zlacker

[return to "BlueCoat and other proxies hang up during TLS 1.3"]
1. db48x+D2[view] [source] 2017-02-28 02:06:00
>>codero+(OP)
The long-term solution is simply not to work anywhere that insists on running a MITM attack on all of your communications.
◧◩
2. wildmu+n4[view] [source] 2017-02-28 02:34:57
>>db48x+D2
Without an SSL MITM, Intrusion Detection Systems (IDS's) are much less effective.

If you're using your company's network, then they have every right to monitor all of the activity on it. They're trying to protect trade secrets, future plans, customer data, employee records, etc. from attackers who would use that information to do harm to the company, its customers, and its employees. If you don't want your employer to know what you're doing, then don't use the company computer or company network to do it. And while you may think that you're too tech savvy to fall prey to malware 1) not everyone at your company is, and 2) no amount of savvy will protect you from all malware, especially ones that gain a foothold through an unpatched exploit. And there's also that whole other can of worms: malicious employees.

◧◩◪
3. zrm+Rc[view] [source] 2017-02-28 04:27:16
>>wildmu+n4
> If you're using your company's network, then they have every right to monitor all of the activity on it.

It isn't a question of whether they're allowed to do it, it's a question of whether they should do it.

It's ineffective against insider exfiltration of data unless you're also doing body cavity searches for USB sticks, and if you're at that point then the sensitive network should not be connected to the internet at all.

And it's similarly ineffective against malware because TLS is not the only form of encryption. What difference does it make if someone uploads a file using opaque TLS vs. uploading an opaque encrypted file using MITM'd TLS? Banning encrypted files, even if you could actually detect them, doesn't work because they're often required for regulatory compliance.

It isn't worth the security cost. The situation in the article is bad enough, but consider what happens if the MITM appliance itself gets compromised when it has a root private key trusted by all your devices and modify access to all the traffic.

◧◩◪◨
4. theluk+Eh[view] [source] 2017-02-28 05:23:34
>>zrm+Rc
>It's ineffective against insider exfiltration of data unless you're also doing body cavity searches for USB sticks, and if you're at that point then the sensitive network should not be connected to the internet at all.

We opted to disable usb mass storage since cavity searches seemed a little much

◧◩◪◨⬒
5. zrm+gj[view] [source] 2017-02-28 05:49:36
>>theluk+Eh
> We opted to disable usb mass storage since cavity searches seemed a little much

This is missing the point. Someone could plug a SATA drive directly into the motherboard, or otherwise compromise their work computer to disable the restrictions, or take pictures of documents with a camera, or bring their own computer on-site, or bring a line-of-sight wireless network device on-site, or send the data over the internet as an encrypted file or via ssh or using steganograhy and so on.

The point is that preventing data exfiltration is not a trivial task, and if you're at all serious about it then the network containing the secrets is not connected to the internet. And if it's less serious than that then it can't justify a high-risk TLS MITM device.

◧◩◪◨⬒⬓
6. jlgadd+El[view] [source] 2017-02-28 06:24:04
>>zrm+gj
And the A-Team could land on the roof with a helicopter in the middle of the night, take control of the building, breach the data center, and physically steal and leave with all the servers.

Yes, if one is determined enough, they will find a way to steal data.

> It isn't worth the security cost.

That's up for the company to decide... and apparently they have decided that it is worth the cost, regardless of what zrm, random person on the Internet, thinks.

◧◩◪◨⬒⬓⬔
7. zrm+2r[view] [source] 2017-02-28 07:44:13
>>jlgadd+El
That is just an appeal to authority rooted in the assumption that corporations never make purchasing decisions based on vendor marketing.
[go to top]