SSL Optimization Over WAN Needs Scrutiny 70
coondoggie writes with word of the expansion of WAN optimization appliances to handle SSL traffic and the security concerns this brings up. From the article: "With more and more WAN optimization vendors extending their capabilities to include encrypted traffic, corporate IT executives have a decision to make: Should they trust the security these devices provide? Rather than passing through SSL sessions between clients and servers located in remote data centers, some WAN optimization gear can terminate the SSL sessions, shrink the traffic, and re-encrypt it for the next leg of the trip. These chains of encrypted sessions introduce potential vulnerabilities that different vendors address in different ways. SSL traffic represents a growing percentage of total traffic on WAN links, according to Forrester Research. So SSL support in WAN optimization appliances will become more important to businesses that want to keep traffic secure while minimizing the size of their WAN links."
Never trust an analyst (Score:2)
What about Akamai? (Score:1, Interesting)
Re: (Score:1)
Re: (Score:1, Insightful)
Re: (Score:1, Troll)
Make your shit work right, and nobody will notice it, dumbfuck.
How bout them apples Mr. Too Chickenshit To Use A Real Name?
Re: (Score:1)
Right, what these devices actually do. (Score:5, Informative)
These products aren't used for Internet connections. They're used for either dedicated WAN links or for VPN links. Say you have an office out in timbucktoo and a head office. You put one of these on/instead of the the gateway router at the head office, and another at the same gateway at the branch (just inside your network) so all your traffic is going through them. (And these devices are designed to help get the best out of that private frame relay link you've got as well as VPNs.)
What do they do? They automatically cache repeated TCP traffic patterns against all traffic sent to and from the head office. (Basically a matched pair - when one end sends a particular packet the pair of devices has seen before, just the reference to that pattern is sent. Yes, they have to keep in synch and all that.)
See what that gets you. Transparent caching of all interal web browsing. FTP downloads. Transparent caching of file share traffic. IMAP traffic. (Imagine if you send the same 100 kb word attachment to every end user. Now imagine it only gets sent once, without any software seeing anything but normal, ordinary, IMAP.) It just recognises patterns in the TCP traffic, not caring what those patters actually represent. (Lower latency too - because that 100 kb word doc comes out of cache rather than across the line.)
Now SSL disables all this. Each SSL session is unique - the data patterns are low entrophy nearly random noise, from the point of view of these devices. The patterns are never repeated, and thus you don't get to cache anything.
You DO have the option, of course, doing a man-in-the-middle-attack, where you decrypt the traffic on the device, subject that to caching, and re-encrypt it once it leaves the other matched device (presumably the WAN-accelerator-to-WAN-accelrator link is also encrypted.).
BUT ISPs cannot do this. To pull off that M-i-t-m, they have two ways: [1] to screw around with your SSL system's root certificates. Corporates can do this, just deploy their own "trusted" CA. Piece of cake. ISPs can't. [2] Have the private keys for the destination server loaded into the device. Again, Corporates can (sometimes). Edge SSL applicance owned by the same organsiation as the end server can. ISPs, again, can't.
These devices are aimed at corporates, where the network and end-points are all owned by the company. Of course, if the wan-accelerator-to-wan-accelerator link isn't encrypted then you have an issue (can you trust the device designers? That's the POINT of this article!) If that fake CA private key got out, you've also got real issues too!
Re: (Score:2)
Re: (Score:2)
but people who share thier connections with broadband routers who plug in a PC with firefox already installed will not have any reason to run the ISPs software and hence will notice this and there isn't really anything they can do about it.
and it would only require one sufficiantly tech savy user using a browser that didn't have
Microsoft ISA Server (Score:1, Informative)
Not only does it work very well for microsoft and non-microsoft webservers (and perform application-layer inspection of a number of other protocols), but neither ISA 2004 nor ISA 2006 has had a single exploit
Re: (Score:2, Informative)
One quick google and http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-7027 [nist.gov]
Re: (Score:2)
Only solution, put in a complete bypass. Bypass so you can login. Great security that.
Apache has done this for a while... (Score:2)
It'll also publish multiple sites (say, your /sharepoint, your /cacti, your /owa, and your /intranet sites) using path rules on the same IP address - one point of entry (or multiple points, with an array of ISA boxes), with a collection of disparate apps in your WAN / DMZ behind it
In other words, something Apache has done for more than half a decade?
Re: (Score:2)
Whiskey Tango Foxtrot? (Score:5, Interesting)
Um... Isn't that the very definition of a man-in-the-middle attack?
Er, no. Thank you very much for your kind offer, but I would prefer my encrypted data were not "optimized" in this way.
Schwab
Re:Whiskey Tango Foxtrot? (Score:5, Insightful)
Re: (Score:2)
Which, like most 'security' measures, is a great way to keep honest people honest.
But then, I guess, it's not about stopping the bad behaviour, it's about being able to deflect lawsuits by being able to prove that you put measure in place, however ineffective, to try to stop it.
Re: (Score:1, Interesting)
If you manage your network infrastructure devices and servers properly, this is no more risky than simply adding more webservers to your DMZ.
In fact, it probably makes your infrastructure as a whole more resilient, since your webservers are no longer directly receiving traffic from clients, and data can be sanity ch
Re:Whiskey Tango Foxtrot? (Score:5, Interesting)
that was about a year ago. We were already using Bluecoat proxies, formerly known as CacheFlow.
Re: (Score:2)
Re: (Score:1, Informative)
Re: (Score:2)
Good point.
It's not an attack but it is definitely man-in-the-middle. A server proxy could make good architectural sense, for example when the SSL proxy is a load balancer in front of a server farm. As the client, you can validate that the load balancer is what its certificate claims it to be, say www.foo.com.
What is privately architected beyond that, you don't know, and really shouldn't care. Just think of the whole thing as one big
Re: (Score:1)
Note that the proxy can only succeed at representing itself as having the expected identity because it has been configured with the private key corresponding to that certificate and its identity. In other words, no random person can set up this man-in-the-middle.
Mostly true. Be aware that in a corporate environment, the IT department can install its own SSL CA certificates into the web browsers (and other applications). Once this is done, corporate proxy can masquerade as any entity the IT department chooses - up to and including auto-generation of SSL certificates, signed, of course, with the IT department's CA certificate.
This, of course, is no surprize.
Also, I assume that applications, including web browsers, could be configured to use a central CA certific
Re: (Score:2)
We have to be careful when talking about certificate identity. It's not the case that a proxy can ever "masquerade" as something else. By being configured with a given certificate and -- critically -- its corresponding private key, that proxy in identity terms becomes that other entity. As you say, this should be no surprise, but this is not familiar territory for many people, and it bears emphasis.
Often people m
Re:Don't trust SSL! (Score:5, Informative)
Re: (Score:2, Flamebait)
Re: (Score:2)
Nothing new, let's move along.
Re: (Score:2)
And I'd also like to point out that unless you manually verify the SSH keys using a seperate secure channel during your first con
Re: (Score:3, Insightful)
Re: (Score:2)
Re: (Score:1)
Re: (Score:3, Insightful)
You have no way of verifying it because the ability to verify the SSL certificate is taken away from you (every site returns the certificate of the proxy).
Yes reading such data would be actionable - as would reading most emails without explicit written consent. Hasn't stopped t
Re: (Score:1)
Re:Don't trust SSL! (Score:5, Informative)
If they were able to do this without cooperation of the endpoints, it'd be a man-in-the-middle attack, and yes it would demonstrate that SSL is insecure.
The article's background information skips over an important point: the WAN accelerator device must be owned by the same group that runs the server. So this is for your data centers, not for your corporate headquarters.
I've never heard of this sort of device before, but I'll give my own background, filling in the gaps from their later information, my understanding of SSL, and a couple guesses.
The original (unencrypted) problem: Say you have a low-bandwidth link between a bunch of servers and clients. You want to make the best use of your link's limited bandwidth through compression (as well as QoS and such). In fact, you want to say "these next 426 bytes are the same as chunk 12345, which I've previously sent to some other client". The original setup looks like this:
The solution: obviously you can't say "just access chunk 12345" to client B if you sent chunk 12345 to client A. That's why they use a pair of these devices straddling the slow link to do this compression. They compress when sending and decompress when receiving. In the end, you still need to be able to send all the original bytes to each client. You might have many slow connections, but we'll say it's a "fast" link because in aggregate they're fast enough. So the setup looks like this:
Now, I'm not sure how common this setup actually is. Apparently you've cheaped out and gotten a T-1 or something across town, but you still have to pay for all the upstream bandwidth as the data leave your control or diverge. But let's just go with it.
Now add encryption. You could look for commonalities in the encrypted streams, but you're unlikely to find much. For the compression to be effective, it needs to work on unencrypted data. And you can't just forge a certificate on-the-fly to make proxying transparent, unless you've found a man-in-the-middle vulnerability in the SSL setup. Short of that, this is possible under one of two conditions: (1) the validators trust a CA certificate to which the device has a private key, so it can issue new certificates on the fly, or (2) the device has been preloaded with keys for every certificate it is expected to proxy.
The choice they've made seems to be this: you're assumed to control the servers but not the clients. So if you want to have an SSL connection to a given server, you need to load that server's key somewhere onto this pair of devices. (Preferably the Accelerator.Server for security.) That's what they're talking about in this paragraph:
I'm not sure if they support SSL client authentication, but if they did, the choice is the same: load all the clients' keys onto the device or have your servers trust the device's CA.
huh? (Score:2)
Doesn't this completely defeat the point of SSL? An encrypted link from client to server? If you got to an SSL website through this WAN link, it's not going to be encrypted anymore unless you trust the keys from the WAN access point. So, unless each WAN has it's own trusted key through a signature authority this isn't going to work. Seems pretty stupid to me. Isn't SSL traffic alrea
Re:huh? (Score:4, Interesting)
Re: (Score:1)
Now throw in a little CIF
Re: (Score:2)
Re: (Score:2)
Nothing can be trusted... (Score:2, Insightful)
This is gross irresponsibility (Score:3, Insightful)
Any administrator who puts in a security hole like that to get a minor reduction in bandwidth is grossly irresponsible. No device in the middle of the network should have the end to end decryption keys. Ever.
If you have too much traffic to your secure servers, take a look at what they're sending. Maybe the canned images can be moved to a non-secure server, where they can be cached locally. You're probably not actually sending huge volumes of secure data to a browser.
Or maybe you just need to find out who's downloading videos and stop them.
Re: (Score:2)
Re: (Score:1)
If you have too much traffic to your secure servers, take a look at what they're sending. Maybe the canned images can be moved to a non-secure server
In theory, this sounds good, however, many browsers put up a warning when a web page contains mixed "secure" and "unsecure" content. (I just checked this with FireFox 2.0.0.2 with a page on my internal server; I got such a warning.)
I hope such warnings will continue to be the default. As such, the work around is either reduce the number and size of images in your web page, and/or use SSL/TSL acceleration.
Re: (Score:2)
If you have to comply with policies that require NIDS & retention of their logs, you don't have any other good option that won't load the host. That load will be disk I/O and it's associat
Legality (Score:3, Interesting)
That means, if an employee at a company that uses a BlueCoat device were to say login to a bank... the sysadmin would technically be violating the law.... unless the bank gave explicit permission (most likely would need to be in writing).
Even if you were to ban online banking in the workplace, that wouldn't change the impact on the sysadmin's libility if a user broke the rules. Go ahead, fire the employee... they just let the bank know about the security breach, and who the "hacker" was.
Seems to me like the laws may need some adjusting.
And that's why I don't login to a bank from work. I know sysadmins in many companies steal SSN's, credit card #'s, etc. by using Timbuktu, VNC, etc. as well as sniffing packets. It's just what it is. Why should I put my identity at risk? I don't see a good reason. I wait until I'm home for that. It's one thing to read an email, it's another to jack by SSN.
Why is this news? (Score:1)
Not sure about over the WAN.. (Score:4, Informative)
Normally, the SSL Accelerators are in very close proximity to the web servers (both network and physical distance-wise). The thought of doing something similar with enterprise WAN traffic over long distances, however, is a bit more frightening. I guess like many other things out there, it all depends on who your vendors are and how you implement the solution. Just be careful.. the Internet can be a nasty place.
always adjust your password (Score:1)
to keep your connection security.
SSL (Score:1)