Solved

AVG Updates on DMZ

Posted on 2013-01-01
11
1,263 Views
Last Modified: 2013-11-22
Screen shot of identified network objects inside updates groupThe environment:  Retail locations (PCI-DSS applicable) Point of Sale registers running Windows XP OS segmented onto a DMZ.  Each register runs a Kaseya agent with End Point Security  (AVG antivirus).  Each location has a SonicWall TZ 215 appliance.

I am having issues updating the AVG installs on the registers.  My DMZ rules allow HTTP access to predestinated websites only (2 commerce processing sites and AVG).  I quickly discovered the initial AVG update site was inadequate, so I created an AVGUpdateSites network address object and then grouped various update sites (other network address objects) that the log files were showing AVG was trying to access.

I'm up to 15 different update sites now and have some fourth level domain transport companies (e.g. akamaitechnogies.com, nlayer.net, etc...) that seem to change daily.  I need to allow access for all of these AVG update sites and block everything else.

I'm looking for ideas of how to better skin this cat.  Still haven't spoken to anyone at AVG that even knew they were using these dynamic sites.  Attached is a pic of the sites I've currently identified.  It shows a few different attempts at the 3rd and 4th level domain attempts - none work.
0
Comment
Question by:HoneyFarms
  • 4
  • 3
  • 2
  • +1
11 Comments
 
LVL 20

Expert Comment

by:carlmd
ID: 38736137
Take a look at these two links. They pertain to the free version, but may help.

http://free.avg.com/faq.num-2416#faq_2416

http://free.avg.com/faq.num-2419#faq_2419
0
 

Author Comment

by:HoneyFarms
ID: 38736308
Thanks, but no.  I guess I'm really looking for how I can allow for akamai's and nlayer's dyamic third and fourth level domain name changes.  SonicWall doesn't support wildcards at that level - won't resolve.
0
 
LVL 20

Expert Comment

by:carlmd
ID: 38736333
This link contains a list of what is supposed to be "all" the sites you need to permit a connection to. Have you permitted all of these?

http://free.avg.com/us-en/faq.num-2446#faq_2446
0
Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

 
LVL 63

Expert Comment

by:btan
ID: 38736408
Just to add on, looks like different AVG version (below are the commercial versions) may have different list to be put into exception for Sonicwall to allow

2013 - http://www.avg.com/ww-en/faq.num-5229
2011 - http://www.avg.com/ww-en/faq.num-3487
0
 
LVL 39

Expert Comment

by:Aaron Tomosky
ID: 38736961
For the Akamai you have do do each level with a star.
*.akamai.com
*.something.akamai.com
*.5.something.akamai.com

The * will do anything except a subdomain.
0
 

Author Comment

by:HoneyFarms
ID: 38745303
Thanks for the responses, but the objects have to be IP host addresses, IP range, IP network or a resolvable FQDN, which rules out the wildcards.  When you ping the URL's listed on the referenced pages, you end up with a list of IP addresses that represent less than 30% of the total addresses and ranges I've discovered through firewall logs today.  Everything I force an update to the AVG agents I get new sites being blocked.  I account fo rthose sites, update again, and get new blocks.  There has to be a inclusive list somewhere.

Any other ideas?  Thanks!
0
 
LVL 63

Expert Comment

by:btan
ID: 38746304
See this http://www.experts-exchange.com/Virus_and_Spyware/Anti-Virus/Q_23957383.html

just curious as I saw some sonicwall config guide on address object accepting wildcard, maybe I am missing out something

http://help.sonicwall.com/help/sw/eng/6800/25/8/1/Network_netObjView.html

...If you selected FQDN , enter the domain name for the individual site or range of sites (with a wildcard) in the FQDN field.

....FQDN Address Objects support wildcard entries, such as “*.somedomainname.com”, by first resolving the base domain name to all its defined host IP addresses, and then by constantly actively gleaning DNS responses as they pass through the firewall.
0
 

Author Comment

by:HoneyFarms
ID: 38746750
Yeah, I thought the same thing.  I opened a ticket with SonicWall and they confirmed that wildcards used in network address objectives won't resolve.  For poops and giggles I added it back to a store and forced an update.  Attached is a pic from the log showing it won't resolve.  Wish I could.  I already added the reefernced sites to the matrix and still got the same results.
fqdn.jpg
0
 
LVL 63

Expert Comment

by:btan
ID: 38746875
Looks like if the firewall cannot perform the DNS lookup the ip cannot be resolved. Suspecting that browsing to that dynamic DNS site is not possible at all as well...most AV uses such so that update server is always available. Minimally the nslookup or dig should return the ip address though it changes subsequently...try robtex or domain dossier on the host to see the possible ip address.

Sigh - http://serverfault.com/questions/376794/i-need-to-create-a-special-rule-on-my-firewall-with-all-the-ip-addresses-from-fa

I did saw some innovative ways but tough
http://michigantelephone.wordpress.com/2011/06/28/using-dyndns-to-solve-the-problem-of-keeping-a-firewall-open-to-remote-users-at-changeable-ip-addresses/
0
 
LVL 39

Expert Comment

by:Aaron Tomosky
ID: 38746960
I personally use * in fqdn fields and. It works just fine. However I do have DNA setup so it can resolve them.
0
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 38748147
if you will to see the sonicwall link in my post, it did state SonicOS Enhanced 3.5 stating below [1] and it also added more [2]. You may want to ask them on "Sanctioned DNS server" - see section "Enforcing the use of sanctioned servers on the network". Definition [3]

[1]"...FQDN – Fully Qualified Domain Names, such as ‘www.reallybadWebsite.com’, will be resolved to their IP address (or IP addresses) using the DNS server configured on the SonicWALL. Wildcard entries are supported through the gleaning of responses to queries sent to the sanctioned DNS servers...."

[2]Since most DNS servers do not allow zone transfers, it is typically not possibly to automatically enumerate all the hosts in a domain. Instead, the SonicWALL will look for DNS responses coming from sanctioned DNS servers as they traverse the firewall. So if a host behind the firewall queries an external DNS server which is also a configured/defined DNS server on the SonicWALL, the SonicWALL will parse the response to see if it matches the domain of any wildcard FQDN AOs.

[3] Sanctioned DNS servers are those DNS servers configured for use by the SonicWALL firewall. The reason that responses from only sanctioned DNS servers are used in the wildcard learning process is to protect against the possibility of FQDN AO poisoning through the use of unsanctioned DNS servers with deliberately incorrect host entries.


Overall, minimally FW to allow such DNS resolving to see the traces to Akamai DNS server @ http://en.wikipedia.org/wiki/Akamai_Technologies#Akamai.27s_DNS_servers 

That is why, I am puzzled why the sonicwall support say "...confirmed that wildcards used in network address objectives won't resolve..." - may want to drill further assuming the above is valid


Side note
 - Sonicwall has the section on "Blocking All Protocol Access to a Domain using FQDN DAOs"
 - Some past conjectures of akamai related working
@ http://research.microsoft.com/en-us/um/people/ratul/akamai.html
 - Akamai NetworkSession Interface (installed in client machine)
@ http://www.akamai.com/html/solutions/client_faq.html
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
One of the biggest threats in the cyber realm pertains to advanced persistent threats (APTs). This paper is a compare and contrast of Russian and Chinese APT's.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question