Debating SSL Decryption in 2024

Debating SSL Decryption in 2024

Yet another day brings another meeting about another security product recommending SSL Decryption at our network edge. Your Intrusion Prevention System (IPS), your web filter, the damn packet broker—they all want decrypted traffic to function at “optimum efficiency”. I’ve always opposed this, even CISA (previously US-CERT) issued a notice in 2016 advising the community against breaking the trust chain. But, this new interaction got me thinking… It’s 2024, and 95% of internet traffic is now encrypted. This poses a significant challenge for detecting and mitigating threats hidden within encrypted traffic. So, the question arises: should we consider breaking the trust chain?

There have been several studies which highlight the risk associated with HTTPS interception, a process where encrypted traffic is decrypted, inspected, and then re-encrypted by security products. This method is intended to allow organizations to scan for malicious content within encrypted traffic. However, this breaks the end-to-end encryption provided by protocols like TLS, potentially weakening the security it aims to bolster. These products often fail to properly verify the server’s certificate chain before re-encrypting and forwarding client data, opening up the possibility of man-in-the-middle (MitM) attacks. Furthermore, these products might not convey certificate-chain verification errors to the client, leading users to believe they are securely connected to the intended server when, in fact, they are not. This makes the entire proposal a double-edged sword.

My take

In my opinion the best place to look at this traffic is at the endpoint, not at the edge. Endpoint security has certainly been gaining traction over the years as experts recognize that the endpoint is often the final battleground where threats manifest. By focusing there, organizations can ensure a more direct and effective approach to security that aligns with modern work environments, including remote work and BYOD policies. This allows security professionals the peace of mind of being able to inspect SSL traffic, without having to hijack your traffic with a self-hosted MitM attack.

Conclusion

As the use of encryption increases, the security community faces the challenge of balancing privacy needs with the necessity to detect potential threats. HTTPS interception provides a solution but also brings substantial risks that require careful consideration. The future of cybersecurity strategies will likely focus on improving endpoint security and creating new technologies that can ensure the security of encrypted traffic without breaking the trust chain.

comments powered by Disqus

Related Posts

Nexus 1000v – Out of Ports on a Virtual Switch?

Nexus 1000v – Out of Ports on a Virtual Switch?

Yesterday, work presented an interesting issue I wanted to share with everyone. While configuring a new virtual machine one of our systems engineers was presented with an issue he …

Read More
Using OSPF to create unlicensed full duplex connections.

Using OSPF to create unlicensed full duplex connections.

Recently one of my clients asked me to help resolve an issue at an aggregation point on their network. They had several connections that converged onto a single unlicensed link on …

Read More
Using /31 subnets for point-to-point interfaces

Using /31 subnets for point-to-point interfaces

Recently a “colleague”, I use that term very loosely here, was reviewing my recommendations for changes on his network. Since they’re rather tight on public IP space, and require …

Read More