<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Research paper shows vulnerabilities with SSL interception in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/research-paper-shows-vulnerabilities-with-ssl-interception/m-p/148340#M49570</link>
    <description>&lt;P&gt;Here is the CERT report outlining the issues when settting up corporate decryption and not mentioning any specific vendors.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.us-cert.gov/ncas/alerts/TA17-075A" target="_blank"&gt;https://www.us-cert.gov/ncas/alerts/TA17-075A&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Would be a good exercise to have a best practices document for how PA could follow these recomendations.&lt;/P&gt;</description>
    <pubDate>Sun, 19 Mar 2017 16:59:44 GMT</pubDate>
    <dc:creator>pulukas</dc:creator>
    <dc:date>2017-03-19T16:59:44Z</dc:date>
    <item>
      <title>Research paper shows vulnerabilities with SSL interception</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/research-paper-shows-vulnerabilities-with-ssl-interception/m-p/146418#M49189</link>
      <description>&lt;P&gt;On Feb 2017, some universities, Mozilla, Cloudflare, and Google released&amp;nbsp;this&amp;nbsp;paper on corporate and desktop HTTPS&amp;nbsp;interception.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First they figured out how to identify when someone connects to a web server through an SSL interception appliance. Then they found that most corporate "man-in-the-middle' appliances expose security vulnuerabilities. Basically, most appliances don't mirror the client's browser TLS handshake, and instead uses its own less secure cipher suite.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So for example, your browser requests to connect to google.com with TLS 1.2 with AES, the firewall decrypts it, then re-encrypts it with a weaker TLS handshake (like TLS 1.0 with RC4, or worse). This effectively makes your browser's connection far less secure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The paper grades a few appliances. Bluecoat got an "A", but Cisco got an "F". Sophos and Juniper got a "C".&amp;nbsp;Unfortunately Palo Alto isn't graded,&amp;nbsp;and I don't know what method it uses.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's the link to the paper (PDF hosted by one of the paper's authors, Zakir Durumeric): &lt;A href="https://zakird.com/papers/https_interception.pdf" target="_self"&gt;The Security Impact of SSL Interception&lt;/A&gt;&amp;nbsp;(&lt;A href="https://zakird.com/papers/https_interception.pdf" target="_blank"&gt;https://zakird.com/papers/https_interception.pdf&lt;/A&gt;). The juicy stuff is on page 5.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also here is a link to an article summary about it, in case the PDF doesn't work:&amp;nbsp;&lt;A href="https://www.helpnetsecurity.com/2017/02/10/https-interception/" target="_blank"&gt;https://www.helpnetsecurity.com/2017/02/10/https-interception/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2017 16:14:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/research-paper-shows-vulnerabilities-with-ssl-interception/m-p/146418#M49189</guid>
      <dc:creator>Maxstr</dc:creator>
      <dc:date>2017-03-07T16:14:53Z</dc:date>
    </item>
    <item>
      <title>Re: Research paper shows vulnerabilities with SSL interception</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/research-paper-shows-vulnerabilities-with-ssl-interception/m-p/146435#M49191</link>
      <description>&lt;P&gt;Great highlight...I couldn't open your link though...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did some Google sloothing and found this BlackHat article on this topic:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://media.blackhat.com/bh-eu-12/Jarmoc/bh-eu-12-Jarmoc-SSL_TLS_Interception-Slides.pdf&amp;nbsp;" target="_blank"&gt;https://media.blackhat.com/bh-eu-12/Jarmoc/bh-eu-12-Jarmoc-SSL_TLS_Interception-Slides.pdf&amp;nbsp;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2017 16:00:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/research-paper-shows-vulnerabilities-with-ssl-interception/m-p/146435#M49191</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2017-03-07T16:00:17Z</dc:date>
    </item>
    <item>
      <title>Re: Research paper shows vulnerabilities with SSL interception</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/research-paper-shows-vulnerabilities-with-ssl-interception/m-p/146444#M49193</link>
      <description>Don't know why that link doesn't work, but it's directly from one of the author's site. I added another link that has some article about it too.</description>
      <pubDate>Tue, 07 Mar 2017 16:05:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/research-paper-shows-vulnerabilities-with-ssl-interception/m-p/146444#M49193</guid>
      <dc:creator>Maxstr</dc:creator>
      <dc:date>2017-03-07T16:05:44Z</dc:date>
    </item>
    <item>
      <title>Re: Research paper shows vulnerabilities with SSL interception</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/research-paper-shows-vulnerabilities-with-ssl-interception/m-p/146446#M49194</link>
      <description>&lt;P&gt;*It's possible my company was blocking an IP for the site...(I didn't really care to look through firewall logs to confirm) lol*&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2017 16:14:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/research-paper-shows-vulnerabilities-with-ssl-interception/m-p/146446#M49194</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2017-03-07T16:14:44Z</dc:date>
    </item>
    <item>
      <title>Re: Research paper shows vulnerabilities with SSL interception</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/research-paper-shows-vulnerabilities-with-ssl-interception/m-p/146447#M49195</link>
      <description>oops, I clicked accept instead of quick reply...&lt;BR /&gt;&lt;BR /&gt;I wish I could attach files to the post but I don't think they have feature here.</description>
      <pubDate>Tue, 07 Mar 2017 16:16:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/research-paper-shows-vulnerabilities-with-ssl-interception/m-p/146447#M49195</guid>
      <dc:creator>Maxstr</dc:creator>
      <dc:date>2017-03-07T16:16:47Z</dc:date>
    </item>
    <item>
      <title>Re: Research paper shows vulnerabilities with SSL interception</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/research-paper-shows-vulnerabilities-with-ssl-interception/m-p/148340#M49570</link>
      <description>&lt;P&gt;Here is the CERT report outlining the issues when settting up corporate decryption and not mentioning any specific vendors.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.us-cert.gov/ncas/alerts/TA17-075A" target="_blank"&gt;https://www.us-cert.gov/ncas/alerts/TA17-075A&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Would be a good exercise to have a best practices document for how PA could follow these recomendations.&lt;/P&gt;</description>
      <pubDate>Sun, 19 Mar 2017 16:59:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/research-paper-shows-vulnerabilities-with-ssl-interception/m-p/148340#M49570</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2017-03-19T16:59:44Z</dc:date>
    </item>
  </channel>
</rss>

