn on PCI scans as they are not trusted.

We do not have a document to mitigate this design as there is no vulnerability with using self-signed certificates.

Now, the last sentence is laughable, but the concept that a firewall vendor can't make a PCI compliant hardware-accelerated VPN tunnel is mind boggling.



This thread was automatically locked due to age.
Parents
  • Self Signed Certificates can be just as trustworthy as publicly trusted certs. I have successfully got PCI Compliance agencies to accept the response/contestation and overrule their own fail and warn due to the nature that you are in control of the Certificate Authority that generates the certs.

    Support is correct in their response, there is no more vulnerability using a self signed certificate (generated by a self signed Certificate Authority) than there is one that is publicly trusted (with caveats). Hell, Comodo has had theirs compromised on numerous occasions and I don't see Comodo being flagged by PCI compliancy.

    PCI Compliancy is fairly ridiculously broad and some of their "warns/fails" and are as bad as PSN/OFSTED restrictions which have been made by those with little understanding of the system at hand.

    You can contest Self Signed Certificate issues as long as you can provide them information that you are in control of the CA, in this case, is Sophos (Sophos red.astaro.com IIRC) so therefore is a functional certification system.

    To label Sophos with inferred incompetency is unfair as it is the compliance scanning system that is incompetently flagging a warn/fail.

    The exception to the above is if a certificate is generated with no CA (fully self signed) then yes, it is unsafe for use because it cannot be revoked and if there is no way to validate the certificate with its CA. I believe the RED system complies with both.

     

    In response to TrustWaves request, the RED appliance can only establish a tunnel with the appliance holding that certificate and private key which was generated and provided as part of the provisioning service. The RED appliance will also only be set to connect to an target IP/DNS that also holds that Cert. This also means that the RED appliance will reject the connection if any form of interception on the path to the XG is done as it is a fixed variable.

    If they cannot accept this answer, I would recommend getting a statement from a Sales Engineer via the account manager on the operating principles of RED and why it is a secure connection. Tbh, the RED tunnel is as secure as using digital certificate security on an IPSEC site to site and they accept those for transfer. In fact they allow cardholder data to flow across an MPLS which is even less secure than IPSEC/RED

    However, it depends how you mean about cardholder data flowing through it?

  • I tried to get that information - but was only presented with the above information, which was like saying "trust me".

    Hence my frustration - and yes, I understand that some compliance organizations are simple knee-jerk reactions, but they're the ones put in charge of checking and the ones the customers have to answer to.  Like it or not, we have to play their game. 

    We are not given the opportunity to educate them about WHY they're wrong.  Just have to provide vendor information on why it's mitigated.

    I will forward your response along. 

    Thank you,

    John

  • I agree it's a massive pain in the butt. If you want to use my contestation i used last time, it was this:

    "Sophos RED tunnels are end to end encrypted Layer 2 tunneling devices that use strong AES encryption standard ensure data is secure with an appropriate hashing algorithm. The connection between the RED appliance at the remote aite and head office is secured using public-private key encryption using digital certificates to ensute that the RED device only connects to the head office Next Generation Firewall Appliance.

    This certificate is generated and distributed using Sophos internally trusted Certificate Authorities to ensure no public exposure risk. This certificate can be revoked by the appliance in use at any time.

    This system is as secure, if not more so, than an IPSEC site-to-site tunnel using digital certificate authentication to marry our remote site into head office.

    Added security from our RED box implementation is if the box is stolen then it will be automatically deauthorised to prevent compromisation."

    One of our customers has 23 shops all with card machines that run through a RED and this passed a contestation. If Trustwave do not accept that, ask what mitigation/security details they will accept and apeak to your partner/account manager.

    Hope that helps!

    Emile

  • On a side note, Support may not have the best knowledge in this area so would have been best going to engineers knowledgeable in this area. It was pretty poor show of them to brush off. Which team did you speak to?

  • Premier Partner Support.

    I have also provided the other information to our customer to send to TrustWave.  I appreciate your efforts at detailing the WHY.  I believe this is thorough enough for them and will put our customer at ease that this is a TrustWave issue, not a lack of security on Sophos part.

Reply
  • Premier Partner Support.

    I have also provided the other information to our customer to send to TrustWave.  I appreciate your efforts at detailing the WHY.  I believe this is thorough enough for them and will put our customer at ease that this is a TrustWave issue, not a lack of security on Sophos part.

Children
  • Happy to help!

    RED boxes are my most favourite feature of the UTM/XG and i have resolved many problems using a red from circumnavigating weird routing to assisting small offices for businesses who don't want to dish the cash for a bigger firewall because the beancounters are mean.

    The most I've ever deployed was over 60 in one sitting, after the first 7 i went out and got a usb barcode scanner because i couldn't be bothered to type the serial in!

    Fingers crossed you get better support in the future, support team access for partners got collateral damaged by a global change. So if you have problems not directly related to a broken box and are like this, i would recommend asking your account manager to put you in touch with a sales engineer to discuss the issue :)

    Emile

  • Thanks Emile.

    Our first exposure to the RED appliance was from a local sales rep which said they could/should be set as same subnet as LAN - as it's literally a REMOTE ETHERNET DEVICE.  I saw great possibilities for this with quite a few clients, then when trying to implement it - was told that wasn't how it was supposed to be setup.  So it was a huge disappointment. 

    But I've seen great performance increases with these compared to IPSec VPNs between firewalls.  So we'll keep using them where we can.

  • Hi John,

    You can do what the rep said, you have to bridge the virtual interface with your main LAN interface then make a LAN to LAN FW rule to allow traffic. I run a RED bridge off my home XG so I can use Steam In-Home Streaming when I am away on install and want to game using my desktop, not bad if your bandwidth is above 20/4.

    The problem is that because of the method of RED functionality, I think official support on this implementation is more "official" support. It's possible but would be a primary focus on any issues you face. I always recommend separate subnets for REDs because it's a more viable implementation :)

    Me too, I actually prefer RED over IPSEC on XG-XG or UTM-UTM (UTM to XG and XG to UTM gets dodgy)!

    Emile