zlacker

[parent] [thread] 30 comments
1. jessau+(OP)[view] [source] 2017-02-28 02:02:23
This exact issue occurred with TLS 1.2 back when BlueCoat only understood 1.1/1.0.

Good grief! From David Benjamin's final comment:

Note these issues are always bugs in the middlebox products. TLS version negotiation is backwards compatible, so a correctly-implemented TLS-terminating proxy should not require changes to work in a TLS-1.3-capable ecosystem. It can simply speak TLS 1.2 at both client <-> proxy and proxy <-> server TLS connections. That these products broke is an indication of defects in their TLS implementations.

It's understandable that I've never heard of BlueCoat: clearly this product's success is based more on selling to executives than on quality, and it has been some time since I worked in an organization that had executives to sell to.

replies(5): >>jacque+X >>nl+jc >>pjmlp+mi >>semi-e+lj >>skywho+aK
2. jacque+X[view] [source] 2017-02-28 02:13:47
>>jessau+(OP)
It sounds like it might be a worthwhile effort to reverse engineer one of those.
replies(1): >>Alyssa+Kt
3. nl+jc[view] [source] 2017-02-28 04:48:34
>>jessau+(OP)
Bluecoat is extremely widely used in some fields. They were in the news a while back when it was discovered that Syria (before the civil war) was censoring their internet access using Bluecoat devices (allegedly unauthorized by Bluecoat)[1]

[1] https://en.wikipedia.org/wiki/Blue_Coat_Systems#Use_by_repre...

4. pjmlp+mi[view] [source] 2017-02-28 06:08:01
>>jessau+(OP)
They have many costumers on the Fortune 500 portfolio that make sure the workers only visit the web sites they should and also IT get to know when they misbehave.

Quite a pain to work in such environments.

5. semi-e+lj[view] [source] 2017-02-28 06:22:36
>>jessau+(OP)
There was a paper posted on HN a few weeks back by some pretty serious security researchers on the security risks of SSL MITM boxes.

https://jhalderm.com/pub/papers/interception-ndss17.pdf

How do you fix this when you're naught but a humble employee? Well, a friend of mine worked at a fairly large tech company where a salesguy for these boxes had convinced the CTO they had to have them. Every tech-person "on the floor" hated the idea, so before the boxes were installed they conspired on their free time to write some scripts that ran lots of legitimate HTTPS traffic, effectively DDOSing the boxes and bringing the company's internet to a crawl for the day, like Google would take ten seconds to open. Then obviously everyone (including the non-tech people) started calling the IT helpdesk complaining that the internet was broken. MITM box salesguy then had to come up with a revised solution, costing 20x more than his first offer, and that was the end of that.

If you already are suffering under MITM boxes, a similar strategy with a slow ramp-up in traffic might work.

replies(2): >>adrian+fp >>cm2187+4r
◧◩
6. adrian+fp[view] [source] [discussion] 2017-02-28 07:50:16
>>semi-e+lj
It might backfire and your company forbids HTTPS "so that employees can't disclose company secrets without IT having traceability".
replies(3): >>ptaipa+br >>trome+as >>Jonnax+VR
◧◩
7. cm2187+4r[view] [source] [discussion] 2017-02-28 08:18:07
>>semi-e+lj
Yeah. This is a firable offense. The solution to your company MITM your traffic is not to use your work computer for anything personal that matters. It's not like if we had a shortage of devices to connect to the internet.
replies(5): >>ocdtre+du >>semi-e+7z >>jessau+2L >>feld+9X >>compug+n91
◧◩◪
8. ptaipa+br[view] [source] [discussion] 2017-02-28 08:19:16
>>adrian+fp
They can't, really. So much of the Web has fortunately moved to HTTPS that then they should just forget about Web access.
◧◩◪
9. trome+as[view] [source] [discussion] 2017-02-28 08:33:41
>>adrian+fp
Uhh, what do you do for sites that don't offer HTTP? Many sites force a 301 redirect when hit on HTTP, and won't downgrade.
replies(2): >>adrian+hw >>Elhana+iZ
◧◩
10. Alyssa+Kt[view] [source] [discussion] 2017-02-28 08:57:50
>>jacque+X
Reverse-engineer? A middlebox?

Which holds trusted secret keys and which, in its normal unremarkable operation, intercepts, parses, reconstructs, decrypts, re-encrypts, forwards, and optionally logs both confidential and attacker-controlled traffic? And is also known to be used for nationwide bulk internet censorship by regimes often called 'oppressive'?

Why, doesn't it just.

Please consider, very carefully, the ethics and equities issues one might face with any interesting findings here.

replies(1): >>lmm+FB
◧◩◪
11. ocdtre+du[view] [source] [discussion] 2017-02-28 09:02:46
>>cm2187+4r
Kinda amazed you got downvoted for pointing out that the parent is essentially advocating for intentionally trying to take down your employer's network because you dislike their IT policy.

This isn't just a fireable offense. Especially given the tendency for computer-related criminal laws to be overly vague, it's entirely possible you could be charged with a crime if you are intentionally trying to DoS your employer's network.

◧◩◪◨
12. adrian+hw[view] [source] [discussion] 2017-02-28 09:37:03
>>trome+as
Open a ticket with IT?
◧◩◪
13. semi-e+7z[view] [source] [discussion] 2017-02-28 10:26:05
>>cm2187+4r
If you live in a third-world country (or the US) which lacks basic functions of society like employee protection, a sensible minimum wage, universal healthcare, paid parental leave, etc., then yes, I don't recommend doing what my friend did with employing a little "civil disobedience" in such cases.

TBH, for most techies I don't think opposition to MITM boxes comes down to "I don't want them to catch me looking at cat photos" but more along the lines of "this will actually reduce security as much as it improves it, and the companies providing these products are also aiding repressive regimes and human rights violations across the globe". Personally, I would find it unethical for the company I work for to buy these products.

replies(2): >>jamesp+5J >>Anderk+NO
◧◩◪
14. lmm+FB[view] [source] [discussion] 2017-02-28 11:01:14
>>Alyssa+Kt
What's true is true - better to know it than stick our heads in the sand. If these boxes have vulnerabilities (who am I kidding, they do parsing, they're probably implemented in C "for performance", of course they have vulnerabilities), we are better off for knowing about them than not.
replies(1): >>Alyssa+aP
◧◩◪◨
15. jamesp+5J[view] [source] [discussion] 2017-02-28 12:41:37
>>semi-e+7z
What countries can you DoS your employers' network in?
16. skywho+aK[view] [source] 2017-02-28 12:56:50
>>jessau+(OP)
The entire use case of BlueCoat and the like is to satisfy executives' desire to spy on all usage of their network. It's certainly not to benefit the users who are stuck behind it, to increase their security, or to give them a better Internet experience.
replies(1): >>794CD0+0V
◧◩◪
17. jessau+2L[view] [source] [discussion] 2017-02-28 13:06:34
>>cm2187+4r
When I mentioned on a mailing list that we should probably pronounce this like "expect your personal bank info to be pwned" rather than "please don't use work resources for personal purposes", I was reminded that there are lots of perfectly reasonable work-related purposes that are undermined by TLS MitM. Corporate bank accounts, ACH transactions, payroll, vendor accounts, tax portals, employee benefits/401k, etc. All of that stuff should actually be secure.

Incidentally, "Blue Coat ProxySG 6642" was the only middlebox to get an "A" from the study referenced above. Apparently they didn't test for 1.3...

replies(2): >>cm2187+RO >>daxelr+Eg1
◧◩◪◨
18. Anderk+NO[view] [source] [discussion] 2017-02-28 13:47:17
>>semi-e+7z
> Personally, I would find it unethical for the company I work for to buy these products.

Then leave the company in protest or convince it not to buy them. DDoSing the company's network is somehow not unethical, I guess?

replies(1): >>semi-e+d41
◧◩◪◨
19. cm2187+RO[view] [source] [discussion] 2017-02-28 13:47:30
>>jessau+2L
Absolutely, but then the right approach is to let the IT dept know that they are running the company into the ground. Often, the IT department or management may be insensitive to that argument (and then you get a Sony Entertainment hack, but then it is well deserved) or they may follow regulations that are beyond their control. But it is a management decision.
◧◩◪◨
20. Alyssa+aP[view] [source] [discussion] 2017-02-28 13:49:48
>>lmm+FB
But what of the equities issue - what to do with that knowledge, once discovered? Might it depend on who "we" are?

My point is that actually helping this particular vendor, for example, may not be everyone's cup of tea.

replies(1): >>jacque+IY
◧◩◪
21. Jonnax+VR[view] [source] [discussion] 2017-02-28 14:15:30
>>adrian+fp
The internet has changed significantly over the last few years and a lot of sites don't support unencrypted connections.

It's pretty entertaining to read this stack overflow questions about using ssl from 7 years ago: http://stackoverflow.com/questions/2177159/should-all-sites-...

◧◩
22. 794CD0+0V[view] [source] [discussion] 2017-02-28 14:46:21
>>skywho+aK
Fuck the users. If users had their way, they'd have all the local administrator privileges they wanted so that they could download malware to their heart's content. From a non-IT perspective, they would also be free to download porn, potentially child porn, which is a crime to merely possess, and exfiltrate terabytes of company secrets.
◧◩◪
23. feld+9X[view] [source] [discussion] 2017-02-28 15:03:27
>>cm2187+4r
My day job includes working on FreeBSD systems and also doing open source FreeBSD work (push upstream, pull down to us). There are sometimes embargoed security notices in my email. There is no chance I will permit my employer to MITM my SSL and risk some clowns in corporate IT from obtaining these mails. (highest security ones are GPG encrypted, but others are not)

I need my personal email to do my work. It needs to stay secure from even my own employer. Period.

◧◩◪◨⬒
24. jacque+IY[view] [source] [discussion] 2017-02-28 15:15:43
>>Alyssa+aP
Yes, good point. One might aim to 'help' them into an early grave whilst actually helping them to strengthen their product.
◧◩◪◨
25. Elhana+iZ[view] [source] [discussion] 2017-02-28 15:19:41
>>trome+as
Same thing I did when I noticed our bluecoat started mitm-ing my bank connection - ticket to IT to enable bypass for specific domain. They refused to do it for google/gmail, but banking sites start working normally on the next day. Youtube, facebook and other non work related stuff is just blocked, unless you need them to do your job (like PR dept).
replies(1): >>jessau+Iv1
◧◩◪◨⬒
26. semi-e+d41[view] [source] [discussion] 2017-02-28 15:54:00
>>Anderk+NO
I agree talking to IT is step 1, and I'm assuming that hasn't worked.

Collective action (strikes, "work slowly protests" etc.) as a protest against company policy has a long precedent of a) being protected by law and b) being much more effective than a single employee quitting, while simultaneously reducing the downside for employees (in L_\infty norm).

Edit: the old Keynes quote comes to mind: "if you owe the bank $100 you have a problem, but if you owe the bank $100 million the bank has a problem" -- if 1 of the company's devs commits a "fireable offense", he/she has a problem, but if 100 of them do, the company has a problem.

replies(1): >>raesen+Ai1
◧◩◪
27. compug+n91[view] [source] [discussion] 2017-02-28 16:31:47
>>cm2187+4r
Criminal possibly as well, possibly under the CFAA.

not a lawyer.

◧◩◪◨
28. daxelr+Eg1[view] [source] [discussion] 2017-02-28 17:17:19
>>jessau+2L
How are any of the things you listed undermined by corporate MitM?

Everything you listed is information that the company already has access to. Why isn't it sufficient for there to be access controls by policy, the same way the company protects other sensitive information from unauthorized acres within the company?

replies(1): >>jessau+mv1
◧◩◪◨⬒⬓
29. raesen+Ai1[view] [source] [discussion] 2017-02-28 17:28:08
>>semi-e+d41
However with collective action, the company is usually aware of their employees actions, here if I'm reading correctly management were not notified that this was happening, so perhaps not quote the same thing.
◧◩◪◨⬒
30. jessau+mv1[view] [source] [discussion] 2017-02-28 18:30:29
>>daxelr+Eg1
Keep up man! Upthread [0], reference was made to a study that's recently made the rounds detailing the basic insecurity of MitM devices. The problem isn't only that corporate network admins see everything, it's also that after the device downgrades TLS (or worse) attackers can also see what they want...

[0] https://news.ycombinator.com/item?id=13751715

◧◩◪◨⬒
31. jessau+Iv1[view] [source] [discussion] 2017-02-28 18:33:02
>>Elhana+iZ
Of course, for many people gmail would be a key to every door, via password resets.
[go to top]