Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

Cloud Visibility and Port Spoofing: The Known Unknown

Published 04/19/2023

Cloud Visibility and Port Spoofing: The Known Unknown

Originally published by Gigamon.

Written by Stephen Goudreault.

As with all technology, new tools are iterations built on what came before, and classic network logging and metrics are no different. Tooling, instrumenting, and monitoring of network traffic are virtually unchanged across the private cloud and on-premises. Many of the logs and metrics in use today are nearly two decades old and were originally designed to solve for billing, among other problems. Visibility into traffic flow patterns was an added bonus. Traffic logging just happens to be the use case that has endured. However, this reliance on established methods has left some vulnerabilities, as we discussed in a previous blog post on network and port spoofing.

What Is Port Spoofing, and Why Is It Important?

Like application and data visibility on the network, many rules and RFCs now in use were written over a decade ago and describe how something “should” work, but there are no real rules enforcing that. This provides a lot of flexibility for possible deployments that are rarely used. When an application or service is misconfigured or if a bad actor wants to evade detection, even the slightest changes to standard ports can hamper most current visibility and detection schemes. Port spoofing is a known technique, and MITRE ATT&CK has a whole category dedicated to this kind of evasion.

Example: Port Spoofing SSH

One of the most common and versatile examples of evading visibility is using Secure Shell (SSH) protocol on nonstandard ports. SSH is usually assigned to port 22. Security tools assume SSH traffic will use port 22, and nearly every security team in the world keeps that port tightly locked down. Common practice is to block this port at the perimeter and call things secure. Easy, right?

Not so fast.

Figure 1. Attacker is connecting via SSH from workload A to workload B in the same subnet.


Not Port 22, but Port 443

What if a bad actor changed the default port on their SSH traffic? Port 443 is widely used for HTTPS/TLS and is nearly always kept open. HTTPS traffic is ubiquitous in the modern enterprise, for both business-critical and personal activities. IT firewalls are not going to routinely block port 443/HTTPS, thus making it an ideal point of entry for attackers. Changing SSH to operate on 443 is a simple task. There are many forums that provide detailed instructions on legitimate and illegitimate reasons to do this. Almost all modern cloud visibility tools will report the traffic as what it appears to be, not what it actually is.

Figure 2. Screenshot of workload showing TLS on 443 instead of SSH on the cloud workload.

Even workloads in the cloud can misidentify their own connections. In the screenshot above, we see an active SSH session being misreported as TLS because the Linux OS assumes the type of connection based only on the port. The network gets it wrong, and the operating systems tools get it wrong as well by reporting this traffic as a known known.

The Problem as It Exists Today

Nearly all traffic is assessed by its TCP and UDP ports today. This leads to many assumptions as to the nature of the traffic. This is true in the public cloud, in private cloud, and on-prem. In today’s ever more security-conscious world, making assumptions about the nature of traffic isn’t as safe as it once was. SSH is a very powerful tool that threat actors can use for file transfers, tunneling, and lateral movement across any network. This is just one example of how a single tool can have many uses. Factor in other applications and protocols, and the realization of how much can’t be seen becomes daunting. MITRE has its own category for port spoofing, and the trend is only growing.

East-West Traffic Requires Deep Observability Too

Next-generation firewalls (NGFWs) have solved for this problem on-premises at perimeters points. The public cloud, however, is a different story, and this problem has yet to be solved at scale for East and West or laterally. VPC flow logs only record the conversations that took place along with the port number, without really knowing what application or protocol was in use. Deep observability with deep packet inspection investigates the conversation and can properly identify the applications and protocols in use.

Application Metadata Intelligence doesn’t just look at outer headers, it also looks deeper into the packet. We look deep into the unique characteristics of the packet that define a given application. We call this deep observability.

Figure 3. The attacker is connecting via SSH from workload A to workload B in the same subnet.


This depth of observability can be easily spanned East and West across your entire enterprise including the public cloud and container-to-container communications.

In the public cloud, deep packet inspection has a unique set of challenges. There is no broadcast, and to inspect traffic there either needs to be a security VPC to funnel traffic through or traffic mirroring. The second and less complicated option is to mirror the traffic to appropriate tools. The benefits include less deployment complexity and operational friction without impairing performance as an inline inspection path would.

The known knowns are that developers will continue to run fast, DevOps will inadvertently deploy unknown or misconfigured applications, and threat actors will continually seek to exploit these vulnerabilities to create blind spots. SecOps will try to verify rules and protections, which can only really be accomplished with deep observability with network-derived intelligence and insights. If you can’t detect a simple use case of SSH on a non-standard port, what other known unknowns could be lurking in your hybrid cloud infrastructure?

Share this content on your favorite social network today!