Hi Kyle,

To make the story even shorter, in order to perform this MITM they use a 
wild card asterisk like CN=* ? Personally I'm completely against any 
kind of MITM and rather would block https/port 443 altogether as a 
better policy....but I guess this any discussion about this subject is 
beyond the scope of this discussion.

I'm not sure, but would be a configuration hack (about:config) or 
similar possible to allow the old behavior, whereas the one proposed 
from Nelson would be the default? But I'm sure it's hard to please 
everybody on such issues.

-- 
Regards 
 
Signer:         Eddy Nigg, StartCom Ltd. <http://www.startcom.org>
Jabber:         [EMAIL PROTECTED] <xmpp:[EMAIL PROTECTED]>
Blog:   Join the Revolution! <http://blog.startcom.org>
Phone:          +1.213.341.0390
 



Kyle Hamilton wrote:
> Two short, practical examples, which are gleaned from reality (though
> I am not at liberty to state of what organizations I speak):
>
> One, educational institution.  Due to compliance issues with student
> data being improperly smuggled out of the administration area (in
> reaction to an audit that found substantial lack of compliance with
> the educational record privacy laws), a comprehensive "there is no way
> that anything can leave without our knowing and tracing it" policy was
> put in place.  USB memory sticks and cards were prohibited, and all
> outbound traffic was routed through a proxy.  This proxy would behave
> normally in HTTP, and any HTTP CONNECT request was MITM'ed for
> recording purposes.  Employees were notified that all of their machine
> and network activity were subject to logging, and were explicitly told
> that there was no expectation of privacy on the network.  The MITMed
> connections were all given the same wildcarded security certificate,
> signed by an organizational CA which certificate was loaded into all
> browsers.
>
> (Technically, Nelson's proposal wouldn't cause a complete breakage, as
> long as there was sufficient horsepower and sufficient lack of
> controls available for the organizational CA to issue certificates at
> the request of the proxy server -- it could generate a key or use one
> of a pregenerated set of keys, send off the CSR with the name of the
> site that the client is sending the CONNECT request for, get an
> immediate return of the certificate signed by the organizational CA,
> load it, and then return that to the client.  However, this goes very
> much against security best practices [a security-related operation
> performed automatically and without supervision by a CA with
> organization-wide trust at the request of an entity which is subject
> to attack from both internal and external threats].)
>
>
> Two, hospital.  Due to HIPAA compliance issues, they must monitor all
> communications originating within their network, and as such they've
> put a proxy in place.  One of their employees figured out how to to
> perform SSH over HTTP CONNECT; since this isn't appreciated by their
> MIS department, they broke any protocol negotiation other than SSL and
> TLS.  Said employee didn't stop, though, and figured out a way to do
> an stunnel through which he ssh'es.  This tunnel is unmonitored and
> completely opaque to the hospital MIS department.  (He currently uses
> it to gain access to IRC and various talkers.  While that employee is
> ethical and won't use it for anything which is expressly illegal...
> the fact that he can do what he's doing without detection means that
> others can do what /they/ want to do without detection.  Including
> transmit "personally identifiable health information" without proper
> consent.)
>
>
> You'll run into the same issue in financial environments (fiduciary
> laws), public corporations (Sarbanes-Oxley and GLBA, aka the
> "Victoria's Secret" Law), health care providers (HIPAA), and all sorts
> of other places that need to ensure that communications are compliant
> with the law.  MITM is unfortunately often necessary in these
> environments.
>   

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to