<html>
<head>
<meta content="text/html; charset=ISO-8859-1"
http-equiv="Content-Type">
</head>
<body bgcolor="#FFFFFF" text="#000000">
<div class="moz-cite-prefix">On 26/10/2012 4:05 PM, Paul Gear wrote:<br>
</div>
<blockquote cite="mid:508A282C.80802@libertysys.com.au" type="cite">
<meta content="text/html; charset=ISO-8859-1"
http-equiv="Content-Type">
<div class="moz-cite-prefix">I would really love to know how these
UTM devices think they can do this securely, given the appalling
level of proxy support in Mac, iOS, and Android apps. Or is
their certificate validation so poor that they just don't care
that they're being MitM-ed?<br>
<br>
Paul<br>
</div>
</blockquote>
<br>
The normal trick for SSL is to make a new root ca + wildcard cert
and forcibly install the root ca onto each PC via A/D or MDM for the
iOS and Android devices. From there you just MitM with the wildcart
cert installed on the UTM.<br>
<br>
Craig.<br>
</body>
</html>