Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Everyone gets HTTPS interception wrong - just don't do it

    Scheduled Pinned Locked Moved Off-Topic & Non-Support Discussion
    15 Posts 10 Posters 5.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • jimpJ
      jimp Rebel Alliance Developer Netgate
      last edited by

      Count you out? Perhaps it wasn't blingy enough:

      You are the 100000000th visitor!

      You can't resist clicking that one, now, can you? :-)

      Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

      Need help fast? Netgate Global Support!

      Do not Chat/PM for help!

      1 Reply Last reply Reply Quote 0
      • P
        preid
        last edited by

        My company uses UTM filtering a fair bit to control garbage like bittorrent, viruses, and malware from entering the network through the gateway (and stop infected machines on the network from reaching out to attack others, too - it's easy to spot the infected machine from the logs). Sure, not everything is detected, but it's just one layer in a well protected network. We typically use SonicWALLs with the gateway security services enabled.

        Endpoint security helps, too, but too often by the time it engages, it's already too late. Everything knows how to disable the McAfee / Symantec / Windows Essentials / Whatever-you-have endpoint protection these days. I can't tell you how many machines I see with up to date antivirus / antimalware on it that's claiming all is well, when it's clearly completely infected. At best, most of the end point protection solutions are just a "most of the time" alert that something just infected the machine as it's time to call someone for help.

        At least with UTM filtering, the incoming download has a chance of being detected and the download killed before it can finish transferring. That's like stopping a burglar at the fence to your yard, before he enters the house, rather than waiting until he's inside stealing your stuff to try and stop him. I prefer proactive, rather an reactive defense.

        But, with so much of the malware and nasty bandwidth-sucking services heading to HTTPS connections, where it can hide from most UTM gateways, you start having no choice but to implement HTTPS filtering. It's a huge pain to get working right, but it's becoming almost necessary to keep the network safe from those happy clickers in the office or home. If set up right, it's usually pretty transparent to the user. All they know is they didn't get infected while searching for "barenaked ladies", trying to buy tickets.

        So, while yeah, man-in-the-middle is evil when someone is trying to steal your credit card or hijack your VPN, like all things, it depends on why it's being done and by who.

        1 Reply Last reply Reply Quote 0
        • H
          Harvy66
          last edited by

          The problem with HTTPS interception is you break end-to-end authentication. If your MITM software signs everything that comes through as "trust this", you can run into a lot of issues.

          Nutshell. HTTPS does both encryption and signing and some software assumes the signing is trustworthy. You break that trust. There are attacks that take advantage of this and get your OS to trust whatever is being sent to it, like via Windows Updates. Normally HTTPS to update.windows.com handles the authentication, but if you sign the response, how does the computer know if update.windows.com doesn't point to some other server in Russia or China? It doesn't.

          1 Reply Last reply Reply Quote 0
          • M
            maverik1
            last edited by

            The issue at hand is how can you provide adequate content filtering if you don't intercept SSL? I am fully aware of the consequences of doing so and ethically it isn't right. When more and more domains are switching to secure browsing methods it makes it impossible to provide a business or home environment that is free from inappropriate materials.

            1 Reply Last reply Reply Quote 0
            • C
              cmb
              last edited by

              @maverik1:

              The issue at hand is how can you provide adequate content filtering if you don't intercept SSL?

              You configure things with a proxy, not try to MITM it.

              1 Reply Last reply Reply Quote 0
              • H
                heper
                last edited by

                perhaps you should also consider writing a policy and ask the users to comply with it.

                imho, the interwebs have been founded with the idea in mind to get rid of censorship.
                governments, however, try very hard to keep control by passing ridiculous laws to invade people's privacy.  (and have backdoors in encryption or have worldwide mitm)

                it's everyones choice to decide to be evil or less-evil. make your choice.

                1 Reply Last reply Reply Quote 0
                • M
                  maverik1
                  last edited by

                  @cmb:

                  @maverik1:

                  The issue at hand is how can you provide adequate content filtering if you don't intercept SSL?

                  You configure things with a proxy, not try to MITM it.

                  You can see how well that works by configuring the proxy and then searching for inappropriate content in Google. All I wanting to implement is the ability to filter what is searched for. I don't need any results appearing that are outside of suitability.

                  1 Reply Last reply Reply Quote 0
                  • DerelictD
                    Derelict LAYER 8 Netgate
                    last edited by

                    Exactly why google puts their searches inside HTTPS.  You might consider blocking google if you don't want your users to receive google search results.

                    Chattanooga, Tennessee, USA
                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                    1 Reply Last reply Reply Quote 0
                    • M
                      maverik1
                      last edited by

                      @heper:

                      perhaps you should also consider writing a policy and ask the users to comply with it.

                      No one is going to write a policy for their home network. We are talking about innocent children having access to filth. Google should be ashamed for allowing https searches. One misspelled word or fat finger and you instantly have access to garbage. I don't need any inappropriate results appearing. If the search term is inappropriate it should be flagged and so and therefore yield no results.

                      1 Reply Last reply Reply Quote 0
                      • M
                        maverik1
                        last edited by

                        @Derelict:

                        Exactly why google puts their searches inside HTTPS.  You might consider blocking google if you don't want your users to receive google search results.

                        If they want to put searches through https they need to provide a solution to businesses, school systems and or home users to filter what is passed to the search engine by implementing a http option.

                        1 Reply Last reply Reply Quote 0
                        • jimpJ
                          jimp Rebel Alliance Developer Netgate
                          last edited by

                          You get exactly the same results with SSL interception that you do by configuring a proxy on the user's computer.

                          Block direct outbound access to tcp/443 and force people to use the proxy explicitly. What you allow through the proxy is up to you. Interception is the wrong way to do it.

                          Locking topic since it's degenerating.

                          Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                          Need help fast? Netgate Global Support!

                          Do not Chat/PM for help!

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.