SlideShare a Scribd company logo
BIG-IP v12.1 Application Security Manager
WebSocket
Created by ,
NPIE ASM
lior@f5.com
V1.0 March, 2016
@rotkovitch
© F5 Networks, Inc 2
• Intro to WebSocket
• ASM and WebSocket
• WebSocket violations
• WebSocket URL setting
• WebSocket in the request log
• WebSocket Learning and policy building
• Demo flow
Index
© F5 Networks, Inc 3
Intro to WebSocket
http://demo.kaazing.com/forex/
http://www.websocket.org/echo.html
© F5 Networks, Inc 4
• WebSocket provide simple framing layer on top of HTTP
• Key Benefits :
• Two-way communication
• Connections that are persistent
• Full-duplex.
• Low HTTP and TCP overhead
• WebSocket protocol is RFC 6455
WebSocket intro
© F5 Networks, Inc 5
WebSocket intro – Handshake and frames exchange
CLIENT SERVER
GET /chat HTTP/1.1
Host: server.example.com
Upgrade: Websocket
Connection: Upgrade
Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==
Origin: http://example.com
Sec-WebSocket-Protocol: chat, superchat
Sec-WebSocket-Version: 13
HTTP/1.1 101 Switching Protocols
Upgrade: Websocket
Connection: Upgrade
Sec-WebSocket-Accept: s3pPLMBiTxaQ9kYGzzhZRbK+xOo=
Sec-WebSocket-Protocol: chat
Websocket frame
Websocket frame
Websocket frame
Websocket close frame
Websocket close frame
© F5 Networks, Inc 6
WebSocket Demo
1
2
WS filter
http://www.websocket.org/echo.html
© F5 Networks, Inc 7
ASM is WebSocket aware
1. Can enforce the WebSocket handshake – RFC checks
2. Can enforce the payload of type :
• Plain text – signatures
• JSON – structure & signatures
• Binary - enforce length of frame size
And:
• Enforce fragmentation
• Allows WS and WSS
Note: must have WebSocket Profile on the Virtual IP
ASM & WebSocket
© F5 Networks, Inc 8
Enforcement Threat Prevented Mitigation
1 Handshake protocol correctness Server stack abuse. Enforce the mandatory headers and their well-formedness in request.
2 Cross-origin access Session riding/ CSRF Deny access to all requests coming from origins not in the
configured whitelist.
3 HTTP upgrade flood prevention Exhausting server socket
resources
Limit the RPS per WS/WSS URLs. We will use the same
limits as for all URLs in a VS, HTTP and WS alike.
4 Login enforcement Information leakage Enforce login session also for WS/WSS URLs.
Requires adding protocol (HTTP/S, WS/S) to the protected URLs
5 Attack signature detection XSS, SQL injection, command shell
injection and all other threats
signatures prevent
Look for parameter content attack signatures in each textual WS
message. If found, close the WebSocket with a Close message.
Request log will show the sent message
6 Illegal encoding and meta
characters
Exploit server stack Perform the following checks per textual message: Check UTF-8
encoding (mandated by RFC, no other encoding is allowed). Check for
illegal meta-characters. Check for null character
7 Enforce message masking Cache poisoning Enforce message masking for client textual messages in order to
avoid cache poisoning.
8 Limit message and frame size and
correctness of framing
Buffer overflow Limit message size, frame size and enforce correctness of framing
9 Enforce message structure in JSON
format
Exploit server stack
Buffer overflow
Apply JSON content profile per WS message with all possible
defenses including signatures and metacharacters.
10 Slow send/receive Exhaust server socket resources Limit the time for sending a message and time between messages.
© F5 Networks, Inc 9
WebSocket violations – Protocol compliance
© F5 Networks, Inc 10
WebSocket violations – Protocol compliance
Security ›› Application Security ›› Policy Building ›› Learning and Blocking Settings
© F5 Networks, Inc 11
WebSocket violations – Protocol compliance
• Bad WebSocket handshake request
• Failure in WebSocket framing protocol
• Mask not found in client frame
• Null character found in WebSocket text massage
© F5 Networks, Inc 12
WebSocket violations – Protocol compliance
• Bad WebSocket handshake request
• HTTP Version is 1.1
• “Upgrade” header appears once
• "Sec-WebSocket-Key“ has one occurrence and is base 64 encoded
• "Sec-WebSocket-Version“ has once occurrence and value of 13
• Evasion technique
© F5 Networks, Inc 13
WebSocket violations – Protocol compliance
• Failure in WebSocket framing protocol
• Continuing frame without start frame.
• Start frame without ending the previous message fragmentation (interleaving
fragmentation is not allowed!)
• Control frame with FIN flag off (i.e. attempt to fragment them).
• Control frame payload size is greater than 125.
© F5 Networks, Inc 14
WebSocket violations – Protocol compliance
• Mask not found in client frame
• Each frame should have a bit mask according to the RFC.
• Enforce the continuity of the frames by verifying the bit mask exists
• Client side
• Null character found in WebSocket text massage
• Null character inside message payload of type JSON and Text will be
enforce.
• Indifferent to “check message payload”
© F5 Networks, Inc 15
WebSocket URL Entities
Security ›› Application Security ›› Policy
Building ›› Learning and Blocking Settings
Policy Type Learn New WebSocket URL’s
Fundamental Never
Enhance Selective
Comprehensive Add all entities
© F5 Networks, Inc 16
1. Binary content found in text only WebSocket
2. Illegal WebSocket binary message length
3. Illegal WebSocket extension
4. Illegal WebSocket frame length
5. Illegal number of frame per message
6. Text content found in binary only WebSocket
WebSocket Violations - Payload
© F5 Networks, Inc 17
• Binary content found in text only WebSocket
• The WebScoket payload is defined as text but the
payload contains binary payload.
WebSocket Violations - Payload
© F5 Networks, Inc 18
• Illegal WebSocket binary message length
• Binary message size enforce of 10000 bytes (default)
WebSocket Violations - Payload
© F5 Networks, Inc 19
• Illegal WebSocket extension
• Protocol extensions: Per-message compression, Interleaved
message fragmentation, etc
• ASM can do the following for WebScoket extension :
o Remove headers – remove the extension header (default)
o Ignore – ignore the extension header (let then pass)
o Block – block request with WebSocket extension
WebSocket Violations - Payload
© F5 Networks, Inc 20
• Illegal WebSocket frame length
WebSocket Violations - Payload
© F5 Networks, Inc 21
• Illegal number of frames per message
WebSocket Violations - Payload
© F5 Networks, Inc 22
• Text content found in binary only WebSocket
WebSocket Violations - Payload
© F5 Networks, Inc 23
WebSocket URL configuration
© F5 Networks, Inc 24
WebSocket URL configuration
© F5 Networks, Inc 25
WebSocket URL configuration
© F5 Networks, Inc 26
Reviewing WebSocket message in the request log
© F5 Networks, Inc 27
Reviewing WebSocket message in the request log
Security ›› Event Logs ›› Application ›› Requests
1
2
3
© F5 Networks, Inc 28
WebSocket - Request log filtering
Security ›› Event Logs ›› Application ›› Requests
© F5 Networks, Inc 29
WebSocket - Request log filtering
© F5 Networks, Inc 30
WebSocket Handshake
© F5 Networks, Inc 31
WebSocket Handshake
© F5 Networks, Inc 32
WebSocket - Ping Pong
© F5 Networks, Inc 33
WebSocket - Close
© F5 Networks, Inc 34
WebSocket Demo
© F5 Networks, Inc 35
Leaning page for WebSocket
© F5 Networks, Inc 36
WebSocket URL
© F5 Networks, Inc 37
Leaning page for WebSocket
© F5 Networks, Inc 38
“Sec-WebSocket-Extensions”
WebSocket URL
© F5 Networks, Inc 39
WebSocket URL
© F5 Networks, Inc 40
Policy builder classification
© F5 Networks, Inc 41
JSON facts
© F5 Networks, Inc 42
Attack signatures on Web Socket
© F5 Networks, Inc 43
Web Sokcet Learning and attack signature
© F5 Networks, Inc 44
Override attack signature – false positive
© F5 Networks, Inc 45
• ASM support WebSocket protocol
• Enforce protocol compliance
• Enforce payload –
• Plane Text – attack signature , null
• JSON – structure and attack signature
• Binary – length
• New violations and setting for Web Scoket
• Policy builder can learn the URL and classify the WebSocket payload types.
• Request log display the communication between client and server
Summary

More Related Content

PDF
Lior rotkovitch ASM WAF unified learning – building policy with asm v12
PDF
F5 ASM v12 DDoS best practices
PDF
F5 DDoS Protection
PPTX
Asm bot mitigations v3 final- lior rotkovitch
PDF
Bug Bounty Hunter Methodology - Nullcon 2016
PPTX
F5's IP Intelligence Service
PPTX
Lateral Movement with PowerShell
PPTX
WAF ASM / Advance WAF - Brute force lior rotkovitch f5 sirt v5 clean
Lior rotkovitch ASM WAF unified learning – building policy with asm v12
F5 ASM v12 DDoS best practices
F5 DDoS Protection
Asm bot mitigations v3 final- lior rotkovitch
Bug Bounty Hunter Methodology - Nullcon 2016
F5's IP Intelligence Service
Lateral Movement with PowerShell
WAF ASM / Advance WAF - Brute force lior rotkovitch f5 sirt v5 clean

What's hot (20)

PDF
Neat tricks to bypass CSRF-protection
PDF
How to steal and modify data using Business Logic flaws - Insecure Direct Obj...
PDF
Pwning mobile apps without root or jailbreak
PDF
Ace Up the Sleeve
PDF
DerbyCon 2019 - Kerberoasting Revisited
PPTX
Abusing Microsoft Kerberos - Sorry you guys don't get it
PDF
What’s wrong with WebSocket APIs? Unveiling vulnerabilities in WebSocket APIs.
PDF
Detecting WMI Exploitation v1.1
PDF
F5 BIG-IP Misconfigurations
PDF
Building Advanced XSS Vectors
PPTX
BSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
PDF
Red Team Methodology - A Naked Look
PDF
Attacker's Perspective of Active Directory
PDF
Kubernetes security
PDF
Performance Wins with BPF: Getting Started
PDF
Web Application Security
PPTX
2017 Secure360 - Hacking SQL Server on Scale with PowerShell
PDF
Ekoparty 2017 - The Bug Hunter's Methodology
PPTX
Introduction to shodan
PPT
Source Code Analysis with SAST
Neat tricks to bypass CSRF-protection
How to steal and modify data using Business Logic flaws - Insecure Direct Obj...
Pwning mobile apps without root or jailbreak
Ace Up the Sleeve
DerbyCon 2019 - Kerberoasting Revisited
Abusing Microsoft Kerberos - Sorry you guys don't get it
What’s wrong with WebSocket APIs? Unveiling vulnerabilities in WebSocket APIs.
Detecting WMI Exploitation v1.1
F5 BIG-IP Misconfigurations
Building Advanced XSS Vectors
BSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
Red Team Methodology - A Naked Look
Attacker's Perspective of Active Directory
Kubernetes security
Performance Wins with BPF: Getting Started
Web Application Security
2017 Secure360 - Hacking SQL Server on Scale with PowerShell
Ekoparty 2017 - The Bug Hunter's Methodology
Introduction to shodan
Source Code Analysis with SAST
Ad

Similar to Web Socket ASM support lior rotkovitch (20)

PDF
WebSockets: The Current State of the Most Valuable HTML5 API for Java Developers
PPT
Top Ten Web Hacking Techniques – 2008
PPTX
HTML5 Real Time and WebSocket Code Lab (SFHTML5, GTUGSF)
PPT
Camelone-2012 HTML5 WebSocket ActiveMQ/Camel
PPT
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
PDF
Introduction to WebSockets
PDF
Mulesoft Pune Meetup Deck - Apr 2020
PPTX
Basic security and Barracuda VRS
PDF
Jetty 9 – The Next Generation Servlet Container
PDF
Realizzare applicazioni Web con WebSocket, by Simone Bordet
PPTX
PPTX
Brocade vADC Portfolio Overview 2016
PPTX
Websocket technology for XPages
PDF
Http requesting smuggling
PDF
Http requesting smuggling
PDF
Why Traditional Web Security Technologies no Longer Suffice to Keep You Safe
PDF
Programming WebSockets - OSCON 2010
PDF
Dev con kolkata 2012 websockets
PPTX
ZIP
Websockets at tossug
WebSockets: The Current State of the Most Valuable HTML5 API for Java Developers
Top Ten Web Hacking Techniques – 2008
HTML5 Real Time and WebSocket Code Lab (SFHTML5, GTUGSF)
Camelone-2012 HTML5 WebSocket ActiveMQ/Camel
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Introduction to WebSockets
Mulesoft Pune Meetup Deck - Apr 2020
Basic security and Barracuda VRS
Jetty 9 – The Next Generation Servlet Container
Realizzare applicazioni Web con WebSocket, by Simone Bordet
Brocade vADC Portfolio Overview 2016
Websocket technology for XPages
Http requesting smuggling
Http requesting smuggling
Why Traditional Web Security Technologies no Longer Suffice to Keep You Safe
Programming WebSockets - OSCON 2010
Dev con kolkata 2012 websockets
Websockets at tossug
Ad

More from Lior Rotkovitch (18)

PDF
Software management, the seasonal return of DDoS - This Week in Security.pdf
PDF
HTTP Brute Force Mitigation Playbook Bot Profile for Brute Force Mitigations ...
PDF
Bots mitigations overview with Advance WAF - Anti ... - DevCentral.pdf
PDF
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
PDF
A Day in the Life of a Security Engineer from Tel Aviv- clean.pdf
PDF
The WAF book (Web App Firewall )
PDF
Brute Force - Lior Rotkovitch - f5 SIRT v5.pdf
PDF
The WAF book intro protection elements v1.0 lior rotkovitch
PDF
The waf book intro waf elements v1.0 lior rotkovitch
PDF
The waf book intro v1.0 lior rotkovitch
PDF
The waf book intro attack elements v1.0 lior rotkovitch
PPTX
F5 SIRT - F5 ASM WAF - DDoS protection
PPTX
Advance WAF bot mitigations V13.1
PDF
Bots mitigations overview with advance waf anti bot engine
PDF
ASM 11.6 DDoS profile- lior rotkovitch
PDF
Html cors- lior rotkovitch
PDF
הדרכה מבוססת אינטרנט Wbt - Web based training
PDF
פיתוח הדרכה מתוקשבת
Software management, the seasonal return of DDoS - This Week in Security.pdf
HTTP Brute Force Mitigation Playbook Bot Profile for Brute Force Mitigations ...
Bots mitigations overview with Advance WAF - Anti ... - DevCentral.pdf
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
A Day in the Life of a Security Engineer from Tel Aviv- clean.pdf
The WAF book (Web App Firewall )
Brute Force - Lior Rotkovitch - f5 SIRT v5.pdf
The WAF book intro protection elements v1.0 lior rotkovitch
The waf book intro waf elements v1.0 lior rotkovitch
The waf book intro v1.0 lior rotkovitch
The waf book intro attack elements v1.0 lior rotkovitch
F5 SIRT - F5 ASM WAF - DDoS protection
Advance WAF bot mitigations V13.1
Bots mitigations overview with advance waf anti bot engine
ASM 11.6 DDoS profile- lior rotkovitch
Html cors- lior rotkovitch
הדרכה מבוססת אינטרנט Wbt - Web based training
פיתוח הדרכה מתוקשבת

Recently uploaded (20)

PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
additive manufacturing of ss316l using mig welding
PPT
Mechanical Engineering MATERIALS Selection
PDF
composite construction of structures.pdf
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Lecture Notes Electrical Wiring System Components
PDF
Well-logging-methods_new................
PPTX
Construction Project Organization Group 2.pptx
PPTX
Sustainable Sites - Green Building Construction
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Welding lecture in detail for understanding
DOCX
573137875-Attendance-Management-System-original
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Geodesy 1.pptx...............................................
PDF
PPT on Performance Review to get promotions
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
additive manufacturing of ss316l using mig welding
Mechanical Engineering MATERIALS Selection
composite construction of structures.pdf
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Lecture Notes Electrical Wiring System Components
Well-logging-methods_new................
Construction Project Organization Group 2.pptx
Sustainable Sites - Green Building Construction
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Welding lecture in detail for understanding
573137875-Attendance-Management-System-original
CH1 Production IntroductoryConcepts.pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Geodesy 1.pptx...............................................
PPT on Performance Review to get promotions
Operating System & Kernel Study Guide-1 - converted.pdf
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx

Web Socket ASM support lior rotkovitch

  • 1. BIG-IP v12.1 Application Security Manager WebSocket Created by , NPIE ASM lior@f5.com V1.0 March, 2016 @rotkovitch
  • 2. © F5 Networks, Inc 2 • Intro to WebSocket • ASM and WebSocket • WebSocket violations • WebSocket URL setting • WebSocket in the request log • WebSocket Learning and policy building • Demo flow Index
  • 3. © F5 Networks, Inc 3 Intro to WebSocket http://demo.kaazing.com/forex/ http://www.websocket.org/echo.html
  • 4. © F5 Networks, Inc 4 • WebSocket provide simple framing layer on top of HTTP • Key Benefits : • Two-way communication • Connections that are persistent • Full-duplex. • Low HTTP and TCP overhead • WebSocket protocol is RFC 6455 WebSocket intro
  • 5. © F5 Networks, Inc 5 WebSocket intro – Handshake and frames exchange CLIENT SERVER GET /chat HTTP/1.1 Host: server.example.com Upgrade: Websocket Connection: Upgrade Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ== Origin: http://example.com Sec-WebSocket-Protocol: chat, superchat Sec-WebSocket-Version: 13 HTTP/1.1 101 Switching Protocols Upgrade: Websocket Connection: Upgrade Sec-WebSocket-Accept: s3pPLMBiTxaQ9kYGzzhZRbK+xOo= Sec-WebSocket-Protocol: chat Websocket frame Websocket frame Websocket frame Websocket close frame Websocket close frame
  • 6. © F5 Networks, Inc 6 WebSocket Demo 1 2 WS filter http://www.websocket.org/echo.html
  • 7. © F5 Networks, Inc 7 ASM is WebSocket aware 1. Can enforce the WebSocket handshake – RFC checks 2. Can enforce the payload of type : • Plain text – signatures • JSON – structure & signatures • Binary - enforce length of frame size And: • Enforce fragmentation • Allows WS and WSS Note: must have WebSocket Profile on the Virtual IP ASM & WebSocket
  • 8. © F5 Networks, Inc 8 Enforcement Threat Prevented Mitigation 1 Handshake protocol correctness Server stack abuse. Enforce the mandatory headers and their well-formedness in request. 2 Cross-origin access Session riding/ CSRF Deny access to all requests coming from origins not in the configured whitelist. 3 HTTP upgrade flood prevention Exhausting server socket resources Limit the RPS per WS/WSS URLs. We will use the same limits as for all URLs in a VS, HTTP and WS alike. 4 Login enforcement Information leakage Enforce login session also for WS/WSS URLs. Requires adding protocol (HTTP/S, WS/S) to the protected URLs 5 Attack signature detection XSS, SQL injection, command shell injection and all other threats signatures prevent Look for parameter content attack signatures in each textual WS message. If found, close the WebSocket with a Close message. Request log will show the sent message 6 Illegal encoding and meta characters Exploit server stack Perform the following checks per textual message: Check UTF-8 encoding (mandated by RFC, no other encoding is allowed). Check for illegal meta-characters. Check for null character 7 Enforce message masking Cache poisoning Enforce message masking for client textual messages in order to avoid cache poisoning. 8 Limit message and frame size and correctness of framing Buffer overflow Limit message size, frame size and enforce correctness of framing 9 Enforce message structure in JSON format Exploit server stack Buffer overflow Apply JSON content profile per WS message with all possible defenses including signatures and metacharacters. 10 Slow send/receive Exhaust server socket resources Limit the time for sending a message and time between messages.
  • 9. © F5 Networks, Inc 9 WebSocket violations – Protocol compliance
  • 10. © F5 Networks, Inc 10 WebSocket violations – Protocol compliance Security ›› Application Security ›› Policy Building ›› Learning and Blocking Settings
  • 11. © F5 Networks, Inc 11 WebSocket violations – Protocol compliance • Bad WebSocket handshake request • Failure in WebSocket framing protocol • Mask not found in client frame • Null character found in WebSocket text massage
  • 12. © F5 Networks, Inc 12 WebSocket violations – Protocol compliance • Bad WebSocket handshake request • HTTP Version is 1.1 • “Upgrade” header appears once • "Sec-WebSocket-Key“ has one occurrence and is base 64 encoded • "Sec-WebSocket-Version“ has once occurrence and value of 13 • Evasion technique
  • 13. © F5 Networks, Inc 13 WebSocket violations – Protocol compliance • Failure in WebSocket framing protocol • Continuing frame without start frame. • Start frame without ending the previous message fragmentation (interleaving fragmentation is not allowed!) • Control frame with FIN flag off (i.e. attempt to fragment them). • Control frame payload size is greater than 125.
  • 14. © F5 Networks, Inc 14 WebSocket violations – Protocol compliance • Mask not found in client frame • Each frame should have a bit mask according to the RFC. • Enforce the continuity of the frames by verifying the bit mask exists • Client side • Null character found in WebSocket text massage • Null character inside message payload of type JSON and Text will be enforce. • Indifferent to “check message payload”
  • 15. © F5 Networks, Inc 15 WebSocket URL Entities Security ›› Application Security ›› Policy Building ›› Learning and Blocking Settings Policy Type Learn New WebSocket URL’s Fundamental Never Enhance Selective Comprehensive Add all entities
  • 16. © F5 Networks, Inc 16 1. Binary content found in text only WebSocket 2. Illegal WebSocket binary message length 3. Illegal WebSocket extension 4. Illegal WebSocket frame length 5. Illegal number of frame per message 6. Text content found in binary only WebSocket WebSocket Violations - Payload
  • 17. © F5 Networks, Inc 17 • Binary content found in text only WebSocket • The WebScoket payload is defined as text but the payload contains binary payload. WebSocket Violations - Payload
  • 18. © F5 Networks, Inc 18 • Illegal WebSocket binary message length • Binary message size enforce of 10000 bytes (default) WebSocket Violations - Payload
  • 19. © F5 Networks, Inc 19 • Illegal WebSocket extension • Protocol extensions: Per-message compression, Interleaved message fragmentation, etc • ASM can do the following for WebScoket extension : o Remove headers – remove the extension header (default) o Ignore – ignore the extension header (let then pass) o Block – block request with WebSocket extension WebSocket Violations - Payload
  • 20. © F5 Networks, Inc 20 • Illegal WebSocket frame length WebSocket Violations - Payload
  • 21. © F5 Networks, Inc 21 • Illegal number of frames per message WebSocket Violations - Payload
  • 22. © F5 Networks, Inc 22 • Text content found in binary only WebSocket WebSocket Violations - Payload
  • 23. © F5 Networks, Inc 23 WebSocket URL configuration
  • 24. © F5 Networks, Inc 24 WebSocket URL configuration
  • 25. © F5 Networks, Inc 25 WebSocket URL configuration
  • 26. © F5 Networks, Inc 26 Reviewing WebSocket message in the request log
  • 27. © F5 Networks, Inc 27 Reviewing WebSocket message in the request log Security ›› Event Logs ›› Application ›› Requests 1 2 3
  • 28. © F5 Networks, Inc 28 WebSocket - Request log filtering Security ›› Event Logs ›› Application ›› Requests
  • 29. © F5 Networks, Inc 29 WebSocket - Request log filtering
  • 30. © F5 Networks, Inc 30 WebSocket Handshake
  • 31. © F5 Networks, Inc 31 WebSocket Handshake
  • 32. © F5 Networks, Inc 32 WebSocket - Ping Pong
  • 33. © F5 Networks, Inc 33 WebSocket - Close
  • 34. © F5 Networks, Inc 34 WebSocket Demo
  • 35. © F5 Networks, Inc 35 Leaning page for WebSocket
  • 36. © F5 Networks, Inc 36 WebSocket URL
  • 37. © F5 Networks, Inc 37 Leaning page for WebSocket
  • 38. © F5 Networks, Inc 38 “Sec-WebSocket-Extensions” WebSocket URL
  • 39. © F5 Networks, Inc 39 WebSocket URL
  • 40. © F5 Networks, Inc 40 Policy builder classification
  • 41. © F5 Networks, Inc 41 JSON facts
  • 42. © F5 Networks, Inc 42 Attack signatures on Web Socket
  • 43. © F5 Networks, Inc 43 Web Sokcet Learning and attack signature
  • 44. © F5 Networks, Inc 44 Override attack signature – false positive
  • 45. © F5 Networks, Inc 45 • ASM support WebSocket protocol • Enforce protocol compliance • Enforce payload – • Plane Text – attack signature , null • JSON – structure and attack signature • Binary – length • New violations and setting for Web Scoket • Policy builder can learn the URL and classify the WebSocket payload types. • Request log display the communication between client and server Summary