nanog mailing list archives

RE: HTTPS redirects to HTTP for monitoring


From: Teleric Team <teleric-lists () outlook com>
Date: Sun, 18 Jan 2015 13:41:22 -0500

Honestly, don't do this. Neither option.You can still have some control over SSL access with ordinary domain based 
filtering getting proxied, via CONNECT method or sorta. You don't need filtering capabilities over full 
POST/DELETE/UPDATE HTTP methods, and if you believe you need it, you just have a bigger problem that MITMing won't 
solve at all. It's just like believing a data leak prevention system will really prevent data leaking.
Or believing a Palo Alto NGFW policy that allows gmail but won't allow gmail attachments of mime-type XYZ will be 
effective. If someone is really interested, there are clever ways to bypass it, more clever than your options to filter 
it.
Forcing http fallback for https communication is not only wrong, it's a general regression regarding security policy 
and best practices. You are risking privacy, or "confidentiality" and "integrity" if you prefer 27002 buzzwords. Not to 
mention the "availability" breakage since many applications won't just work (aka, you will break 'em).
On the other hand, adding a MITM strategy, be using Squid, Fortinet, pfSense, Palo Alto, Sonicwall, EndianFW, is just 
worse. You are adding you own an attack vector on your company. You are doing the difficult part of the attack for the 
attacker, installing a custom root cert in your client stations. So you will have much more to worry about, from "who 
has access", "how vulnerable" and "how to deploy" until "what is deployed", "what is revogated", "how's renegotiation, 
CRIME, etc like". You will have more problem root and vectors to care about. Not only how safe is the remote 
destination SSL server, but how save is the client to local proxy doing MITM and local proxy doing MITM to remote SSL 
server. 
You are attacking, cracking and breaking your own network. If someone raise your squid log levels, you will have to 
respond for that, and respond for what was copied before you noticed it. Same goes for Fortinet, Websense, Sonicwall, 
or whatever open source or proprietary solution you pick. You are still breaking "confidentiality" and "integrity" but 
now without allowing for ordinary users or applications to notice it.
Back to the beginning: you can still do some level of HTTPS filtering and per domain controlling without having to 
fully MITM and inspect the payload. Don't add OWASP Top 10 / SANS Top 25 facilitation vectors to your company. Do the 
usual limited but still "safe" (oh no, not counting that unknown openssl zero-day NSA and people on IRC know about but 
industry stills ignore, or any other conspirator theory/fact), filtering... do just whatever can be filtered without 
MITMing https and HTTP redirection. And don't be seduced by the possibility of filtering more than that. It's a trap, 
for both your users and your responsibilities as organization regarding users' privacy not to mention possible ACTs and 
other laws on your state/contry.


Date: Sun, 18 Jan 2015 04:29:56 -0800
Subject: HTTPS redirects to HTTP for monitoring
From: shortdudey123 () gmail com
To: nanog () nanog org

Hi Everyone,

I wanted to see what opinions and thoughts were out there.  What software,
appliances, or services are being used to monitor web traffic for
"inappropriate" content on the SSL side of things?  personal use?
enterprise enterprise?

It looks like Websense might do decryption (
http://community.websense.com/forums/t/3146.aspx) while Covenant Eyes does
some sort of session hijack to redirect to non-ssl (atleast for Google) (
https://twitter.com/CovenantEyes/status/451382865914105856).

Thoughts on having a product that decrypts SSL traffic internally vs one
that doesn't allow SSL to start with?

-Grant
                                          

Current thread: