On Thu, 25 Mar 2004, Graham Leggett wrote:
> What you're describing is effectively an SSL man-in-the-middle attack,
> and although you're doing it for useful purposes, it is the wrong way to
> go about this.
I would only describe it as an attack on the  known  weakness  of
certificate handling in current browsers, not on SSL. The problem
is that there is no canonical mapping from hostnames to CAs.

> The correct solution is to set up your own reverse proxy, with your own
> real SSL cert, which can reverse proxy the webmail site. The module you
> described can then be used to virus scan the mail.
This simple  is  not  practical  for  a  large  corporation.  And
standard  security  practices  would really prefer to have it the
other way round: only sites explicitely  excluded  from  scanning
should be spared the scanning. That's the way we generally handle
security policies for firewalls, why should it be the  other  way
round  for  SSL  traffic?  And there still are many other ways to
download infected stuff.

I think this all  boils  down  to  the  question:  what  is  more
important  for a corporation: individual privacy for employees or
data security for the corporation? An Internet provider  or  home
user  will  of  course  have  a different view than the corporate
security officer. Although employees have  a  right  to  use  the
office  phone  for private calls, banks usually tape the majority
of phone calls for their own security.  What's the difference?

> As a separate exercise, block access to the webmail systems, and inform
> people they must use your reverse proxied website instead in order to
> gain access.
In squid, a simple redirect to the reverse proxied  webmail  from
the webmail system would do, I guess.

Mit herzlichem Gruss

                                        Andreas Mueller

--
Dr. Andreas Mueller, Beratung und Entwicklung
Bubental 53,              CH - 8852 Altendorf
Email:             [EMAIL PROTECTED]
Voice: +41 55 4621483     Fax: +41 55 4621485


Reply via email to