TLS Proxies. draft-mcgrew-tls-proxy-server. D. McGrew D. Wing P. Gladstone Y. Nir



Similar documents
SSL Interception Proxies. Jeff Jarmoc Sr. Security Researcher Dell SecureWorks. and Transitive Trust

SSL Inspection Step-by-Step Guide. June 6, 2016

How to configure SSL proxying in Zorp 3 F5

Web Security Considerations

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

How to configure SSL proxying in Zorp 6

A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith

Inspection of Encrypted HTTPS Traffic

SSL BEST PRACTICES OVERVIEW

Introduction to the DANE Protocol

How to configure HTTPS proxying in Zorp 5

Einführung in SSL mit Wireshark

Where every interaction matters.

Enterprise Security Interests Require SSL with telnet server from outside the LAN

The Secure Web Access Solution Includes:

Websense Content Gateway HTTPS Configuration

7.1. Remote Access Connection

HTTPS Inspection with Cisco CWS

Cleaning Encrypted Traffic

Mobile Banking. Secure Banking on the Go. Matt Hillary, Director of Information Security, MX

Project X Mass interception of encrypted connections

Analyzing HTTP/HTTPS Traffic Logs

How to configure HTTPS proxying in Zorp 6

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

Multi-Layer Security for Multi-Layer Attacks. Preston Hogue Dir, Cloud and Security Marketing Architectures

Security Policy Revision Date: 23 April 2009

ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB

CS 356 Lecture 28 Internet Authentication. Spring 2013

WORKING WITH WINDOWS FIREWALL IN WINDOWS 7

What to Look for When Evaluating Next-Generation Firewalls

Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)

SSL Secure Socket Layer

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Netgator: Malware Detection Using Program Interactive Challenges. Brian Schulte, Haris Andrianakis, Kun Sun, and Angelos Stavrou

Secure Sockets Layer

Guest Speaker. Michael Sutton Chief Information Security Officer Zscaler, Inc.

Communication Systems SSL

CLEARSWIFT SECURE Web Gateway HTTPS/SSL decryption

How To Protect A Web Application From Attack From A Trusted Environment

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.

Intro to Firewalls. Summary

SECURE Web Gateway. HTTPS/SSL Technical FAQ. Version 1.1. Date 04/10/12

The Benefits of SSL Content Inspection ABSTRACT

ISM/ISC Middleware Module

Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University

Contact Information. Document Number: Document Revision: SSL Proxy Deployment Guide SGOS 5.1.4

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Networking for Caribbean Development

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Cloud Security:Threats & Mitgations

SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES

Public Key Infrastructure (PKI)

Internet Privacy Options

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Zscaler Internet Security Frequently Asked Questions

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

How to configure Client side certificate authentication for authorization-only access / Active Sync URL s

Secure Socket Layer (SSL) and Trnasport Layer Security (TLS)

Firewall Environments. Name

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Guidelines for Web applications protection with dedicated Web Application Firewall

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

How the Barracuda Web Application Firewall Secures Your Mobile and IoT Services. Whitepaper

IJMIE Volume 2, Issue 9 ISSN:

Chapter 17. Transport-Level Security

9.92 Using HTTPS for building secure web applications v 1.0

Cornerstones of Security

SSL VPNs: An IETF Perspective

Integrated SSL Scanning

Integrated SSL Scanning

BEGINNERS GUIDE TO SSL CERTIFICATES: Making the BEST choice when considering your online security options

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Electronic Service Agent TM. Network and Transmission Security And Information Privacy

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

BEGINNER S GUIDE TO SSL CERTIFICATES: Making the best choice when considering your online security options

NIST ITL July 2012 CA Compromise

Overview. SSL Cryptography Overview CHAPTER 1

VPN. Date: 4/15/2004 By: Heena Patel

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

SSL Intercept Mode. Certificate Installation Guide. Revision Warning and Disclaimer

Brocade Virtual Traffic Manager and Microsoft IIS Deployment Guide

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

SSL EXPLAINED SSL EXPLAINED

BEGINNERS GUIDE BEGINNERS GUIDE TO SSL CERTIFICATES: MAKING THE BEST CHOICE WHEN CONSIDERING YOUR ONLINE SECURITY OPTIONS

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Troubleshooting BlackBerry Enterprise Service 10 version Instructor Manual

Transcription:

TLS Proxies draft-mcgrew-tls-proxy-server D. McGrew D. Wing P. Gladstone Y. Nir

Current Practice TLS Proxies are middleboxes that inspect and optionally modify TLS traffic They are client-side in that they decrypt and inspect all traffic for a particular client They do this by replacing a single TLS connection with two connections, and performing a handshake with both the client and the server, and copying the requests and responses from one connection to the other. In HTTP terminology, they are transparent proxies 2

Current Practice They work for TLS connections that have server authentication by generating a key-pair, and signing an ephemeral certificate with that key for the real server. Uses include: Detecting malware going through HTTP Detecting HTTP attacks (XSS, CSRF) Filtering content Data leakage prevention Botnet detection Lawful (?) interception (not covertly) 3

Current Practice Firewalls have long inspected and filtered traffic So-called next generation firewalls do deeper inspection and look into HTTP streams HTTPS is great for keeping data private on the Internet, but interferes with filtering. TLS proxies allow those next-generation firewalls to work on encrypted connections. TLS proxies have been available from various vendors for over 6 years. 4

Current Practice TLS proxies have to be CAs They need to sign certificates on the fly. Clients have to trust these CAs Otherwise you get the warning screens in browsers When the CA certificate is added to the trust anchor store of the client, the user experience is flawless, unless the user actually views the server certificate. Some browsers detect proxies, and disable certificate pinning. 5

Problems with TLS Proxies Getting all clients to trust the proxy CA is hard It's fairly easy in an environment where all clients are Windows boxes running Internet Explorer and connected to a single domain, but... Today there are multiple browsers and OS There are phones and other devices connecting to the network There are guests and contractors who are allowed to use the network. 6

Problems with TLS Proxies The client doesn't get to see the real server certificate. Extended Validation certificates cannot be checked and the green indication is gone. Certificate pinning schemes don't work cert-pinning, DANE Revocation checking is at the option of the proxy. 7

Problems with TLS Proxies Clients cannot enforce their policy TLS version RI support Trusted CAs Algorithms Forward secrecy 8

Problems with TLS Proxies The server never finds out about the proxy The server administrator cannot enforce a noproxy policy. 9

Problems with TLS Proxies Client certificates (for mutual authentication) don't work The client trusts the certificates signed by the proxy CA, but the server does not, so the proxy cannot sign a certificate for the client The proxy cannot present the client certificate, because the CertificateVerify message would fail verification OBC don't work WebID (FOAF+SSL) doesn't work Some forms of BrowserID don't work 10

Need one solution There have been some proposals to fix this: Use an extension to give the client information about the server-side connection Have the client send encryption keys to the proxy In all cases, at least the proxy and client have to be modified. We can't ask browser makers to implement a bunch of proprietary extensions for this. There can only be one. 11

Requirements Dynamic discovery of TLS proxies Make it possible for clients to choose whether to trust proxies or not Client gets server certificates, ciphersuites, TLS version, and other important information Mutual authentication works 12

Our Solution ServerHello extension from the proxy holds server cert and other information about the server-side connection. Similarly, an extension notifies the server that a proxy is present. The CertificateVerify message is modified to sign only the information that the proxy includes in the extension. more info in draft-mcgrew-tls-proxy-server 13

Questions? 14