Debating SSL Decryption in 2024

Debating SSL Decryption in 2024

Yet another day brings another meeting about another security product recommending SSL Decryption at our network edge. Your Intrusion Prevention System (IPS), your web filter, the damn packet broker—they all want decrypted traffic to function at “optimum efficiency”. I’ve always opposed this, even CISA (previously US-CERT) issued a notice in 2016 advising the community against breaking the trust chain. But, this new interaction got me thinking… It’s 2024, and 95% of internet traffic is now encrypted. This poses a significant challenge for detecting and mitigating threats hidden within encrypted traffic. So, the question arises: should we consider breaking the trust chain?

There have been several studies which highlight the risk associated with HTTPS interception, a process where encrypted traffic is decrypted, inspected, and then re-encrypted by security products. This method is intended to allow organizations to scan for malicious content within encrypted traffic. However, this breaks the end-to-end encryption provided by protocols like TLS, potentially weakening the security it aims to bolster. These products often fail to properly verify the server’s certificate chain before re-encrypting and forwarding client data, opening up the possibility of man-in-the-middle (MitM) attacks. Furthermore, these products might not convey certificate-chain verification errors to the client, leading users to believe they are securely connected to the intended server when, in fact, they are not. This makes the entire proposal a double-edged sword.

My take

In my opinion the best place to look at this traffic is at the endpoint, not at the edge. Endpoint security has certainly been gaining traction over the years as experts recognize that the endpoint is often the final battleground where threats manifest. By focusing there, organizations can ensure a more direct and effective approach to security that aligns with modern work environments, including remote work and BYOD policies. This allows security professionals the peace of mind of being able to inspect SSL traffic, without having to hijack your traffic with a self-hosted MitM attack.

Conclusion

As the use of encryption increases, the security community faces the challenge of balancing privacy needs with the necessity to detect potential threats. HTTPS interception provides a solution but also brings substantial risks that require careful consideration. The future of cybersecurity strategies will likely focus on improving endpoint security and creating new technologies that can ensure the security of encrypted traffic without breaking the trust chain.

comments powered by Disqus

Related Posts

Nexus Virtual Port Channel (vPC)

Nexus Virtual Port Channel (vPC)

The Nexus 7000 and 5000 series have taken port-channel functionality to the next level by enabling port-channels to exist between links that are connected to different devices. …

Read More
Site Upgrades for September 2015

Site Upgrades for September 2015

First, I want to apologize for not doing my job. Over the past couple years I’ve let this site become slightly stagnant. I won’t attempt to make excuses, but I will say that I’m in …

Read More
Juniper QFabric, Junosphere, Automation, and More

Juniper QFabric, Junosphere, Automation, and More

The second day of Network Field Day 2 started early at the Juniper EBC, luckily Abner Germanow was prepared with breakfast for the weary and slightly hung over delegates. He gave …

Read More