zlacker

BlueCoat and other proxies hang up during TLS 1.3

submitted by codero+(OP) on 2017-02-28 01:31:38 | 288 points 203 comments
[view article] [source] [go to bottom]

NOTE: showing posts with links only show all posts
◧◩
16. discre+84[view] [source] [discussion] 2017-02-28 02:29:02
>>jessau+k2
This is something the TLS spec authors have prepared against with GREASE. The idea is the client adds some junk version information to its list of supported protocols. To quote: "Correct server implementations will ignore these values and interoperate. Servers that do not tolerate unknown values will fail to interoperate with existing clients, revealing the mistake before it is widespread."

https://tools.ietf.org/html/draft-davidben-tls-grease-00

◧◩◪
19. discre+m4[view] [source] [discussion] 2017-02-28 02:33:46
>>Viper0+U2
Basic filtering can be done via passively inspecting SNI headers and terminating connections to verboten hosts. However, that's not enough for some orgs, and some software works around it: https://www.bamsoftware.com/papers/fronting/
◧◩◪◨
28. bgc+Q6[view] [source] [discussion] 2017-02-28 03:07:55
>>x1798D+F5
The Board doesn't have a choice, under CIPA[0], content filtering is a requirement for the FCC's E-Rate program[1] in which the government pays some of the cost of the school's internet connection.

[0]https://www.fcc.gov/consumers/guides/childrens-internet-prot...

[1]https://www.fcc.gov/general/universal-service-program-school...

38. xfs+B8[view] [source] 2017-02-28 03:30:41
>>codero+(OP)
The title was editorialized. TLS 1.3 is a working draft and Chromium is just doing field trial with it.

A few days ago there were other issues with this causing Chromium to stop working on *.google.com so it's not just about middle-boxes.

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855434

https://bugs.chromium.org/p/chromium/issues/detail?id=693943

◧◩◪◨
46. ademar+ga[view] [source] [discussion] 2017-02-28 03:53:38
>>userbi+z8
> It sounds like a perfectly reasonable behaviour if the goal is to "fail closed", to provide more security in a fashion similar to a whitelist.

This reminds me of firewalls that weaken security by filtering unrecognized HTTP headers: https://news.ycombinator.com/item?id=12655180

50. moreco+lc[view] [source] 2017-02-28 04:22:20
>>codero+(OP)
Amazing how this was predicted coming on a year ago*

> At this point it's worth recalling the Law of the Internet: blame attaches to the last thing that changed.

> There's a lesson in all this: have one joint and keep it well oiled.

> When we try to add a fourth (TLS 1.3) in the next year, we'll have to add back the workaround, no doubt. In summary, this extensibility mechanism hasn't worked well because it's rarely used and that lets bugs thrive.

* https://www.imperialviolet.org/2016/05/16/agility.html

◧◩◪◨
55. FireBe+de[view] [source] [discussion] 2017-02-28 04:44:14
>>hermit+x5
> and to monitor for IP theft - we did sue a soon former employee after he emailed source for a quantitative model to his personal gmail

That wouldn't be a certain Sergey Aleynikov and GS would it? (https://en.wikipedia.org/wiki/Sergey_Aleynikov)

◧◩◪
59. nl+we[view] [source] [discussion] 2017-02-28 04:48:34
>>jessau+d2
Bluecoat is extremely widely used in some fields. They were in the news a while back when it was discovered that Syria (before the civil war) was censoring their internet access using Bluecoat devices (allegedly unauthorized by Bluecoat)[1]

[1] https://en.wikipedia.org/wiki/Blue_Coat_Systems#Use_by_repre...

◧◩◪◨⬒
80. fulafe+ol[view] [source] [discussion] 2017-02-28 06:21:02
>>wildmu+Aj
> > In fact, this specific thing is what TLS is designed to prevent, and new implementations of the protocol are only going to get better at preventing it.

> This isn't true. The TLS protocol is not a philosophy; [...]

Well, the TLS specification [1] says as the first sentence of the introduction:

"The primary goal of the TLS protocol is to provide privacy and data integrity between two communicating applications."

I think, if something is "the primary design objective of TLS", it can be said that TLS is designed to do it.

[1] https://tools.ietf.org/html/rfc5246#section-1

◧◩◪
81. semi-e+yl[view] [source] [discussion] 2017-02-28 06:22:36
>>jessau+d2
There was a paper posted on HN a few weeks back by some pretty serious security researchers on the security risks of SSL MITM boxes.

https://jhalderm.com/pub/papers/interception-ndss17.pdf

How do you fix this when you're naught but a humble employee? Well, a friend of mine worked at a fairly large tech company where a salesguy for these boxes had convinced the CTO they had to have them. Every tech-person "on the floor" hated the idea, so before the boxes were installed they conspired on their free time to write some scripts that ran lots of legitimate HTTPS traffic, effectively DDOSing the boxes and bringing the company's internet to a crawl for the day, like Google would take ten seconds to open. Then obviously everyone (including the non-tech people) started calling the IT helpdesk complaining that the internet was broken. MITM box salesguy then had to come up with a revised solution, costing 20x more than his first offer, and that was the end of that.

If you already are suffering under MITM boxes, a similar strategy with a slow ramp-up in traffic might work.

◧◩◪◨
87. deatha+mm[view] [source] [discussion] 2017-02-28 06:37:39
>>userbi+z8
I've written a similar rebuttal to your sibling's comment here[1].

This isn't "failing closed", and this isn't a whitelist. TLS allows you to whitelist to certain versions of the protocol during the initial negotiation at the start of the protocol; that is the opportunity for either end to state what version of the protocol they'd like. It is not permissible in the protocol to close the connection as Blue Coat is doing.

This isn't a downgrade attack, either: both server and client are free to choose their protocol version at the beginning. The client & server will later verify that the actual protocol in use is the one they intended; this is what prevents downgrades.

[1]: https://news.ycombinator.com/item?id=13751737

103. dang+Ot[view] [source] 2017-02-28 08:25:57
>>codero+(OP)
Edit: oops, my mistake. Carry on.

> Have some god damn ethics

Personal attacks are not allowed on HN. We ban accounts that do this, so please don't do it.

We detached this subthread from https://news.ycombinator.com/item?id=13750650 and marked it off-topic.

◧◩◪◨⬒
114. pluma+Qx[view] [source] [discussion] 2017-02-28 09:25:33
>>bgc+Q6
Seems like some people disagree with this interpretation: https://twitter.com/N805DN/status/835945815227138048

AIUI CIPA doesn't require MITM but most schools interpret it that way.

129. peterk+9E[view] [source] 2017-02-28 11:06:06
>>codero+(OP)
From https://www.bluecoat.com/products-and-solutions/ssl-visibili...

> "Enterprise class Blue Coat’s SSL Visibility Appliance is comprehensive, extensible solution that assures high-security encryption. While other vendors only support a handful of cipher-standards, the SSL Visibility Appliance provides timely and complete standards support, with over 70 cipher suites and key exchanges offered, and growing. Furthermore, unlike competitive offerings, this solution does not “downgrade” cryptography levels and weaken your organization’s security posture, putting it at greater risk. As the SSL/TLS standards evolve, so will the management and enforcement capabilities of the SSL Visibility Appliance."

◧◩◪◨⬒⬓⬔
141. kuschk+cL[view] [source] [discussion] 2017-02-28 12:39:28
>>avodon+NI
Like this: http://i.imgur.com/VXomB7p.png
◧◩◪◨⬒
160. Jonnax+8U[view] [source] [discussion] 2017-02-28 14:15:30
>>adrian+sr
The internet has changed significantly over the last few years and a lot of sites don't support unencrypted connections.

It's pretty entertaining to read this stack overflow questions about using ssl from 7 years ago: http://stackoverflow.com/questions/2177159/should-all-sites-...

◧◩◪◨
190. daxelr+5t1[view] [source] [discussion] 2017-02-28 18:09:40
>>phkahl+4J
What law in the US makes it illegal to circumvent an encryption system? I can think of the DMCA's prohibitions against circumvention measures for DRM, but that's specific to protecting copyrighted works.

This FindLaw article http://employment.findlaw.com/workplace-privacy/privacy-in-t... agrees that employers have a right to monitor communications from their devices on their networks, especially when this policy has been clearly laid out and agreed to by employees. Expectation of privacy is a major deciding factor in US law.

I'm not sure of the legality of an ISP doing this. I would hope it's illegal, but ISPs are weirdly regulated compared to, say, phone companies.

◧◩◪◨⬒⬓⬔
192. jessau+zx1[view] [source] [discussion] 2017-02-28 18:30:29
>>daxelr+Ri1
Keep up man! Upthread [0], reference was made to a study that's recently made the rounds detailing the basic insecurity of MitM devices. The problem isn't only that corporate network admins see everything, it's also that after the device downgrades TLS (or worse) attackers can also see what they want...

[0] https://news.ycombinator.com/item?id=13751715

◧◩◪◨⬒⬓
200. cesarb+Xf2[view] [source] [discussion] 2017-02-28 22:58:24
>>mbruml+Gb1
From what I've read (http://www.gremwell.com/ssh-mitm-public-key-authentication), if you use public key authentication with SSH, the MITM will break the authentication (forcing ssh to ask for a password). It's the same as with TLS client certificate authentication: in the same way the server certificate authenticates the server to your browser, the client certificate authenticates your browser to the server, and the server will reject MITM connections as unauthenticated.

While unfortunately for TLS client certificates are not a solution against MITM due to their awful user experience and privacy concerns, for SSH public key authentication has a good user experience, and is very common.

[go to top]