On Thu, 25 Mar 2004, Graham Leggett wrote: > What you're describing is effectively an SSL man-in-the-middle attack, > and although you're doing it for useful purposes, it is the wrong way to > go about this. I would only describe it as an attack on the known weakness of certificate handling in current browsers, not on SSL. The problem is that there is no canonical mapping from hostnames to CAs.
> The correct solution is to set up your own reverse proxy, with your own > real SSL cert, which can reverse proxy the webmail site. The module you > described can then be used to virus scan the mail. This simple is not practical for a large corporation. And standard security practices would really prefer to have it the other way round: only sites explicitely excluded from scanning should be spared the scanning. That's the way we generally handle security policies for firewalls, why should it be the other way round for SSL traffic? And there still are many other ways to download infected stuff. I think this all boils down to the question: what is more important for a corporation: individual privacy for employees or data security for the corporation? An Internet provider or home user will of course have a different view than the corporate security officer. Although employees have a right to use the office phone for private calls, banks usually tape the majority of phone calls for their own security. What's the difference? > As a separate exercise, block access to the webmail systems, and inform > people they must use your reverse proxied website instead in order to > gain access. In squid, a simple redirect to the reverse proxied webmail from the webmail system would do, I guess. Mit herzlichem Gruss Andreas Mueller -- Dr. Andreas Mueller, Beratung und Entwicklung Bubental 53, CH - 8852 Altendorf Email: [EMAIL PROTECTED] Voice: +41 55 4621483 Fax: +41 55 4621485