Cisco StealthWatchã¯ãåæ£ãããã¯ãŒã¯å šäœã®å æ¬çãªè åšç£èŠãæäŸããæ å ±ã»ãã¥ãªãã£åæãœãªã¥ãŒã·ã§ã³ã§ãã StealthWatchã¯ãã«ãŒã¿ãŒãã¹ã€ããããã®ä»ã®ãããã¯ãŒã¯ããã€ã¹ããã®NetFlowããã³IPFIXã®åéã«åºã¥ããŠããŸãããã®çµæããããã¯ãŒã¯ã¯ææãªã»ã³ãµãŒã«ãªãã管çè ã¯æ¬¡äžä»£ãã¡ã€ã¢ãŠã©ãŒã«ãªã©ã®åŸæ¥ã®ãããã¯ãŒã¯ã»ãã¥ãªãã£æ¹æ³ãå°éã§ããªãå Žæãæ¢ãããšãã§ããŸãã
以åã®èšäºã§ãã§ã«StealthWatchã«ã€ããŠæžããŠããŸãïŒæåã®æŽå¯ãšæ©èœãããã³ãããã€ã¡ã³ããšæ§æã次ã«é²ãã§ãã¢ã©ãŒã ã«å¯ŸåŠããæ¹æ³ãšããœãªã¥ãŒã·ã§ã³ãçæããã»ãã¥ãªãã£ã€ã³ã·ãã³ãã調æ»ããæ¹æ³ã«ã€ããŠèª¬æããŸãã6ã€ã®äŸããããç§ã¯è£œåã®æçšæ§ã®è¯ãã¢ã€ãã¢ãæäŸããããšæããŸãã
ãŸããStealthWatchã«ã¯ãã¢ã«ãŽãªãºã ãšãã£ãŒãçšã®ããªã¬ãŒãããããåæ£ãããŠãããšèšãå¿ èŠããããŸãã1ã€ç®ã¯ããããçš®é¡ã®ã¢ã©ãŒã ïŒéç¥ïŒã§ãããããªã¬ãŒããããšããããã¯ãŒã¯äžã®çããããã®ãæ€åºã§ããŸãã2ã€ç®ã¯ã»ãã¥ãªãã£ã€ã³ã·ãã³ãã§ãããã®èšäºã§ã¯ãã¢ã«ãŽãªãºã ããªã¬ãŒã®4ã€ã®äŸãšãã£ãŒãã®2ã€ã®äŸã«ã€ããŠèª¬æããŸãã
1.ãããã¯ãŒã¯å ã®æã倧éã®çžäºäœçšã®åæ
StealthWatchãæ§æããæåã®ã¹ãããã¯ãã°ã«ãŒãããšã«ãã¹ããšãããã¯ãŒã¯ãå®çŸ©ããããšã§ãããŠã§ãã€ã³ã¿ãŒãã§ãŒã¹ã®[ èšå® ] > [ãã¹ãã°ã«ãŒã管ç ]ã¿ãã§ããããã¯ãŒã¯ããã¹ãããµãŒããŒãé©åãªã°ã«ãŒãã«åããŸããç¬èªã®ã°ã«ãŒããäœæããããšãã§ããŸãããšããã§ãCisco StealthWatchã§ã®ãã¹ãéã®çžäºäœçšã®åæã¯ãã¹ããªãŒã ããšã®æ€çŽ¢ãã£ã«ã¿ãŒã ãã§ãªãçµæèªäœãä¿åã§ãããããéåžžã«äŸ¿å©ã§ãã
ãŸãããŠã§ãã€ã³ã¿ãŒãã§ãŒã¹ã§[ åæ ] > [ãããŒæ€çŽ¢ ]ã¿ãã«ç§»åããŸãã次ã«ã次ã®ãã©ã¡ãŒã¿ãèšå®ããå¿ èŠããããŸãã
- æ€çŽ¢ã¿ã€ã-äžäœã®äŒè©±ïŒæã人æ°ã®ããçžäºäœçšïŒ
- æéç¯å²-24æéïŒæéãå¥ã®æéã䜿çšã§ããŸãïŒ
- æ€çŽ¢å-å åŽããå åŽã®äžäœã®äŒè©±ïŒããããããååïŒ
- Subject â Host Groups â Inside Hosts ( â )
- Connection ( , )
- Peer â Host Groups â Inside Hosts ( â )
- Advanced Options , , ( , ). .
[ æ€çŽ¢ ]ãã¿ã³ãã¯ãªãã¯ãããšãã€ã³ã¿ã©ã¯ã·ã§ã³ã®ãªã¹ãã衚瀺ããã転éãããããŒã¿ã®éã§ãã§ã«ãœãŒããããŠããŸãã
ç§ã®äŸã§ã¯ããã¹ã10.150.1.201ïŒãµãŒããŒïŒã1ã€ã®ã¹ããªãŒã å ã§ãmysqlãããã³ã«ã䜿çšããŠ1.5 GBã®ãã©ãã£ãã¯ããã¹ã10.150.1.200ïŒã¯ã©ã€ã¢ã³ãïŒã«è»¢éããŸããã[åã®ç®¡ç ]ãã¿ã³ã䜿çšãããšãåºåã«ããã«åãè¿œå ã§ããŸãã ããã«ã管çè ã®è£éã§ããã®çš®ã®ããåãã«å¯ŸããŠåžžã«ããªã¬ãŒãããSNMPãé»åã¡ãŒã«ããŸãã¯Syslogãä»ããŠéç¥ããã«ã¹ã¿ã ã«ãŒã«ãäœæã§ããŸãã
2.ãããã¯ãŒã¯å ã§æãé ãã¯ã©ã€ã¢ã³ããšãµãŒããŒã®çžäºäœçšã®é 延ã®åæ
SRTïŒãµãŒããŒå¿çæéïŒãRTTïŒåŸåŸ©æéïŒ ã¿ã°ã䜿çšãããšããµãŒããŒã®åŸ ã¡æéãšãããã¯ãŒã¯å šäœã®åŸ ã¡æéã確èªã§ããŸãããã®ããŒã«ã¯ãé ãã¢ããªã±ãŒã·ã§ã³ã«é¢ãããŠãŒã¶ãŒã®èŠæ ã®åå ããã°ããèŠã€ããå¿ èŠãããå Žåã«ç¹ã«åœ¹ç«ã¡ãŸãã
泚ïŒã»ãšãã©ãã¹ãŠã®Netflowãšã¯ã¹ããŒã¿ãŒã¯ SRTãRTTã¿ã°ãéä¿¡ã§ããªããããFlowSensorã§ãã®ãããªããŒã¿ã衚瀺ããã«ã¯ããããã¯ãŒã¯ããã€ã¹ããã®ãã©ãã£ãã¯ã®ã³ããŒã®éä¿¡ãæ§æããå¿ èŠããããŸãã次ã«FlowSensorã¯ãæ¡åŒµIPFIXãFlowCollectorã«æäŸããŸãã
管çè ã®ã³ã³ãã¥ãŒã¿ãŒã«ã€ã³ã¹ããŒã«ãããŠããJavaã¢ããªã±ãŒã·ã§ã³StealtWatchã§ãã®åæãå®è¡ããæ¹ã䟿å©ã§ããInside Hostsã
å³ã¯ãªãã¯ããã¿ãã«ç§»åããŸããããŒããŒãã«ã
[ ãã£ã«ã¿ãŒ]ãã¯ãªãã¯ããŠãå¿ èŠãªãã©ã¡ãŒã¿ãŒãèšå®ããŸããäŸãšããŠïŒ
- æ¥ä»/æé-éå»3æ¥é
- ããã©ãŒãã³ã¹-å¹³ååŸåŸ©æé> = 50ms
ããŒã¿ã衚瀺ããåŸãé¢å¿ã®ãããã£ãŒã«ããRTTãSRTã«è¿œå ããŸãããããè¡ãã«ã¯ãã¹ã¯ãªãŒã³ã·ã§ããã®åãã¯ãªãã¯ãã[åã®ç®¡ç ]ãå³ã¯ãªãã¯ããŸãã次ã«ãRTTãSRTãã©ã¡ãŒã¿ãã¯ãªãã¯ããŸãã
ãªã¯ãšã¹ããåŠçããåŸãRTTã®å¹³åã§äžŠã¹æ¿ããæãé ã察話ã確èªããŸããã
詳现æ å ±ã«åé¡ããã«ã¯ããããŒãå³ã¯ãªãã¯ããŠã[ ãããŒã®ã¯ã€ãã¯ãã¥ãŒ]ãéžæããŸãã
ãã®æ å ±ã¯ããã¹ãããšã瀺åããŠãã10.201.3.59ã°ã«ãŒãããã®è²©å£²ããã³ããŒã±ãã£ã³ã°ã®ãããã³ã«NFSã¯ãåç §ããDNSãµãŒã 1å23ç§ãšã²ã©ãé 延ãæã£ãŠããŸãã [ ã€ã³ã¿ãŒãã§ãŒã¹ ]ã¿ãã©ã®NetflowããŒã¿ãšã¯ã¹ããŒã¿ãŒããæ å ±ãåä¿¡ããããã確èªã§ããŸãã[ ããŒãã« ]ã¿ãã«ã¯ãçžäºäœçšã«é¢ãã詳现æ å ±ã衚瀺ãããŸãã
次ã«ãFlowSensorã«ãã©ãã£ãã¯ãéä¿¡ããŠããããã€ã¹ãèŠã€ããå¿ èŠããããŸããåé¡ã¯ããããããã«ãããŸãã
ããã«ãStealthWatchã¯ãããŒã¿ã®éè€æé€ãå®è¡ããïŒåãã¹ããªãŒã ãçµã¿åãããïŒç¹ã§ç¬ç¹ã§ãããããã£ãŠãã»ãšãã©ãã¹ãŠã®Netflowããã€ã¹ããåéã§ããéè€ããããŒã¿ã倧éã«ããããšãå¿é ããå¿ èŠã¯ãããŸããããŸã£ããéã§ããããã®ã¹ããŒã ã§ã¯ãã©ã®ããããæ倧ã®é 延ãæã£ãŠããããç解ããã®ã«åœ¹ç«ã¡ãŸãã
3.æå·ãããã³ã«HTTPSã®ç£æ»
ETAïŒæå·åãã©ãã£ãã¯åæïŒã¯ãæå·åããããã©ãã£ãã¯ã®æªæã®ããæ¥ç¶ã埩å·åããã«æ€åºãããã·ã¹ã³ãéçºãããã¯ãããžãŒã§ããããã«ããã®ãã¯ãããžãŒã«ãããHTTPSãTLSããŒãžã§ã³ãšæ¥ç¶ã«äœ¿çšãããæå·åãããã³ã«ã«ã解æãã§ããŸãããã®æ©èœã¯ã匱ãæå·èŠæ Œã䜿çšãããããã¯ãŒã¯ããŒããæ€åºããå¿ èŠãããå Žåã«ç¹ã«åœ¹ç«ã¡ãŸãã
泚ïŒæåã«StealthWatch- ETAæå·åç£æ»ã«ãããã¯ãŒã¯ã¢ããªãã€ã³ã¹ããŒã«ããå¿ èŠããããŸãã
[ ããã·ã¥ããŒã ]ã¿ãâ [ ETAæå·åç£æ» ]ã«ç§»åããåæãããã¹ãã°ã«ãŒããéžæããŸããå šäœåãææ¡ããã«ã¯ã[ Inside Hosts]ãéžæããŸãã
TLSããŒãžã§ã³ãšå¯Ÿå¿ããæå·èŠæ Œã衚瀺ãããŠããããšã確èªã§ããŸãã[ ã¢ã¯ã·ã§ã³ ]åã®éåžžã®ã¹ããŒã ã«åŸã£ãŠã[ãããŒã®è¡šç€º]ã«ç§»åããæ°ããã¿ãã§æ€çŽ¢ãéå§ããŸãã
åºåããããã¹ã198.19.20.136ãTLS 1.2 ã§HTTPSã12æé䜿çšããŠãããæå·åã¢ã«ãŽãªãºã ãAES-256ã§ãããã·ã¥é¢æ°ãSHA-384ã§ããããšãããããŸãããããã£ãŠãETAã䜿çšãããšããããã¯ãŒã¯å ã®åŒ±ãã¢ã«ãŽãªãºã ãèŠã€ããããšãã§ããŸãã
4.ãããã¯ãŒã¯ç°åžžã®åæ
Cisco StealthWatchã¯ãã³ã¢ã€ãã³ãïŒã»ãã¥ãªãã£ã€ãã³ãïŒãé¢ä¿ã€ãã³ãïŒã»ã°ã¡ã³ãããããã¯ãŒã¯ã®ããŒãéã®çžäºäœçšã®ã€ãã³ãïŒãããã³åäœåæã® 3ã€ã®ããŒã«ã䜿çšããŠããããã¯ãŒã¯å ã®ãã©ãã£ãã¯ç°åžžãèªèã§ããŸãã
次ã«ãè¡ååæã䜿çšãããšãç¹å®ã®ãã¹ããŸãã¯ãã¹ãã®ã°ã«ãŒãã®çµæçãªè¡åã®ã¢ãã«ãæ§ç¯ã§ããŸãããã®åæã«ãããStealthWatchãééãããã©ãã£ãã¯ãå¢ããã»ã©ãããªã¬ãŒãããæ£ç¢ºã«ãªããŸããæåã¯ãã·ã¹ãã ãå€ãã®èª€ã£ãããªã¬ãŒãããªã¬ãŒãããããã«ãŒã«ãæåã§ãããããå¿ èŠããããŸããã·ã¹ãã ã¯èªåçã«èª¿æŽãããããäŸå€ã«è¿œå ããããããæåã®æ°é±éã¯ãã®ãããªã€ãã³ãã«æ³šæãæããªãããšããå§ãããŸãã
以äžã¯ãäºåèšå®ãããã«ãŒã«ã®äŸã§ãç°åžžãããã¯ãInside Hostsã°ã«ãŒãã®ãã¹ããInside Hostsã°ã«ãŒããšå¯Ÿè©±ãããã©ãã£ãã¯ã24æéã§10ã¡ã¬ãã€ããè¶ ãããšãã€ãã³ããã¢ã©ãŒã ãªãã§çºçããããšã瀺ããŠããŸãã
ããšãã°ãData Hoardingã¢ã©ãŒã ãåãåããŸããããã¯ãäžéšã®ãœãŒã¹/å®å ãã¹ãããã¹ãã°ã«ãŒããŸãã¯ãã¹ãããç°åžžã«å€§éã®ããŒã¿ãããŠã³ããŒã/ããŠã³ããŒãããããšãæå³ããŸããã€ãã³ããã¯ãªãã¯ããŠãããªã¬ãŒãããã¹ãã瀺ãããŠããããŒãã«ã«ç§»åããŸãã次ã«ãData Hoardingåã§å¯Ÿè±¡ã®ãã¹ããéžæããŸãã
162kã®ããã€ã³ãããèŠã€ãããããªã·ãŒã«ãã£ãŠ100kã®ããã€ã³ãããèš±å¯ãããŠããããšã瀺ãã€ãã³ãã衚瀺ãããŸãããããã¯å éšã®StealthWatchã¡ããªãã¯ã§ãã[ Actions ]åã§ã[ View Flows ]ãã¯ãªãã¯ããŸãã
æã ã¯ããšã芳å¯ããããšãã§ããŸãããã®ãã¹ãã¯ããã¹ããšå€ã«çžäºäœçšã10.201.3.47ããã®ã»ãŒã«ã¹ïŒããŒã±ãã£ã³ã°éšéãçµãŠãHTTPSãããã³ã«ãšãããŠã³ããŒã1.4ã®ã¬ãã€ããããã®äŸã¯å®å šã«ã¯æåããªããããããŸããããæ°çŸã®ã¬ãã€ãã®çžäºäœçšã®æ€åºã¯ãŸã£ããåãæ¹æ³ã§å®è¡ãããŸãããã®çµæãç°åžžã®ãããªã調æ»ã¯èå³æ·±ãçµæã«ã€ãªããå¯èœæ§ããããŸãã
泚ïŒSMC Webã€ã³ã¿ãŒãã§ãŒã¹ã§ã¯ã[ ããã·ã¥ããŒã]ã¿ãã®ããŒã¿ã¯å é±ãš[ ã¢ãã¿ãŒ ]ã¿ãã«ã®ã¿è¡šç€ºãããŸãéå»2é±éãå€ãã€ãã³ããåæããŠã¬ããŒããçæããã«ã¯ã管çè ã®ã³ã³ãã¥ãŒã¿ãŒã§Javaã³ã³ãœãŒã«ã䜿çšããå¿ èŠããããŸãã
5.å éšãããã¯ãŒã¯ã¹ãã£ã³ãèŠã€ãã
次ã«ããã£ãŒãã®ããã€ãã®äŸ-æ å ±ã»ãã¥ãªãã£ã€ã³ã·ãã³ããèŠãŠã¿ãŸãããããã®æ©èœã¯ãã»ãã¥ãªãã£ã®å°é家ã«ãšã£ãŠããèå³æ·±ããã®ã§ãã
StealthWatchã«ã¯ãããã€ãã®äºåèšå®ã¿ã€ãã®ã¹ãã£ã³ã€ãã³ãããããŸãã
- ããŒãã¹ãã£ã³-ãœãŒã¹ã¯å®å ãã¹ãã®è€æ°ã®ããŒããã¹ãã£ã³ããŸãã
- Addr tcp scan-ãœãŒã¹ã¯åãTCPããŒããä»ããŠãããã¯ãŒã¯å šäœãã¹ãã£ã³ããå®å IPã¢ãã¬ã¹ãå€æŽããŸãããã®å ŽåããœãŒã¹ã¯TCPãªã»ãããã±ãããåä¿¡ãããããŸã£ããå¿çãåä¿¡ããŸããã
- Addr udp scan-ãœãŒã¹ã¯ãå®å IPã¢ãã¬ã¹ãå€æŽããªãããåãUDPããŒãã§ãããã¯ãŒã¯å šäœãã¹ãã£ã³ããŸããåæã«ãéä¿¡å ã¯ICMPããŒãå°éäžèœãã±ãããåä¿¡ããããå¿çãåä¿¡ããŸããã
- Pingã¹ãã£ã³-ãœãŒã¹ã¯ãåçãèŠã€ããããã«ãããã¯ãŒã¯å šäœã«ICMPèŠæ±ãéä¿¡ããŸãã
- Stealth Scan tp/udp â .
ãã¹ãŠã®å éšã¹ãã£ããŒãåæã«ãã䟿å©ã«é 眮ããããã«ãStealthWatch-å¯èŠæ§è©äŸ¡çšã®ãããã¯ãŒã¯ã¢ããªããããŸããããã·ã¥ããŒãâå¯èŠæ§è©äŸ¡âå éšãããã¯ãŒã¯ã¹ãã£ããŒã¿ãã«ç§»åãããšãéå»2é±éã®ã¹ãã£ã³é¢é£ã®ã»ãã¥ãªãã£ã€ã³ã·ãã³ãã衚瀺ãããŸãã
[ 詳现 ]ãã¿ã³ãã¯ãªãã¯ãããšãåãããã¯ãŒã¯ã®ã¹ãã£ã³ã®éå§ããã©ãã£ãã¯ã®åŸåã察å¿ããã¢ã©ãŒã ã衚瀺ãããŸãã
次ã«ãåã®ã¹ã¯ãªãŒã³ã·ã§ããã®ã¿ããããã¹ãã«ã倱æããããã®ãã¹ãã®å é±ã®ã»ãã¥ãªãã£ã€ãã³ããšã¢ã¯ãã£ããã£ã確èªã§ããŸãã
äŸãšããŠããã¹ã10.201.3.149ãã10.201.0.72ãžã®ããŒãã¹ãã£ã³ã€ãã³ããåæããŠã¿ãŸãããã[ Actions ] > [Associated Flows ]ãã¯ãªãã¯ããŸããã¹ããªãŒã æ€çŽ¢ãéå§ãããé¢é£æ å ±ã衚瀺ãããŸãã
ã芧ã®ãšãããããŒã51508 / TCPã® 1 ã€ããã®ãã®ãã¹ãã¯ãããŒã22ã28ã42ã41ã36ã40 ïŒTCPïŒã§ 3æéåã«å®å ãã¹ããã¹ãã£ã³ããŸããããã¹ãŠã®Netflowãã£ãŒã«ããNetflowãšã¯ã¹ããŒã¿ãŒã§ãµããŒããããŠããããã§ã¯ãªããããäžéšã®ãã£ãŒã«ãã¯æ å ±ã衚瀺ããŸããã
6. CTAã䜿çšããããŠã³ããŒãããããã«ãŠã§ã¢ã®åæ
CTAïŒCognitive Threat AnalyticsïŒã¯ãCisco StealthWatchãšå®å šã«çµ±åãããã·ã°ããã£ã®ãªãåæãã·ã°ããã£åæã§è£å®ã§ããããã«ããã·ã¹ã³ã®ã¯ã©ãŠãåæã§ããããã«ãããããã€ã®æšéŠ¬ããããã¯ãŒã¯ã¯ãŒã ããŒããã€ãã«ãŠã§ã¢ããã®ä»ã®ãã«ãŠã§ã¢ãæ€åºãããããã¯ãŒã¯å ã«æ¡æ£ãããããšãã§ããŸãããŸããåè¿°ã®ETAãã¯ãããžãŒã«ãããæå·åããããã©ãã£ãã¯ã§ãã®ãããªæªæã®ããéä¿¡ãåæã§ããŸãã
æåéããWebã€ã³ã¿ãŒãã§ãŒã¹ã®æåã®ã¿ãã«ã¯ãç¹å¥ãªCognitive Threat AnalyticsãŠã£ãžã§ããããããŸãããçãèŠçŽã¯ããŠãŒã¶ãŒãã¹ãã§æ€åºãããè åšã«ã€ããŠèª¬æããŸãïŒããã€ã®æšéŠ¬ãäžæ£ãªãœãããŠã§ã¢ãè¿·æãªã¢ããŠã§ã¢ã ãæå·åãããããšããèšèã¯ããŸãã«ETAã®ä»äºã®èšŒæ ã§ãããã¹ããã¯ãªãã¯ãããšããã¹ãŠã®æ å ±ãCTAãã°ãå«ãã»ãã¥ãªãã£ã€ãã³ããããããã¢ãŠãããŸãã
CTAã®å段éã«åããŠã察話ã«é¢ãã詳现æ å ±ã衚瀺ãããŸããå®å šãªåæãè¡ãã«ã¯ã[ ã€ã³ã·ãã³ãã®è©³çŽ°ã®è¡šç€º ]ãã¯ãªãã¯ãããšãå¥ã®Cognitive Threat Analyticsã³ã³ãœãŒã«ã衚瀺ãããŸãã
å³äžé ã«ãããã£ã«ã¿ãŒã䜿çšãããšãé倧床ã¬ãã«ããšã«ã€ãã³ãã衚瀺ã§ããŸããç¹å®ã®ç°åžžããã€ã³ããããšãç»é¢ã®äžéšã«ãã°ã衚瀺ããã察å¿ããã¿ã€ã ã©ã€ã³ãå³åŽã«è¡šç€ºãããŸãããããã£ãŠãæ å ±ã»ãã¥ãªãã£éšéã®ã¹ãã·ã£ãªã¹ãã¯ãã©ã®ææãã¹ããã©ã®ã¢ã¯ã·ã§ã³ãå®è¡ããåŸãã©ã®ã¢ã¯ã·ã§ã³ãå®è¡ãå§ããããæ確ã«ç解ããŸãã
以äžã¯å¥ã®äŸã§ã-ãã¹ã198.19.30.36ã«ææãããã³ãã³ã°åããã€ã®æšéŠ¬ããã®ãã¹ãã¯æªæã®ãããã¡ã€ã³ãšçžäºäœçšãå§ãããã°ã¯ãããã®çžäºäœçšã®ãããŒã«é¢ããæ å ±ã瀺ããŸãã
次ã«ãæåã®è§£æ±ºçã®1ã€ã¯ããããªãåŠçãšåæã®ããã«Cisco ISEãšãã€ãã£ãã«çµ±åãããŠããããããã¹ããéé¢ããããšã§ãã
çµè«
Cisco StealthWatchãœãªã¥ãŒã·ã§ã³ã¯ããããã¯ãŒã¯åæãšæ å ±ã»ãã¥ãªãã£ã®äž¡é¢ã§ãäž»èŠãªãããã¯ãŒã¯ç£èŠè£œåã®1ã€ã§ãããã®ãããã§ããããã¯ãŒã¯å ã®äžæ£ãªçžäºäœçšãã¢ããªã±ãŒã·ã§ã³ã®é 延ãæãã¢ã¯ãã£ããªãŠãŒã¶ãŒãç°åžžããã«ãŠã§ã¢ãAPTãæ€åºã§ããŸããããã«ãã¹ãã£ã³ãäŸµå ¥ãã¹ã¿ãŒãHTTPSãã©ãã£ãã¯ã®æå·ç£æ»ã®å®æœãèŠã€ããããšãã§ããŸããããã§ã¯ãããã«å€ãã®ãŠãŒã¹ã±ãŒã¹ãèŠã€ããããšãã§ããŸãã
ãããã¯ãŒã¯ã§ãã¹ãŠãã¹ã ãŒãºãã€å¹ççã«æ©èœããŠããããšã確èªãããå Žåã¯ããªã¯ãšã¹ããéä¿¡ããŠãã ããã
è¿ãå°æ¥ãããŸããŸãªæ å ±ã»ãã¥ãªãã£è£œåã«é¢ããããã€ãã®æè¡åºçç©ãèšç»ããŠããŸãããã®ãããã¯ã«èå³ãããå Žåã¯ãç§ãã¡ã®ãã£ã³ãã«ïŒTelegramãFacebookãVKãTSãœãªã¥ãŒã·ã§ã³ããã°ïŒïŒ