You know why I want to do SSL inspection? So that my current IPS/AV-enabled UTM firewall works on 99+% of the traffic it sees (both inbound and outbound) instead of roughly 75% to 80%. We are replacing it soon with hardware that will be capable of handling the increased load. I'm with you on the technology -vs- behavior issue, but our use case has very little to do with behavior and everything to do with defense.
On Tue, Oct 14, 2014 at 3:27 PM, Kennedy, Jim <[email protected]> wrote: > SSL Inspection is not simple. You are basically going to use your filter > to pull off a man in the middle attack on your desktops. So every client > will have to have a cert from that filter that trusts your filter. So the > windows boxes in your domain will be easy. But Iphones, androids, > chromebooks and byod will have to download that cert and install it and > trust it. > > > > Double check the Windows CA cert idea, many filters won’t take them for > SSL inspection….they will only work with their own self generated cert. > > > > Remind the powers that be that youtube blocking is not a CIPA/Erate > requirement. So the blocking it must be a behavior issue, the students are > sucking up your bandwidth, or they are goofing off. Those are behavioral > issues that are seldom solved by technology. And that their attempt to > solve it via technology is going to create a nightmare, for them. You too > but they will be more concerned about their nightmare. > > > > *From:* [email protected] [mailto: > [email protected]] *On Behalf Of *Matthew W. Ross > *Sent:* Tuesday, October 14, 2014 3:17 PM > *To:* [email protected] > *Subject:* Re: [NTSysADM] Windows CA Server > > > > Short answer: We don't _need_ this. Not yet, anyways. > > > > Slightly longer answer: The powers that be are asking for me to block > Youtube for some students, allow Youtube for Schools for the rest, and > unfiltered Youtube for staff. It's possible with our current filter, but to > get the best results (including https:// access to youtube, which is > often the default) is to have SSL inspection. > > > > I'd like to have SSL inspection anyways, as many sites are going to > SSL/TLS encryption anyways... some without the option to for regular http > access... The only other option is to configure a proxy instead of the > current transparent proxy setup we have now. We have done that in the past, > with mixed results. > > The various responses I've received so far have halted my test deployment, > as I'm now trying to fully understand the enormity of this. I'm a fan of > keeping it simple, so we will wait and see what solution works best for us. > > > > > > --Matt Ross > Ephrata School District > > Brian Desmond <[email protected]> , 10/14/2014 9:00 AM: > > *I’d ask the question of why you need a CA for this?* > > > > *Thanks,* > > *Brian Desmond* > > *[email protected] <[email protected]>* > > > > *w – 312.625.1438 <312.625.1438> | c – 312.731.3132 <312.731.3132>* > > > > *From:* [email protected] [mailto: > [email protected]] *On Behalf Of *Matthew W. Ross > *Sent:* Monday, October 13, 2014 5:58 PM > *To:* [email protected] > *Subject:* [NTSysADM] Windows CA Server > > > > We have been happily getting by without doing SSL inspection on our > content filter. Now, it seems that we may need to take that next step. > > > > I'm making a windows CA server on our VMWare cluster now. > > > > Before I get too deep, any "gotchas" I should be looking for? Looking into > this, it looks like I might be diving right into the deep end. Time for a > lot of reading... > > > > > > --Matt Ross > Ephrata School District >

