{"id":207,"date":"2020-07-05T12:29:57","date_gmt":"2020-07-05T11:29:57","guid":{"rendered":"http:\/\/www.labtinker.net\/?p=207"},"modified":"2020-07-05T12:29:57","modified_gmt":"2020-07-05T11:29:57","slug":"securing-sftp","status":"publish","type":"post","link":"http:\/\/18.135.13.153\/?p=207","title":{"rendered":"Securing SFTP?"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">I recently came upon a situation where there was a request to allow an SFTP connection out to the Internet for secure file transfer. My previous posts have been concerned with stopping  SSH tunnels on non-standard ports but some may have viewed this as an academic exercise as most enterprises insist outbound connections are made through a proxy server. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">A proxy understands HTTP (including HTTPS as most proxies implement SSL interception) and FTP and can inspect these traffic streams for threats. You can also proxy SFTP (and other things) but need to use the HTTP Connect method or a SOCKS proxy to do this. Both of these methods deny the proxy any visibility of the traffic. First a word on SFTP:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">SFTP is not related to FTP \u2013 save by the name which is misleading. SFTP (and SCP for that matter) run their file transfer service using SSH. My confusion on this matter was cleared up by the book \u2018SSH \u2013 The Secure Shell\u2019 by Barrett, Silverman and Byrnes published by O\u2019Reilly): a refreshingly dead-tree reference for you that goes into much more detail.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">(FTPS is different again, this is FTP over SSL but I\u2019m not going there)<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">I googled a bit and found out that Palo Alto did SSH-proxying which sounded promising.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/9-0\/pan-os-admin\/decryption\/decryption-concepts\/ssh-proxy.html#id2053e5f5-25e0-4543-b372-b2e027316753\">https:\/\/docs.paloaltonetworks.com\/pan-os\/9-0\/pan-os-admin\/decryption\/decryption-concepts\/ssh-proxy.html#id2053e5f5-25e0-4543-b372-b2e027316753<\/a>)<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"> and with this lead I headed to my virtual lab (Well, AWS: I know, I know, but, damn, these cloud platforms are handy)<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>The Goal<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">My goal in this lab was to see if I could intercept a dummy virus in an sftp file transfer. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>The Lab<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Firstly, I needed an SFTP server. In the AWS marketplace I found a pre-baked one:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"102\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image.png\" alt=\"\" class=\"wp-image-208\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image.png 602w, http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-300x51.png 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><figcaption>Figure 1: SFTP Server.<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">And as we&#8217;re going to take a Palo for a spin, we also need:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"81\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-1.png\" alt=\"\" class=\"wp-image-209\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-1.png 602w, http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-1-300x40.png 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><figcaption>Figure 2: Firewall du jour<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">I used the lab topology that I have favoured recently. To pad out the blog (and save you scrolling down) reproduced here:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"354\" height=\"425\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/SFTP-Lab.png\" alt=\"\" class=\"wp-image-210\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/SFTP-Lab.png 354w, http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/SFTP-Lab-250x300.png 250w\" sizes=\"auto, (max-width: 354px) 100vw, 354px\" \/><figcaption>Figure 3: Today&#8217;s lab<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Working from the DMZ windows machine shown, I downloaded my dummy virus file from eicar ( <a href=\"https:\/\/www.eicar.org\/\">https:\/\/www.eicar.org\/<\/a>). I got evidence that this worked fromthe Windows Servers&#8217; pre-installed version of Windows Defender which quarantined the file.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"273\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-2.png\" alt=\"\" class=\"wp-image-211\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-2.png 602w, http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-2-300x136.png 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><figcaption>Figure 4: Windows defender defends.<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">So, after nobbling this&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"516\" height=\"223\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-3.png\" alt=\"\" class=\"wp-image-212\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-3.png 516w, http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-3-300x130.png 300w\" sizes=\"auto, (max-width: 516px) 100vw, 516px\" \/><figcaption>Figure 5: Down, boy!<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">I downloaded my eicar file again and using the Filezilla SFTP client on the Windows machine. (<a href=\"https:\/\/filezilla-project.org\/\">https:\/\/filezilla-project.org\/<\/a>). I connected to my SFTP server and copied up a copy of a normal text file (so good, it was suffixed twice) and my dummy virus file (eicar.txt) with no problem.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-4.png\" alt=\"\" class=\"wp-image-213\" width=\"587\" height=\"187\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-4.png 587w, http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-4-300x96.png 300w\" sizes=\"auto, (max-width: 587px) 100vw, 587px\" \/><figcaption>Figure 6: Copying a normal and dummy virus file to SFTP server.<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">OK, time to break out our Anti-Virus on the Palo. Now there was bit of faffing around with this which I will reproduce here as if I need to do this again I can remind myself of the loops I had to jump through. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The default AV profile doesn&#8217;t actually mention ssh in its decoders but anyway&#8230; <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"163\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-19.png\" alt=\"\" class=\"wp-image-229\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-19.png 602w, http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-19-300x81.png 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><figcaption>Figure 6a &#8211; Palo&#8217;s default Anti-Virus profile.<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">OK, in the decryption profile for &#8216;SSH Proxy&#8217;  I initially ticked all the boxes, as you do, but this caused issues (see later) possibly because I was using SFTP &#8211; I don&#8217;t know. In the end I unticked all the extra options:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"369\" height=\"269\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-5.png\" alt=\"\" class=\"wp-image-215\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-5.png 369w, http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-5-300x219.png 300w\" sizes=\"auto, (max-width: 369px) 100vw, 369px\" \/><figcaption>Figure 7: SSH Proxy in Decryption Profile.<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">In the Palo, you set up decryption rules to match the traffic you want decrypting (more usually for SSL).  So having created my decryption profile I added in a decryption rule as follows:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"145\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-6.png\" alt=\"\" class=\"wp-image-216\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-6.png 602w, http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-6-300x72.png 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><figcaption>Figure 8: Decrypt rule source<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"139\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-7.png\" alt=\"\" class=\"wp-image-217\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-7.png 602w, http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-7-300x69.png 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><figcaption>Figure 9: Decrypt rule destination<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"156\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-8.png\" alt=\"\" class=\"wp-image-218\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-8.png 602w, http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-8-300x78.png 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><figcaption>Figure 10: Decrypt rule port<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"187\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-20.png\" alt=\"\" class=\"wp-image-234\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-20.png 602w, http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-20-300x93.png 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><figcaption>Fig 11: Decrypt Options<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">I set up the default AV profile on my outbound Access rule..<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"198\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-10.png\" alt=\"\" class=\"wp-image-220\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-10.png 602w, http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-10-300x99.png 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><figcaption>Figure 12: Select default AV profile.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"83\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-11.png\" alt=\"\" class=\"wp-image-221\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-11.png 602w, http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-11-300x41.png 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><figcaption>Figure 13: Rule using said AV profile.<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Initially I got this when I tried to commit this policy&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"590\" height=\"250\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-12.png\" alt=\"\" class=\"wp-image-222\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-12.png 590w, http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-12-300x127.png 300w\" sizes=\"auto, (max-width: 590px) 100vw, 590px\" \/><figcaption>Figure 14: Ooops<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">So, note to self, the AWS Palo doesn&#8217;t come pre-loaded with AV signatures and why would it?<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">I went over to the dynamic updates&#8230;.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"202\" height=\"86\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-13.png\" alt=\"\" class=\"wp-image-223\"\/><figcaption>Figure 15: Dynamic Updates<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">&#8230;restored an AWS Elastic IP address to my Palo&#8217;s managment interface (where the update traffic originates from) and then downloaded and installed the AV sigs..<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"158\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-14.png\" alt=\"\" class=\"wp-image-224\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-14.png 602w, http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-14-300x79.png 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><figcaption>Figure 16: AV signatures in place.<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Initially, when connecting from the Windows DMZ server to my SFTP server I saw this in Filezilla&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"502\" height=\"103\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-16.png\" alt=\"\" class=\"wp-image-226\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-16.png 502w, http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-16-300x62.png 300w\" sizes=\"auto, (max-width: 502px) 100vw, 502px\" \/><figcaption>Figure 17: Filezilla error.<br><\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">And this in the logs&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"91\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-17.png\" alt=\"\" class=\"wp-image-227\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-17.png 602w, http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-17-300x45.png 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><figcaption>Figure 18: Unsupported ssh<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">&#8230;so I adjusted my SSH Proxy profile as detailed above and pressed on whereupon I was able to connect successfully to the server, (good) and transfer my eicar profile (bad). The following log excerpt doesn&#8217;t really show that but does show we aren&#8217;t decrypting..<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"89\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-18.png\" alt=\"\" class=\"wp-image-228\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-18.png 602w, http:\/\/18.135.13.153\/wp-content\/uploads\/2020\/07\/image-18-300x44.png 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><figcaption>Figure 19: No decryption.<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">This is when my faith in the wisdom of my enterprise began to falter and I fully read the Palo link I&#8217;d shared above. (I like to demonstrate to the wisdom of RTFM by generally failing to do so until forced.)<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This is the relevant excerpt<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><em>When the client sends an SSH request to the server to initiate a session, the firewall intercepts the request and forwards it to the server. The firewall then intercepts the server response and forwards it to the client. This establishes two separate SSH tunnels, one between the firewall and the client and one between the firewall and the server, with firewall functioning as a proxy. As traffic flows between the client and the server, the firewall checks whether the SSH traffic is being routed normally or if it is using SSH tunneling (port forwarding). <strong>The firewall doesn\u2019t perform content and threat inspection on SSH tunnels<\/strong>; however, if the firewall identifies SSH tunnels, it blocks the SSH tunneled traffic and restricts the traffic according to configured security policies.<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This confused me a little bit. Initially I interpreted it as saying that the firewall can&#8217;t inspect SSH but I believe it means you it can&#8217;t intercept another protocol tunnled over SSH which is fair enough. Doesn&#8217;t that mean SSH and SFTP traffic should be inspected for threats?<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">I decided to try the decrypt rule with plain old SSH and so spun up an AWS Linux server and tried to connect to this from my Windows DMZ machine. I found I couldn\u2019t connect through the firewall when the \u2018ssh-proxy\u2019 decrypt rule was enabled; though could when I disabled this rule. I guess this was because AWS SSH authentication uses the public\/private key method rather than a password and the firewall is a MITM. I didn\u2019t dwell on this but it proved the ssh-proxy rule was intercepting SSH (and thus SFTP) and so should have decrypted SFTP.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">My conclusions based on the limited time and effort I was able to put in, was that ssh interception didn&#8217;t work with SFTP nor with SSH  when using public\/private key. I was mainly interested in the former use-case. It could be that I&#8217;m doing something wrong but there doesn&#8217;t seem as if there should be that much to it, following Palo&#8217;s how-to.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For some reason, I didn&#8217;t find this blog on the same subject written by Phoneboy five years ago when I first searched.  Here is his eloquent take on the matter:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"http:\/\/phoneboy.org\/2015\/07\/29\/lies-damn-lies-and-inspecting-ssh-traffic-securely\/\">http:\/\/phoneboy.org\/2015\/07\/29\/lies-damn-lies-and-inspecting-ssh-traffic-securely\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I recently came upon a situation where there was a request to allow an SFTP connection out to the Internet for secure file transfer. My previous posts have been concerned with stopping SSH tunnels on non-standard ports but some may have viewed this as an academic exercise as most enterprises insist outbound connections are made [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,12],"tags":[],"class_list":["post-207","post","type-post","status-publish","format-standard","hentry","category-firewalls","category-security"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"http:\/\/18.135.13.153\/index.php?rest_route=\/wp\/v2\/posts\/207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/18.135.13.153\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/18.135.13.153\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/18.135.13.153\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/18.135.13.153\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=207"}],"version-history":[{"count":0,"href":"http:\/\/18.135.13.153\/index.php?rest_route=\/wp\/v2\/posts\/207\/revisions"}],"wp:attachment":[{"href":"http:\/\/18.135.13.153\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/18.135.13.153\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=207"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/18.135.13.153\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}