Re: Security of SSL proxies

pgut001@cs.auckland.ac.nz (Peter Gutmann) writes:
A number of vendors are now selling SSL proxies which implement secure tunnelling for web browsers using a non-crippled SSL implementation running on the client machine. Has anyone considered the total security level provided by one of these systems? I can see three problems with this approach:
1. The security stops a few feet short of the browser, making a MITM attack possible (see below).
2. Security and authentication is handled by the proxy and not the browser. This means that the browser (and browser user) never get to see the usual indicators that their connection is secure (or "secure" for non-US users).
3. If you use a proxy like this to protect traffic for an entire company, the proxy provides the same type of target as a GAK key center: An attack which compromises this compromises security for the entire company. [problems with this approach deleted]
Peter.
I'm a little confused by your use of the term 'SSL proxy'. Netscape defined an extension to HTTP to allow SSL traffic through a firewall: the encrypted request is prepended (in clear) with the actual destination IP address and port. The firewall proxy then opens a TCP/IP channel to the actual destination/port, and blindly relays packets between the actual destination and the browser until one side or the other shuts down the link. The proxy does no encryption or decryption - in fact, it requires no crypto code at all. (BTW: this what setting the 'security proxy' field in Netscape is all about). The scheme has some drawbacks - there is no provision for chaining proxies. - the server can't determine the source browser's IP - it only sees the proxy's IP address. This makes it more difficult to filter requests based on source ID. - the proxy has no idea of the actual URL requested - proxies which want to filter or log requests based on URL can't do so. Or are you talking about something entirely different? Peter Trei (yes, I've implemented the above) trei@process.com

Peter Trei writes:
pgut001@cs.auckland.ac.nz (Peter Gutmann) writes:
A number of vendors are now selling SSL proxies which implement secure tunnelling for web browsers using a non-crippled SSL implementation running on the client machine.
I'm a little confused by your use of the term 'SSL proxy'. Netscape defined an extension to HTTP to allow SSL traffic through a firewall: the encrypted request is prepended (in clear) with the actual destination IP address and port. The firewall proxy then opens a TCP/IP channel to the actual destination/port, and blindly relays packets between the actual destination and the browser until one side or the other shuts down the link.
Or are you talking about something entirely different?
Something different. There are several products that are designed to improve the strength of the encryption securing the connection between the browser and server. Here are a couple of URLs with more info: http://www.c2.net/products/spwp/ http://www.medcom.se/ssr/ I believe there are a couple of other competitors as well, but don't know the URLs. -- Jeff
participants (2)
-
Jeff Barber
-
Peter Trei