<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>FUD for thought</title>
	<atom:link href="https://fudie.net/feed/" rel="self" type="application/rss+xml" />
	<link>https://fudie.net/</link>
	<description>Information Security Blog by Eitan Caspi</description>
	<lastBuildDate>Fri, 03 Apr 2026 18:20:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>SSL VPN security enhancement idea &#8211; Reduce the gateway attack surface by allowing access only to pre-approved DDNS clients</title>
		<link>https://fudie.net/ssl-vpn-security-enhancement-idea-reduce-the-gateway-attack-surface-by-allowing-access-only-to-pre-approved-ddns-clients/</link>
					<comments>https://fudie.net/ssl-vpn-security-enhancement-idea-reduce-the-gateway-attack-surface-by-allowing-access-only-to-pre-approved-ddns-clients/#respond</comments>
		
		<dc:creator><![CDATA[Eitan Caspi]]></dc:creator>
		<pubDate>Sat, 16 Aug 2025 16:34:26 +0000</pubDate>
				<category><![CDATA[Cryptography, Encryption, Decryption]]></category>
		<category><![CDATA[Hardening and Mitigations]]></category>
		<category><![CDATA[Thoughts and Ideas]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[What have I discovered?]]></category>
		<guid isPermaLink="false">https://fudie.net/?p=4974</guid>

					<description><![CDATA[<p>(Hi there readers – If you know anyone who works for an SSL VPN vendor – in development, product management and so on, please send them a link to this post, hoping this idea will gain attention, acceptance, and eventually will come to life, hence enhance security for all of us) The Hebrew version of &#8230; <a href="https://fudie.net/ssl-vpn-security-enhancement-idea-reduce-the-gateway-attack-surface-by-allowing-access-only-to-pre-approved-ddns-clients/" class="more-link" data-wpel-link="internal" rel="noopener">Continue reading <span class="screen-reader-text">SSL VPN security enhancement idea &#8211; Reduce the gateway attack surface by allowing access only to pre-approved DDNS clients</span> <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://fudie.net/ssl-vpn-security-enhancement-idea-reduce-the-gateway-attack-surface-by-allowing-access-only-to-pre-approved-ddns-clients/" data-wpel-link="internal" rel="noopener">SSL VPN security enhancement idea &#8211; Reduce the gateway attack surface by allowing access only to pre-approved DDNS clients</a> appeared first on <a href="https://fudie.net" data-wpel-link="internal" rel="noopener">FUD for thought</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>(Hi there readers – If you know anyone who works for an SSL VPN vendor – in development, product management and so on, please send them a link to this post, hoping this idea will gain attention, acceptance, and eventually will come to life, hence enhance security for all of us)</p>
<p>The Hebrew version of this post can be found <a href="https://security.caspi.org.il/ssl-vpn-security-enhancement-idea-reduce-the-gateway-attack-surface-by-allowing-access-only-to-pre-approved-ddns-clients/" data-wpel-link="external" target="_blank" rel="external noopener noreferrer" class="wpel-icon-right">here<span class="wpel-icon wpel-image wpel-icon-6"></span></a>.</p>
<p><strong>TL;DR / Summary</strong></p>
<p>This is an idea I came up with, to enhance the security of SSL VPN, by reducing the SSL VPN server attack surface, by adding Dynamic DNS (DDNS) client to the SSL VPN client endpoint, hence configuring the server side to allow only networking-pre-approved sources to even communicate with the SSL VPN server component of the gateway in the first place, based on FQDN values of the DDNS clients, hence blocking, up front, most of the internet from even communicating with the SSL VPN server, hence greatly reducing its attack surface.</p>
<p>Thinking about it further – the above principle is good for any server element who needs to accept incoming traffic non-fixed source IP(s) – be it a web server, an SSH server and so on</p>
<p>I tried so find solutions that use the above principle, but I didn&#8217;t find any.</p>
<p>From what I have found &#8211; all uses of a DDNS client are for the benefit of systems that operate in as a server, meaning they listen for client-initiated incoming traffic, in order to provide service to clients, so that clients can find them and reach them, even if the IP address of these systems changes.</p>
<p>There are security gateway products who support using FQDN as an object in their Firewall rules, which means the above idea can be technically realized already now, but I think it will be hard to manage it all this way, and it will not scale. I think this needs a more systematic solution, to also handle the client side and DDNS server side, so I think vendors should incorporate it as part of their relevant products and services, to be able to be managed properly by customers.</p>
<p><strong><br />
Background</strong></p>
<p>I noticed that in the recent time there are many incidents in which SSL VPN components of security gateways are breached successfully, due to various reasons, mostly due to software vulnerabilities of the gateway&#8217;s software.</p>
<p>Vulnerabilities are inevitable, it will always happen, as we cannot guarantee bulletproof, 100 percent secure, software.</p>
<p>Also, SSL VPN, as a concept, is mostly used to grant secure access from the Internet in to local, private, internal networks, so it has to be open to the whole (or most) of the internet, as the organization cannot know in advance from which source IP addresses the clients will initiate communicate to the gateway, and as also some of the client endpoints change their source  IP from time to time, for various reasons (Their ISP changed their allocated IP, they travel in train and change cellular networks when they cross to another country, and so on).</p>
<p>So, I thought, we have here an enormous attack surface at the gateway side, constantly open to all of the Internet, so no wonder it is successfully breached so much.<br />
I though to myself: There should be a better, more secure, way to do it.</p>
<p>Here are several news articles about mostly recent SSL VPN vulnerabilities and breaches (sorted from newest to older):</p>
<p>2025, August<br />
Fortinet SSL VPNs Hit by Global Brute-Force Wave Before Attackers Shift to FortiManager<br />
<a href="https://thehackernews.com/2025/08/fortinet-ssl-vpns-hit-by-global-brute.html" data-wpel-link="external" target="_blank" rel="external noopener noreferrer" class="wpel-icon-right">https://thehackernews.com/2025/08/fortinet-ssl-vpns-hit-by-global-brute.html<span class="wpel-icon wpel-image wpel-icon-6"></span></a></p>
<p>2025, August<br />
SonicWall Investigating Potential SSL VPN Zero-Day After 20+ Targeted Attacks Reported<br />
<a href="https://thehackernews.com/2025/08/sonicwall-investigating-potential-ssl.html" data-wpel-link="external" target="_blank" rel="external noopener noreferrer" class="wpel-icon-right">https://thehackernews.com/2025/08/sonicwall-investigating-potential-ssl.html<span class="wpel-icon wpel-image wpel-icon-6"></span></a></p>
<p>2025, April<br />
Ivanti has recently patched a critical severity vulnerability found in its Connect Secure (ICS) VPN appliances which was allegedly being abused in the wild by Chinese state-sponsored actors<br />
<a href="https://www.techradar.com/pro/security/ivanti-patches-serious-connect-secure-flaw" data-wpel-link="external" target="_blank" rel="external noopener noreferrer" class="wpel-icon-right">https://www.techradar.com/pro/security/ivanti-patches-serious-connect-secure-flaw<span class="wpel-icon wpel-image wpel-icon-6"></span></a></p>
<p>2025, March<br />
VPN Vulnerabilities Become a Primary Weapon for Threat Actors Targeting Organizations<br />
<a href="https://gbhackers.com/vpn-vulnerabilities-become-a-primary-weapon/" data-wpel-link="external" target="_blank" rel="external noopener noreferrer" class="wpel-icon-right">https://gbhackers.com/vpn-vulnerabilities-become-a-primary-weapon/<span class="wpel-icon wpel-image wpel-icon-6"></span></a></p>
<p>2025, January<br />
Ivanti Connect Secure VPN Targeted in New Zero-Day Exploitation<br />
<a href="https://cloud.google.com/blog/topics/threat-intelligence/ivanti-connect-secure-vpn-zero-day" data-wpel-link="external" target="_blank" rel="external noopener noreferrer" class="wpel-icon-right">https://cloud.google.com/blog/topics/threat-intelligence/ivanti-connect-secure-vpn-zero-day<span class="wpel-icon wpel-image wpel-icon-6"></span></a></p>
<p>2024, February<br />
Exploitation Observed: Ivanti Connect Secure — CVE-2023-46805 and CVE-2024-21887<br />
<a href="https://www.akamai.com/blog/security-research/ivanti-january-rce-cve-zero-day-exploitation-observed" data-wpel-link="external" target="_blank" rel="external noopener noreferrer" class="wpel-icon-right">https://www.akamai.com/blog/security-research/ivanti-january-rce-cve-zero-day-exploitation-observed<span class="wpel-icon wpel-image wpel-icon-6"></span></a></p>
<p>2023, July<br />
Researchers Develop Exploit Code for Critical Fortinet VPN Bug<br />
Some 340,000 FortiGate SSL VPN appliances remain exposed to the threat more than three weeks after Fortinet released firmware updates to address the issue<br />
<a href="https://www.darkreading.com/vulnerabilities-threats/researchers-develop-exploit-code-for-critical-fortinet-bug" data-wpel-link="external" target="_blank" rel="external noopener noreferrer" class="wpel-icon-right">https://www.darkreading.com/vulnerabilities-threats/researchers-develop-exploit-code-for-critical-fortinet-bug<span class="wpel-icon wpel-image wpel-icon-6"></span></a></p>
<p>2022, December<br />
Fortinet Warns of Active Exploitation of New SSL-VPN Pre-auth RCE Vulnerability<br />
<a href="https://thehackernews.com/2022/12/fortinet-warns-of-active-exploitation.html" data-wpel-link="external" target="_blank" rel="external noopener noreferrer" class="wpel-icon-right">https://thehackernews.com/2022/12/fortinet-warns-of-active-exploitation.html<span class="wpel-icon wpel-image wpel-icon-6"></span></a></p>
<p><strong><br />
The suggested solution (High level)</strong></p>
<p>The core concept for using DDNS is that if we wish to grant secure access to clients that we cannot know in advance what is their source IP and even if we know it at some point – it can change at any time, because it is not a fixed VPN connection, with fixed client IP, so we use the DDNS system to have a trusted fixation layer (made of the FQDN&#8217;s domain and DDNS server), which we trust to authenticate the client device – hence we are willing to allow the first networking level access to an unknown-in-advance client IPs, but ones that have a preliminary required software (the DDNS client) and was authenticated (even if just a device was verified, not a human) at a system we trust (The DDNS server system).</p>
<p>The idea is to limit who has access to the SSL VPN server side, based on the following high-level concept:</p>
<ul>
<li>SSL VPN Client side
<ul>
<li>The clients who wish to access and use the SSL VPN server – will have, as part of their SSL VPN client software (and possibly as part of their EDR client software), a Dynamic DNS (DDNS) client component</li>
<li>The DDNS client will communicate securely with its DDNS server (I guess over HTTPS), authenticate to it, and send to the DDNS server its client identity and public IP address (which the DDNS server can also fetch by itself, from the network session). This should be done every time the public IP of the client changes, to verify the DDNS server and the gateway always get the current IP of the client
<ul>
<li>The DDNS client software must of course be secured – The client&#8217;s DDNS server credentials should be encrypted locally; communication to the DDNS server needs to be encrypted and authenticated, DNS queries better be encrypted using DoH (DNS over HTTPS); protected from tampering and so on</li>
</ul>
</li>
</ul>
</li>
</ul>
<p>&nbsp;</p>
<ul>
<li>SSL VPN server side (the organizational security gateway)
<ul>
<li>The gateway will, constantly and ad-hoc when needed, run reverse (PTR) DNS queries against the same DDNS server/system as the SSL VPN client use, to fetch the current IP addresses of relevant SSL VPN clients</li>
<li>The gateway will have a firewall rule, related to the SSL VPN activity, who allows access to it from the internet, based not on numeric source IPs, but rather on FQDN names that the DDNS server controls and manages, the ones attached to its clients (desired with wildcard support, for better configuration flexibility)
<ul>
<li>For example, the Firewall rule&#8217;s allowed source object will be *.vpn-allowed.firm.com, and any IP that is resolved to matching FQDN, will be allowed (e.g., johndoe.vpn.firm.com or serioussam.vpn.firm.com)</li>
</ul>
</li>
</ul>
</li>
</ul>
<p>&nbsp;</p>
<ul>
<li>Session
<ul>
<li>The client will initiate an https-based SSL VPN session to the gateway</li>
<li>The gateway will receive the first packet of the TCP handshake session (with the SYN flag) and will check the value of the incoming source IP, based on the above SSL VPN access firewall rule</li>
<li>This source IP will be evaluated (best using a DNS PTR resolving (hence IP to FQDN) against the DDNS server or, less desired, as its data may not be up-to-date, locally against a pre-fetched cache)
<ul>
<li>Timeouts and invalidation of non-active DDNS client&#8217;s is highly desired, to prevent granting access to unauthorized clients who accepted the original IP if the real client is not using that IP anymore, for any reason</li>
</ul>
</li>
<li>If there is a match – the client will be allowed to continue with the session &#8211; to complete the TCP handshake, set the TLS session, authenticate and then establish the SSL VPN connection</li>
<li>If there is no match – the firewall rule evaluation process will continue to the rest of the firewall&#8217;s rules, ideally eventually reaching the last rule, the cleanup / deny-all rule, which will drop the communication, hence blocking any further communication from the client side to the SSL VPN server, which actually means blocking any source IP that does not currently has a currently active allowed DDNS client ID, which is probably most of the Internet, which means most of the opportunistic attackers</li>
</ul>
</li>
</ul>
<p>&nbsp;</p>
<p>Added possible points:</p>
<ul>
<li>The DDNS server system
<ul>
<li>I think it is desired not to use a DDNS server system that is part of the gateway, the SSL VPN server device – as it is exposing the device to the whole Internet using an extra web/DNS server interface, which is against what we try to achieve here in the first place</li>
<li>Also, I think it is less desired to use 3<sup>rd</sup> party DDNS system/service, unless it is a very secure one</li>
<li>Ideally the DDNS system will be a cloud service by the same vendor of the security gateway&#8217;s vendor, to hopefully achieve more compatibility, interoperability, and security</li>
</ul>
</li>
<li>Of course, this concept adds to the current way of things – more complexity, management, and the need for hardening, but I think the added security worth it</li>
</ul>
<p>Zero trust features that can be added as well:</p>
<ul>
<li>Applying IP reputation – to either block access up front, or instead adding more security checks or limitations to the session</li>
<li>Dropping the session if the public IP of the client changed during an active session, forcing the client to start a new session from the beginning</li>
<li>Blocking clients if their public IP is changing too fast/often or their public IP is not reported within a timely manner (if there is a technical demand from the DDNS logic for recuring scheduled updates from the DDNS client to its server)</li>
<li>Checking local settings like if the client is set as router (IP Forwarding), the use of a proxy, the use of another VPN in parallel, and so on (although this slides more towards an EDR functionality)</li>
</ul>
<p>That&#8217;s all, folks. I hope you liked it, and if you did – please spread the word, and the link to this post, to relevant people who can bring this concept to life.</p>
<p>The post <a href="https://fudie.net/ssl-vpn-security-enhancement-idea-reduce-the-gateway-attack-surface-by-allowing-access-only-to-pre-approved-ddns-clients/" data-wpel-link="internal" rel="noopener">SSL VPN security enhancement idea &#8211; Reduce the gateway attack surface by allowing access only to pre-approved DDNS clients</a> appeared first on <a href="https://fudie.net" data-wpel-link="internal" rel="noopener">FUD for thought</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://fudie.net/ssl-vpn-security-enhancement-idea-reduce-the-gateway-attack-surface-by-allowing-access-only-to-pre-approved-ddns-clients/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>A true chance to make CVE a true community program</title>
		<link>https://fudie.net/a-true-chance-to-make-cve-a-true-community-program/</link>
					<comments>https://fudie.net/a-true-chance-to-make-cve-a-true-community-program/#respond</comments>
		
		<dc:creator><![CDATA[Eitan Caspi]]></dc:creator>
		<pubDate>Wed, 16 Apr 2025 10:07:59 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Government and Regulation]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Organization, Companies and Institutes]]></category>
		<category><![CDATA[Patching]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[The Information Security Profession]]></category>
		<category><![CDATA[Thoughts and Ideas]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://fudie.net/?p=4950</guid>

					<description><![CDATA[<p>This is something I always say – we have too little global, horizontal, community initiatives in cybersecurity. Lots of private and commercial initiatives, but fewer community ones. The CVE program, run by MITRE, is running out of funding from the US government. This event can be a trigger to change this. This is a golden &#8230; <a href="https://fudie.net/a-true-chance-to-make-cve-a-true-community-program/" class="more-link" data-wpel-link="internal" rel="noopener">Continue reading <span class="screen-reader-text">A true chance to make CVE a true community program</span> <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://fudie.net/a-true-chance-to-make-cve-a-true-community-program/" data-wpel-link="internal" rel="noopener">A true chance to make CVE a true community program</a> appeared first on <a href="https://fudie.net" data-wpel-link="internal" rel="noopener">FUD for thought</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This is something I always say – we have too little global, horizontal, community initiatives in cybersecurity. Lots of private and commercial initiatives, but fewer community ones.</p>
<p>The CVE program, run by MITRE, is running out of funding from the US government.<br />
This event can be a trigger to change this. This is a golden opportunity for a change for good for the industry.</p>
<p>This is a chance to change it to be a global program, not only US controlled, funded by governments from around the world, plus core monetary support from the cybersecurity vendors and services giants who make billions of dollars out of cybersecurity and rely on CVE data.</p>
<p>&#8220;U.S. Govt. Funding for MITRE&#8217;s CVE Ends April 16, Cybersecurity Community on Alert&#8221;<br />
<a href="https://thehackernews.com/2025/04/us-govt-funding-for-mitres-cve-ends.html" data-wpel-link="external" target="_blank" rel="external noopener noreferrer" class="wpel-icon-right">https://thehackernews.com/2025/04/us-govt-funding-for-mitres-cve-ends.html<span class="wpel-icon wpel-image wpel-icon-6"></span></a></p>
<p>The post <a href="https://fudie.net/a-true-chance-to-make-cve-a-true-community-program/" data-wpel-link="internal" rel="noopener">A true chance to make CVE a true community program</a> appeared first on <a href="https://fudie.net" data-wpel-link="internal" rel="noopener">FUD for thought</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://fudie.net/a-true-chance-to-make-cve-a-true-community-program/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WhatsApp group for information and cyber security news &#8211; Moved to a WhatsApp Channel</title>
		<link>https://fudie.net/whatsapp-group-for-information-and-cyber-security-news-moved-to-a-whatsapp-channel/</link>
					<comments>https://fudie.net/whatsapp-group-for-information-and-cyber-security-news-moved-to-a-whatsapp-channel/#respond</comments>
		
		<dc:creator><![CDATA[Eitan Caspi]]></dc:creator>
		<pubDate>Fri, 31 Jan 2025 10:54:09 +0000</pubDate>
				<category><![CDATA[External Content]]></category>
		<category><![CDATA[Management Announcements]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Personal]]></category>
		<guid isPermaLink="false">https://fudie.net/?p=4935</guid>

					<description><![CDATA[<p>Hello all, Following my former post, from a few months ago, about opening a WhatsApp group for information and cyber security news and content, and following concerns from group members about the privacy issues coming with a WhatsApp group &#8211; I tried to find a method to both enhance the privacy of the members of &#8230; <a href="https://fudie.net/whatsapp-group-for-information-and-cyber-security-news-moved-to-a-whatsapp-channel/" class="more-link" data-wpel-link="internal" rel="noopener">Continue reading <span class="screen-reader-text">WhatsApp group for information and cyber security news &#8211; Moved to a WhatsApp Channel</span> <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://fudie.net/whatsapp-group-for-information-and-cyber-security-news-moved-to-a-whatsapp-channel/" data-wpel-link="internal" rel="noopener">WhatsApp group for information and cyber security news &#8211; Moved to a WhatsApp Channel</a> appeared first on <a href="https://fudie.net" data-wpel-link="internal" rel="noopener">FUD for thought</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hello all,</p>
<p>Following my <a href="https://fudie.net/whatsapp-group-for-information-and-cyber-security-news/" data-wpel-link="internal" rel="noopener">former post</a>, from a few months ago, about opening a WhatsApp group for information and cyber security news and content, and following concerns from group members about the privacy issues coming with a WhatsApp group &#8211; I tried to find a method to both enhance the privacy of the members of this group, and also remove the limit of 1000 members that is inherited in a WhatsApp group – So eventually I decided to move this group to be a WhatsApp Channel, which doesn&#8217;t have any limit to the number of subscribers, and also if doesn&#8217;t display the subscribers&#8217; name and phone number to other members or to the channel admin, which is me (unless I already have your phone number in my phone address book, which means I am already in some connection with you).</p>
<p>Read here more about the WhatsApp channel privacy attributes at the WhatsApp article of &#8220;<a href="https://faq.whatsapp.com/1318001139066835" data-wpel-link="external" target="_blank" rel="external noopener noreferrer" class="wpel-icon-right">About safety and privacy on channels<span class="wpel-icon wpel-image wpel-icon-6"></span></a>&#8220;.<br />
A channel is practically a &#8220;one to many&#8221; content feed, somewhat similar to an RSS Feed.</p>
<p>I looked into moving the messaging application of &#8220;Signal&#8221;, but a Signal group is also limited to 1000 members, plus &#8220;Signal&#8221; does not have a feature similar to a broadcast channel with subscribers, so it wasn&#8217;t a suitable option to move to.</p>
<p>As usual – you are invited to invite relevant people to join.</p>
<p>So, starting 27-Jan-25 I stopped publishing new content in the group, and started publishing at the channel (which does show historical/former published content, while a group does not), found in the following link &#8211; <a href="https://whatsapp.com/channel/0029VazZmk5LNSa7uZvULT0n" data-wpel-link="external" target="_blank" rel="external noopener noreferrer" class="wpel-icon-right">https://whatsapp.com/channel/0029VazZmk5LNSa7uZvULT0n<span class="wpel-icon wpel-image wpel-icon-6"></span></a></p>
<p>I hope this change will be beneficial for all of us.</p>
<p>Stay safe and secure!</p>
<p>The post <a href="https://fudie.net/whatsapp-group-for-information-and-cyber-security-news-moved-to-a-whatsapp-channel/" data-wpel-link="internal" rel="noopener">WhatsApp group for information and cyber security news &#8211; Moved to a WhatsApp Channel</a> appeared first on <a href="https://fudie.net" data-wpel-link="internal" rel="noopener">FUD for thought</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://fudie.net/whatsapp-group-for-information-and-cyber-security-news-moved-to-a-whatsapp-channel/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
