zlacker

[parent] [thread] 83 comments
1. JoshTr+(OP)[view] [source] 2017-02-28 01:38:28
Note that this happens even when using a BlueCoat proxy in non-MITM mode. BlueCoat tries to "analyze" TLS connections, and rejects anything it doesn't understand. This exact issue occurred with TLS 1.2 back when BlueCoat only understood 1.1/1.0.

In this case, it doesn't sound like they're reverting it because of overall breakage, but rather because it breaks the tool that would otherwise be used to control TLS 1.3 trials and other configuration. Firefox had a similar issue, where they temporarily used more conservative settings for their updater than for the browser itself, to ensure that people could always obtain updates that might improve the situation.

replies(6): >>codero+x >>quotem+H >>mrmond+01 >>jessau+H1 >>peterw+IM >>jandre+911
2. codero+x[view] [source] 2017-02-28 01:47:50
>>JoshTr+(OP)
Rejecting anything it doesn't understand sounds like a bug to me. If it sees that it's TLS, it should attempt a protocol downgrade. There's absolutely no reason for this to break, as TLS 1.3 exists alongside TLS 1.2 (For now).
replies(5): >>ehsank+R >>234dd5+16 >>userbi+38 >>jlgadd+pk >>skywho+AM
3. quotem+H[view] [source] 2017-02-28 01:50:07
>>JoshTr+(OP)
Ridiculously conservative middleboxes are why we can't have nice things and why we need to encrypt all new protocols, security properties aside.
replies(3): >>jlgadd+Jj >>Daniel+ul >>peterw+dN
◧◩
4. ehsank+R[view] [source] [discussion] 2017-02-28 01:52:24
>>codero+x
The surprising part (or maybe not) is that BlueCoat had been made aware of this change months ago and never got around properly testing it. This one of the softwares main purpose, and the fact that they didn't even make sure it works on the newest Chrome, leading to such a mess, is pretty sad.
replies(1): >>nikanj+pp
5. mrmond+01[view] [source] 2017-02-28 01:53:28
>>JoshTr+(OP)
BlueCoat are an incredibly evil company that are breaking the internet.
replies(1): >>rossy+s7
6. jessau+H1[view] [source] 2017-02-28 02:02:23
>>JoshTr+(OP)
This exact issue occurred with TLS 1.2 back when BlueCoat only understood 1.1/1.0.

Good grief! From David Benjamin's final comment:

Note these issues are always bugs in the middlebox products. TLS version negotiation is backwards compatible, so a correctly-implemented TLS-terminating proxy should not require changes to work in a TLS-1.3-capable ecosystem. It can simply speak TLS 1.2 at both client <-> proxy and proxy <-> server TLS connections. That these products broke is an indication of defects in their TLS implementations.

It's understandable that I've never heard of BlueCoat: clearly this product's success is based more on selling to executives than on quality, and it has been some time since I worked in an organization that had executives to sell to.

replies(5): >>jacque+E2 >>nl+0e >>pjmlp+3k >>semi-e+2l >>skywho+RL
◧◩
7. jacque+E2[view] [source] [discussion] 2017-02-28 02:13:47
>>jessau+H1
It sounds like it might be a worthwhile effort to reverse engineer one of those.
replies(1): >>Alyssa+rv
◧◩
8. 234dd5+16[view] [source] [discussion] 2017-02-28 03:02:51
>>codero+x
It's a security feature, often malware will send encrypted traffic over 443 in an attempt to bypass firewalls. If BlueCoat can't understand the traffic, it drops it as it assumes it's malicious.
replies(2): >>theamk+09 >>jarym+Kt
◧◩
9. rossy+s7[view] [source] [discussion] 2017-02-28 03:21:33
>>mrmond+01
BlueCoat makes me cry. We have an application running inside the firewall of one of our clients that communicates with a HTTPS REST API hosted by a server in our datacenter. The connection must be encrypted because it handles confidential information, but when it passes through BlueCoat's TLS proxy, the Authorization header gets mangled and it can't authenticate against our backend. Higher-ups decided that it would be better to try to convince the client to let our app bypass their proxy than to implement a custom workaround for BlueCoat users, but the client never let us through, so the only solution we could implement involved manually SCPing the required data between client and server.
replies(1): >>reacwe+8x
◧◩
10. userbi+38[view] [source] [discussion] 2017-02-28 03:30:01
>>codero+x
Rejecting anything it doesn't understand sounds like a bug to me.

It sounds like a perfectly reasonable behaviour if the goal is to "fail closed", to provide more security in a fashion similar to a whitelist.

If it sees that it's TLS, it should attempt a protocol downgrade.

I don't remember the exact details but I recall reading that TLS has a mechanism to prevent version downgrades, precisely to defend against such "attacks", so the connection would not succeed in that case either.

replies(4): >>codero+99 >>ademar+K9 >>tbrowb+3d >>deatha+Ql
◧◩◪
11. theamk+09[view] [source] [discussion] 2017-02-28 03:43:09
>>234dd5+16
But the traffic is totally understandable -- the right action does not require knowing what TLS 1.3 is.

The way it is supposed to work is as following: there is a protocol negotiation when the connection is established (which is obviously unencrypted), which contains TLS version supported. If MITM proxy does not understand the version, it can just change these bytes to force hosts to negotiate at a lower version.

So the only reason BlueCoat fails is because the authors failed to implement force version downgrade.

◧◩◪
12. codero+99[view] [source] [discussion] 2017-02-28 03:45:43
>>userbi+38
Client and Server exchange a list of capabilities at the beginning of a TLS connection, if the proxy just filters out the protocols/versions it doesn't understand, server/client will agree on a different version (like 1.2).
◧◩◪
13. ademar+K9[view] [source] [discussion] 2017-02-28 03:53:38
>>userbi+38
> It sounds like a perfectly reasonable behaviour if the goal is to "fail closed", to provide more security in a fashion similar to a whitelist.

This reminds me of firewalls that weaken security by filtering unrecognized HTTP headers: https://news.ycombinator.com/item?id=12655180

◧◩◪
14. tbrowb+3d[view] [source] [discussion] 2017-02-28 04:35:27
>>userbi+38
The TLS negotiation is mutual. Both endpoints tell each other what they support and they agree on a protocol that's mutually supported.

If merely advertising 1.3 while still advertising older versions causes blue coat to break, it has a bug in TLS version negotiation.

There is no downgrade or whitelist or failing closed. Each end says what they support and BlueCoat blows up the connection if it sees that the other end supports a newer version. It should say "oh we both support 1.2 let's use that" And apparently it's done this before so there's even less an excuse for it.

replies(1): >>rocqua+3u
◧◩
15. nl+0e[view] [source] [discussion] 2017-02-28 04:48:34
>>jessau+H1
Bluecoat is extremely widely used in some fields. They were in the news a while back when it was discovered that Syria (before the civil war) was censoring their internet access using Bluecoat devices (allegedly unauthorized by Bluecoat)[1]

[1] https://en.wikipedia.org/wiki/Blue_Coat_Systems#Use_by_repre...

◧◩
16. jlgadd+Jj[view] [source] [discussion] 2017-02-28 06:04:35
>>quotem+H
[ off-topic comment deleted ]
replies(1): >>kbart+Ym
◧◩
17. pjmlp+3k[view] [source] [discussion] 2017-02-28 06:08:01
>>jessau+H1
They have many costumers on the Fortune 500 portfolio that make sure the workers only visit the web sites they should and also IT get to know when they misbehave.

Quite a pain to work in such environments.

◧◩
18. jlgadd+pk[view] [source] [discussion] 2017-02-28 06:12:16
>>codero+x
On the other hand, allowing stuff that you don't understand gives us things like the CSRF vulnerabilities in MongoDB and such.

In the case of a security appliance -- such as this -- it should, in my opinion, "fail closed".

replies(1): >>deatha+ol
◧◩
19. semi-e+2l[view] [source] [discussion] 2017-02-28 06:22:36
>>jessau+H1
There was a paper posted on HN a few weeks back by some pretty serious security researchers on the security risks of SSL MITM boxes.

https://jhalderm.com/pub/papers/interception-ndss17.pdf

How do you fix this when you're naught but a humble employee? Well, a friend of mine worked at a fairly large tech company where a salesguy for these boxes had convinced the CTO they had to have them. Every tech-person "on the floor" hated the idea, so before the boxes were installed they conspired on their free time to write some scripts that ran lots of legitimate HTTPS traffic, effectively DDOSing the boxes and bringing the company's internet to a crawl for the day, like Google would take ten seconds to open. Then obviously everyone (including the non-tech people) started calling the IT helpdesk complaining that the internet was broken. MITM box salesguy then had to come up with a revised solution, costing 20x more than his first offer, and that was the end of that.

If you already are suffering under MITM boxes, a similar strategy with a slow ramp-up in traffic might work.

replies(2): >>adrian+Wq >>cm2187+Ls
◧◩◪
20. deatha+ol[view] [source] [discussion] 2017-02-28 06:28:16
>>jlgadd+pk
Sorry, no. TLS is explicitly designed to allow smooth upgrading like this. This proxy is supposed to (in response to a client hello w/ TLSv1.3) respond with TLSv1.2 if that's what it supports. This is still a rigorous parsing of the input being given: nothing is "not understood": version negotiation is an inherent part of the protocol and is supposed to allow for painless upgrades to more secure protocols.

The RFC (which if you're implementing TLS, you should have open at all times) explicitly calls out exactly this behavior:

> Note: some server implementations are known to implement version negotiation incorrectly. For example, there are buggy TLS 1.0 servers that simply close the connection when the client offers a version newer than TLS 1.0.

The quality of this vendor's implementation is extremely suspect.

replies(1): >>rocqua+au
◧◩
21. Daniel+ul[view] [source] [discussion] 2017-02-28 06:31:23
>>quotem+H
This is precisely the conclusion Google reached and has used as they work on QUIC.

Even protocol state (equivalents of TCP FIN/SYN/etc) is encrypted, to ensure that middleboxes don't get ideas about what the protocol is 'supposed' to do - ideas which make it hard to change the protocol in the future.

replies(1): >>Capaci+Oz
◧◩◪
22. deatha+Ql[view] [source] [discussion] 2017-02-28 06:37:39
>>userbi+38
I've written a similar rebuttal to your sibling's comment here[1].

This isn't "failing closed", and this isn't a whitelist. TLS allows you to whitelist to certain versions of the protocol during the initial negotiation at the start of the protocol; that is the opportunity for either end to state what version of the protocol they'd like. It is not permissible in the protocol to close the connection as Blue Coat is doing.

This isn't a downgrade attack, either: both server and client are free to choose their protocol version at the beginning. The client & server will later verify that the actual protocol in use is the one they intended; this is what prevents downgrades.

[1]: https://news.ycombinator.com/item?id=13751737

◧◩◪
23. kbart+Ym[view] [source] [discussion] 2017-02-28 06:53:50
>>jlgadd+Jj
Probably you have already (mis)clicked (down)vote button on this comment before. It's easy to do accidentally, especially on touchscreen.
replies(1): >>jlgadd+Tn
◧◩◪◨
24. jlgadd+Tn[view] [source] [discussion] 2017-02-28 07:08:52
>>kbart+Ym
I was pretty sure that wasn't it. I noticed it as soon as I first saw the comment.

That's the simplest explanation, though, so that's probably what happened. Oh well.

◧◩◪
25. nikanj+pp[view] [source] [discussion] 2017-02-28 07:27:43
>>ehsank+R
The way this is going to be spinned, I promise you, is: Google released a new version of Chrome, and support for that upgrade is in BlueCoat v.next. Here's an invoice for the new license+consulting services for the upgrade.

In corporate environments, the last thing that changes is the thing that gets blamed. BlueCoat was not upgraded, Chrome was, and now things are broken? Not their fault.

◧◩◪
26. adrian+Wq[view] [source] [discussion] 2017-02-28 07:50:16
>>semi-e+2l
It might backfire and your company forbids HTTPS "so that employees can't disclose company secrets without IT having traceability".
replies(3): >>ptaipa+Ss >>trome+Rt >>Jonnax+CT
◧◩◪
27. cm2187+Ls[view] [source] [discussion] 2017-02-28 08:18:07
>>semi-e+2l
Yeah. This is a firable offense. The solution to your company MITM your traffic is not to use your work computer for anything personal that matters. It's not like if we had a shortage of devices to connect to the internet.
replies(5): >>ocdtre+Uv >>semi-e+OA >>jessau+JM >>feld+QY >>compug+4b1
◧◩◪◨
28. ptaipa+Ss[view] [source] [discussion] 2017-02-28 08:19:16
>>adrian+Wq
They can't, really. So much of the Web has fortunately moved to HTTPS that then they should just forget about Web access.
◧◩◪
29. jarym+Kt[view] [source] [discussion] 2017-02-28 08:31:24
>>234dd5+16
The Bluecoat sales people did a number on you huh? Sounds really good until you ask 'why doesn't Bluecoat understand this traffic' - because it really should.
replies(1): >>icebra+yF
◧◩◪◨
30. trome+Rt[view] [source] [discussion] 2017-02-28 08:33:41
>>adrian+Wq
Uhh, what do you do for sites that don't offer HTTP? Many sites force a 301 redirect when hit on HTTP, and won't downgrade.
replies(2): >>adrian+Yx >>Elhana+Z01
◧◩◪◨
31. rocqua+3u[view] [source] [discussion] 2017-02-28 08:37:45
>>tbrowb+3d
This is apparently a problem when bluecoat is used in non-mitm mode. That probably means bluecoat is merely inspecting the initial handshake, not modifying it. That would imply it can't actually modify the handshake.

It then simply inspects a connection it doesn't understand and 'fails closed' by preventing that connection.

◧◩◪◨
32. rocqua+au[view] [source] [discussion] 2017-02-28 08:39:06
>>deatha+ol
The issue only occurs in non-mitm mode, probably meaning the box doesn't actually do the TLS handsake, instead merely inspecting it.
◧◩◪
33. Alyssa+rv[view] [source] [discussion] 2017-02-28 08:57:50
>>jacque+E2
Reverse-engineer? A middlebox?

Which holds trusted secret keys and which, in its normal unremarkable operation, intercepts, parses, reconstructs, decrypts, re-encrypts, forwards, and optionally logs both confidential and attacker-controlled traffic? And is also known to be used for nationwide bulk internet censorship by regimes often called 'oppressive'?

Why, doesn't it just.

Please consider, very carefully, the ethics and equities issues one might face with any interesting findings here.

replies(1): >>lmm+mD
◧◩◪◨
34. ocdtre+Uv[view] [source] [discussion] 2017-02-28 09:02:46
>>cm2187+Ls
Kinda amazed you got downvoted for pointing out that the parent is essentially advocating for intentionally trying to take down your employer's network because you dislike their IT policy.

This isn't just a fireable offense. Especially given the tendency for computer-related criminal laws to be overly vague, it's entirely possible you could be charged with a crime if you are intentionally trying to DoS your employer's network.

◧◩◪
35. reacwe+8x[view] [source] [discussion] 2017-02-28 09:23:01
>>rossy+s7
Ssh is almost often available to connect through the firewall. Do IT people understand how easily you can work around proxy using ssh ? Just start a vm in the cloud (like a C1 at scaleway for 3.6€ per month), install squid (with default options). On your PC, run portable applications: putty connected to your vm with a forward of proxy port and portable firefox configured to use your forwarded proxy.
replies(3): >>jeroen+vA >>jamesp+0L >>mbruml+ab1
◧◩◪◨⬒
36. adrian+Yx[view] [source] [discussion] 2017-02-28 09:37:03
>>trome+Rt
Open a ticket with IT?
◧◩◪
37. Capaci+Oz[view] [source] [discussion] 2017-02-28 10:08:20
>>Daniel+ul
It is really sad that one reason why QUIC encrypts protocol states is to prevent excessively eager middleboxes from meddling with the traffic.
◧◩◪◨
38. jeroen+vA[view] [source] [discussion] 2017-02-28 10:20:00
>>reacwe+8x
There's not even a need for installing a proxy! SSH has native SOCKS proxy support, so all you need to do is set up an SSH connection and set the browser connection to a dynamic SSH port forward. This also prevents leaking DNS requests : with a standard proxy your computer might be trying to look up domains using the company DNS system. With a SOCKS proxy, you can forward all DNS traffic as well!
replies(1): >>avodon+hI
◧◩◪◨
39. semi-e+OA[view] [source] [discussion] 2017-02-28 10:26:05
>>cm2187+Ls
If you live in a third-world country (or the US) which lacks basic functions of society like employee protection, a sensible minimum wage, universal healthcare, paid parental leave, etc., then yes, I don't recommend doing what my friend did with employing a little "civil disobedience" in such cases.

TBH, for most techies I don't think opposition to MITM boxes comes down to "I don't want them to catch me looking at cat photos" but more along the lines of "this will actually reduce security as much as it improves it, and the companies providing these products are also aiding repressive regimes and human rights violations across the globe". Personally, I would find it unethical for the company I work for to buy these products.

replies(2): >>jamesp+MK >>Anderk+uQ
◧◩◪◨
40. lmm+mD[view] [source] [discussion] 2017-02-28 11:01:14
>>Alyssa+rv
What's true is true - better to know it than stick our heads in the sand. If these boxes have vulnerabilities (who am I kidding, they do parsing, they're probably implemented in C "for performance", of course they have vulnerabilities), we are better off for knowing about them than not.
replies(1): >>Alyssa+RQ
◧◩◪◨
41. icebra+yF[view] [source] [discussion] 2017-02-28 11:34:48
>>jarym+Kt
TLS 1.3 is still quite new, doesn't seem outrageous that they take a bit to implement it.
replies(1): >>deatha+IB1
◧◩◪◨⬒
42. avodon+hI[view] [source] [discussion] 2017-02-28 12:11:45
>>jeroen+vA
How do you "set the browser connection to a dynamic SSH port forward"?
replies(2): >>kuschk+GK >>nolok+KO
◧◩◪◨⬒⬓
43. kuschk+GK[view] [source] [discussion] 2017-02-28 12:39:28
>>avodon+hI
Like this: http://i.imgur.com/VXomB7p.png
◧◩◪◨⬒
44. jamesp+MK[view] [source] [discussion] 2017-02-28 12:41:37
>>semi-e+OA
What countries can you DoS your employers' network in?
◧◩◪◨
45. jamesp+0L[view] [source] [discussion] 2017-02-28 12:44:16
>>reacwe+8x
Why would anyone competent allow unrestricted ssh through the corporate firewall?
replies(2): >>simias+eN >>acdha+GW
◧◩
46. skywho+RL[view] [source] [discussion] 2017-02-28 12:56:50
>>jessau+H1
The entire use case of BlueCoat and the like is to satisfy executives' desire to spy on all usage of their network. It's certainly not to benefit the users who are stuck behind it, to increase their security, or to give them a better Internet experience.
replies(1): >>794CD0+HW
◧◩
47. skywho+AM[view] [source] [discussion] 2017-02-28 13:05:06
>>codero+x
It's in BlueCoat's political interests to make sure TLS 1.3 rolls out as slowly as possible since it actively works against their entire business model, so they have zero incentive to be proactive about this until the TLS 1.3 extensions are approved that make MITM possible again.
48. peterw+IM[view] [source] 2017-02-28 13:06:22
>>JoshTr+(OP)
The fix should not have been reversion. The fix should have been a simple workaround that if the connection fails totally and no downgrade handshake attempt was made, make a new connection using 1.2 to start with, which would succeed and the connection opened. This would be equivalent to a downgrade handshake from 1.3 to 1.2 but without requiring all products support 1.3.
replies(1): >>dvorak+l01
◧◩◪◨
49. jessau+JM[view] [source] [discussion] 2017-02-28 13:06:34
>>cm2187+Ls
When I mentioned on a mailing list that we should probably pronounce this like "expect your personal bank info to be pwned" rather than "please don't use work resources for personal purposes", I was reminded that there are lots of perfectly reasonable work-related purposes that are undermined by TLS MitM. Corporate bank accounts, ACH transactions, payroll, vendor accounts, tax portals, employee benefits/401k, etc. All of that stuff should actually be secure.

Incidentally, "Blue Coat ProxySG 6642" was the only middlebox to get an "A" from the study referenced above. Apparently they didn't test for 1.3...

replies(2): >>cm2187+yQ >>daxelr+li1
◧◩
50. peterw+dN[view] [source] [discussion] 2017-02-28 13:13:20
>>quotem+H
Actually, no, that would just make everything more difficult. Browsers need to start coming to terms with the fact that they do not get do dictate how www networking operates for every organization around the world.

There are hundreds of thousands of organizations that need inspection and caching and proxying of internal www traffic. That all protocols should disallow or frustrate this disregards real needs of users and organizations.

Further still, if protocols can't be designed to be implemented easily or to allow for implementation bugs or lack of features, it's a crap protocol or application. Middleware will always be necessary, and encryption really shouldn't change the requirements of how middleware needs to work with a protocol.

replies(2): >>kibwen+JZ >>theamk+LZ
◧◩◪◨⬒
51. simias+eN[view] [source] [discussion] 2017-02-28 13:13:30
>>jamesp+0L
In my experience many companies simply filter based on port number. Run your external sshd/openvpn on port 80 and you're good to go. But of course that's going off topic since TFA is obviously about middleboxes actually intercepting and analyzing the traffic.

In truth though if you start considering your employees like the enemy it's just a never ending upwards battle, especially if your employees are comp-sci folks. You could tunnel SSH over HTTP or even DNS if you cared enough.

replies(1): >>daxelr+9m1
◧◩◪◨⬒⬓
52. nolok+KO[view] [source] [discussion] 2017-02-28 13:30:14
>>avodon+hI
> ssh -D 4242 user@host

Then in firefox (or other), the socks proxy is on localhost port 4242.

◧◩◪◨⬒
53. Anderk+uQ[view] [source] [discussion] 2017-02-28 13:47:17
>>semi-e+OA
> Personally, I would find it unethical for the company I work for to buy these products.

Then leave the company in protest or convince it not to buy them. DDoSing the company's network is somehow not unethical, I guess?

replies(1): >>semi-e+U51
◧◩◪◨⬒
54. cm2187+yQ[view] [source] [discussion] 2017-02-28 13:47:30
>>jessau+JM
Absolutely, but then the right approach is to let the IT dept know that they are running the company into the ground. Often, the IT department or management may be insensitive to that argument (and then you get a Sony Entertainment hack, but then it is well deserved) or they may follow regulations that are beyond their control. But it is a management decision.
◧◩◪◨⬒
55. Alyssa+RQ[view] [source] [discussion] 2017-02-28 13:49:48
>>lmm+mD
But what of the equities issue - what to do with that knowledge, once discovered? Might it depend on who "we" are?

My point is that actually helping this particular vendor, for example, may not be everyone's cup of tea.

replies(1): >>jacque+p01
◧◩◪◨
56. Jonnax+CT[view] [source] [discussion] 2017-02-28 14:15:30
>>adrian+Wq
The internet has changed significantly over the last few years and a lot of sites don't support unencrypted connections.

It's pretty entertaining to read this stack overflow questions about using ssl from 7 years ago: http://stackoverflow.com/questions/2177159/should-all-sites-...

◧◩◪◨⬒
57. acdha+GW[view] [source] [discussion] 2017-02-28 14:46:06
>>jamesp+0L
Ask what goal they're trying to solve: is it really because the IT people want to monitor everyone's web surfing or do they have something like an audit requirement? There are a LOT of people in the latter camp who need to check the box to say they comply with some policy, regulation, etc.

Similarly, good security people know that port filtering is a losing game unless you are willing to restrict everything to a known-safe whitelist – the malware authors do work full-time on tunneling techniques, after all – and may be focusing their efforts on endpoint protection or better isolation between users/groups.

◧◩◪
58. 794CD0+HW[view] [source] [discussion] 2017-02-28 14:46:21
>>skywho+RL
Fuck the users. If users had their way, they'd have all the local administrator privileges they wanted so that they could download malware to their heart's content. From a non-IT perspective, they would also be free to download porn, potentially child porn, which is a crime to merely possess, and exfiltrate terabytes of company secrets.
◧◩◪◨
59. feld+QY[view] [source] [discussion] 2017-02-28 15:03:27
>>cm2187+Ls
My day job includes working on FreeBSD systems and also doing open source FreeBSD work (push upstream, pull down to us). There are sometimes embargoed security notices in my email. There is no chance I will permit my employer to MITM my SSL and risk some clowns in corporate IT from obtaining these mails. (highest security ones are GPG encrypted, but others are not)

I need my personal email to do my work. It needs to stay secure from even my own employer. Period.

◧◩◪
60. kibwen+JZ[view] [source] [discussion] 2017-02-28 15:09:57
>>peterw+dN
Then those organizations are free to not use encryption-friendly protocols for internal resources. Furthermore, those companies are free to fork Chromium or Firefox and distribute their own browser that renders these protocols toothless.

IOW, it's completely fair to argue that users might not have a universal right to encryption, but it's just as legitimate to argue that browser vendors have no obligation to enable the trivial circumvention of encryption. If the software doesn't work for your needs, then stop using the software.

replies(1): >>peterw+721
◧◩◪
61. theamk+LZ[view] [source] [discussion] 2017-02-28 15:10:03
>>peterw+dN
I disagree. We were living in the period of easy middleware (this was before HTTPS rollout), and it generally sucked -- there were supercookies, ads injection, general app breakage when you get a captive portal page instead of expected RPC response.

The middleware should require effort to install, and it should be obvious when it is active. Otherwise, companies which have no business MITM'ing the traffic -- such as ISPs and free wifi providers -- will start to do it just because it's so simple.

For example, Google may require MDM app on the Android devices which is used to access corporate data. This app ensures that the device has the right policy (screen lock, encryption) and I think it may also check for malware apps. This is how it should be -- if you need corporate control over devices, install special application on it, it will be more efficient and it will do more.

replies(1): >>peterw+Vt1
◧◩
62. dvorak+l01[view] [source] [discussion] 2017-02-28 15:15:31
>>peterw+IM
The problem with this fix is that then as long as you have the fallback, the user gains none of the security properties of TLS 1.3 (since the attacker can always force a downgrade by sending junk to the client during the handshake) and has the additional cost of a second TLS negotiation.

While there was previously this "TLS fallback" implemented in Chrome to work around buggy endpoints, this was primarily due to buggy endpoints* which was a much larger issue and difficult to fix, while these middlebox issues affect a much smaller portion of users and we're hopeful that the middlebox vendors that have issues can fix their software in a more timely manner.

* TLS 1.3 moves the version negotiation into an extension, which means that old buggy servers will only ever know about TLS 1.2 and below for negotiation purposes and won't break in a new matter with TLS 1.3.

replies(1): >>peterw+wm1
◧◩◪◨⬒⬓
63. jacque+p01[view] [source] [discussion] 2017-02-28 15:15:43
>>Alyssa+RQ
Yes, good point. One might aim to 'help' them into an early grave whilst actually helping them to strengthen their product.
◧◩◪◨⬒
64. Elhana+Z01[view] [source] [discussion] 2017-02-28 15:19:41
>>trome+Rt
Same thing I did when I noticed our bluecoat started mitm-ing my bank connection - ticket to IT to enable bypass for specific domain. They refused to do it for google/gmail, but banking sites start working normally on the next day. Youtube, facebook and other non work related stuff is just blocked, unless you need them to do your job (like PR dept).
replies(1): >>jessau+px1
65. jandre+911[view] [source] 2017-02-28 15:20:56
>>JoshTr+(OP)
Sometimes it is even worse than that. Some of the middleware TLS proxies don't verify the certificate before they resign the data. They completely open up your enterprise to MITM attacks, and in fact hide the fact that you are being MITMed. This came to light way back during the Superfish debacle, and some vendors still have not fixed the problem.
◧◩◪◨
66. peterw+721[view] [source] [discussion] 2017-02-28 15:29:01
>>kibwen+JZ
No they aren't, encryption is still required for internal transactions as well as working with external partners. And fork a browser? Are you nuts?

Nobody made that argument. But browser makers have an obligation to keep the world wide web usable. If it's not usable, say goodbye to dot com companies selling services to businesses, which aside from advertising revenue (and the hopes and dreams of venture capitalists) is the only way they survive.

The only reasonable alternative if you start locking out legitimate business use cases of traffic inspection is to abandon the web and start making proprietary native applications and protocols like back in the old days. This is bad for users and bad for business.

It's not like it's even hard to support these use cases while maintaining user security! Browsers just totally suck at interfacing with a dynamic user role. Better UX and a more flexible protocol would solve this, but nobody wants to make browsers easier to use (more the opposite)

replies(1): >>kibwen+Dy1
◧◩◪◨⬒⬓
67. semi-e+U51[view] [source] [discussion] 2017-02-28 15:54:00
>>Anderk+uQ
I agree talking to IT is step 1, and I'm assuming that hasn't worked.

Collective action (strikes, "work slowly protests" etc.) as a protest against company policy has a long precedent of a) being protected by law and b) being much more effective than a single employee quitting, while simultaneously reducing the downside for employees (in L_\infty norm).

Edit: the old Keynes quote comes to mind: "if you owe the bank $100 you have a problem, but if you owe the bank $100 million the bank has a problem" -- if 1 of the company's devs commits a "fireable offense", he/she has a problem, but if 100 of them do, the company has a problem.

replies(1): >>raesen+hk1
◧◩◪◨
68. compug+4b1[view] [source] [discussion] 2017-02-28 16:31:47
>>cm2187+Ls
Criminal possibly as well, possibly under the CFAA.

not a lawyer.

◧◩◪◨
69. mbruml+ab1[view] [source] [discussion] 2017-02-28 16:33:02
>>reacwe+8x
The problem is middleboxes like fortigate also do MITM on ssh connections. Assuming you are not bringing home devices into work and don't have your ssh server's fingerprint memorized you might be tempted to just type 'yes' when prompted.

In any case you are left with no SSH, or somebody watching your ssh and have control over your ability to tunnel.

The best you can do with these boxes is make a sub tunnel over one of the protocols that they do allow through, you just can't rely on the primary encryption provided by the protocol that the middle box is executing MITM on. If somebody actually looks at the traffic they will see that you are not transferring plain text at the middle box, so that might raise some eyebrows.

replies(1): >>cesarb+rf2
◧◩◪◨⬒
70. daxelr+li1[view] [source] [discussion] 2017-02-28 17:17:19
>>jessau+JM
How are any of the things you listed undermined by corporate MitM?

Everything you listed is information that the company already has access to. Why isn't it sufficient for there to be access controls by policy, the same way the company protects other sensitive information from unauthorized acres within the company?

replies(1): >>jessau+3x1
◧◩◪◨⬒⬓⬔
71. raesen+hk1[view] [source] [discussion] 2017-02-28 17:28:08
>>semi-e+U51
However with collective action, the company is usually aware of their employees actions, here if I'm reading correctly management were not notified that this was happening, so perhaps not quote the same thing.
◧◩◪◨⬒⬓
72. daxelr+9m1[view] [source] [discussion] 2017-02-28 17:41:20
>>simias+eN
How does the threat model where employees are the enemy differ from the threat model where malware running inside the network is the enemy?
replies(1): >>simias+Vn1
◧◩◪
73. peterw+wm1[view] [source] [discussion] 2017-02-28 17:43:29
>>dvorak+l01
Am I not correct that 1.3 got backed out of chrome for the current issue? So 1.3 isn't even there now... Which breaks anything that explicitly requires 1.3. My fix would support all cases and not break anything. Unless I missed something?
replies(1): >>cesarb+xg2
◧◩◪◨⬒⬓⬔
74. simias+Vn1[view] [source] [discussion] 2017-02-28 17:50:50
>>daxelr+9m1
You want your employees to collaborate with you avoiding and tracking down malware and potential leaks. If everybody is used to working around your restrictions you just make it harder for you to figure out what's happening when something goes wrong.

For instance if your policies are too restrictive people will use their smartphones more and more to access the internet. Then some will start doing work stuff on their smartphones and you lose all control. What do you do then? Forbid smartphones within the company? Fire everybody you catch using one? It's just an arms race at this point.

Sane security measures and some pedagogy go a long way. Easier said than done though, it's a tough compromise to make.

◧◩◪◨
75. peterw+Vt1[view] [source] [discussion] 2017-02-28 18:16:30
>>theamk+LZ
And that's why the browser is at fault - they could have designed it to be more permissive or more secure, depending on the role. They decided instead on a one-size approach, once too permissive, now too restrictive.

As a regular user, I can't just use a captive portal to get free wifi, because any site I go to has HTTPS, so they all break and I can't accept the god damn HTTP accept page unless I can conjure up a valid domain that has no HTTPS like I'm Svengali. Now all the OSes have special checks to see if there's a captive portal because the browsers couldn't be troubled to build a function for it, even though it would improve their security and usability at the same time.

Captive portals are not the enemy. Shitty UX and a bad attitude toward the needs of real users is. Locking browsers/protocols down more is just doubling down on this mentality.

replies(2): >>quotem+h62 >>theamk+nc2
◧◩◪◨⬒⬓
76. jessau+3x1[view] [source] [discussion] 2017-02-28 18:30:29
>>daxelr+li1
Keep up man! Upthread [0], reference was made to a study that's recently made the rounds detailing the basic insecurity of MitM devices. The problem isn't only that corporate network admins see everything, it's also that after the device downgrades TLS (or worse) attackers can also see what they want...

[0] https://news.ycombinator.com/item?id=13751715

◧◩◪◨⬒⬓
77. jessau+px1[view] [source] [discussion] 2017-02-28 18:33:02
>>Elhana+Z01
Of course, for many people gmail would be a key to every door, via password resets.
◧◩◪◨⬒
78. kibwen+Dy1[view] [source] [discussion] 2017-02-28 18:40:24
>>peterw+721
> No they aren't, encryption is still required for internal transactions as well as working with external partners.

Then continue to use the encryption that exists today. After all, your concern is for future standards that make encryption stronger.

> And fork a browser? Are you nuts?

A lone user forking a browser would be nuts. A company that's already willing to pay through the nose for MITM proxies can afford to fund a minor browser fork. Indeed, if this use case is as important as you suspect, then you ought to start a company that sells customized browsers for exactly this purpose. Think about what site you're on; where's your entrepreneurial spirit? :)

> But browser makers have an obligation to keep the world wide web usable.

Usable for whom? Between users (who need strong encryption), websites (who need strong encryption), and corporate intranets (who need to snoop), whose needs ought to be prioritized?

> abandon the web and start making proprietary native applications

The web emerged from a world where all applications were native and proprietary, I don't think any browser vendor is losing sleep over this possibility.

> Browsers just totally suck at interfacing with a dynamic user role.

Again, sounds like there's demand for a new browser then. :)

> nobody wants to make browsers easier to use (more the opposite)

Why is that?

replies(1): >>peterw+5X1
◧◩◪◨⬒
79. deatha+IB1[view] [source] [discussion] 2017-02-28 18:56:14
>>icebra+yF
This is a failure to implement any version of TLS correctly, not just v1.3. (TLS has support for version negotiation including receiving a hello from a client with a future version, such as v1.3.)
◧◩◪◨⬒⬓
80. peterw+5X1[view] [source] [discussion] 2017-02-28 21:16:26
>>kibwen+Dy1
There is no such thing as a minor browser fork. And my whole point was to not pick a side, it was to make the browser more flexible so it worked for more cases, not less.

Every non-Microsoft browser vendor used to cry themselves to sleep at night from days fighting against vendor lock-ins and corruption of standards. They certainly care if it all goes south.

I suppose people don't want easier browsers because they imagine they are easy enough and can't imagine something better. At least I hope that's the reason, and not that they fear change, or are indifferent to the needs of people other than themselves and prefer to design for that alone.

There's no way in hell I'm crazy enough to make a browser, though. I'd rather run for elected office, or eat an entire Volkswagen Golf.

◧◩◪◨⬒
81. quotem+h62[view] [source] [discussion] 2017-02-28 21:59:54
>>peterw+Vt1
Captive portal authentication functionality has no business being part of a browser anyway. Why should I have to start a browser to make my non-browser client application connect to my non-HTTP server?. A captive portal is a special case of rich network-level authentication, which belongs in the operating system. Also, 802.11u is specifically designed to help create uniformity in this area.
◧◩◪◨⬒
82. theamk+nc2[view] [source] [discussion] 2017-02-28 22:34:44
>>peterw+Vt1
Yes, captive portals are the enemy. They break an important assumption: requests either succeed and return correct data, or fail and return an error.

Were you writing a forum post? It was lost because it got submitted to captive portal. Were you in dynamic app? It crashed because it got HTML instead of JSON. Does you page reload ads in the i-frames? Your page position and page itself is now lost, and you are in captive portal page. Did you have a native app which did HTTP requests and cached them? Congrats, you have invalid data in your cache now.

And I have seen captive portals which were broken. How about you get redirected to login page every time you go to your favorite website, because the redirect page got cached somehow?

Good riddance. Yes, the browsers should include better captive portal support like android does, possibly triggered by the SSL certificate mismatch errors, but even the current situation when I have to type "aaa.com" by hand all the time is great.

◧◩◪◨⬒
83. cesarb+rf2[view] [source] [discussion] 2017-02-28 22:58:24
>>mbruml+ab1
From what I've read (http://www.gremwell.com/ssh-mitm-public-key-authentication), if you use public key authentication with SSH, the MITM will break the authentication (forcing ssh to ask for a password). It's the same as with TLS client certificate authentication: in the same way the server certificate authenticates the server to your browser, the client certificate authenticates your browser to the server, and the server will reject MITM connections as unauthenticated.

While unfortunately for TLS client certificates are not a solution against MITM due to their awful user experience and privacy concerns, for SSH public key authentication has a good user experience, and is very common.

◧◩◪◨
84. cesarb+xg2[view] [source] [discussion] 2017-02-28 23:05:27
>>peterw+wm1
Nothing can require 1.3, since 1.3 isn't finished yet. They were doing interoperability testing with a draft version of TLS 1.3, and nobody should require a draft version of TLS 1.3 without having a fallback to TLS 1.2.
[go to top]