[AusNOG] Maximum users per AP
Paul Gear
ausnog at libertysys.com.au
Sat Oct 27 10:21:25 EST 2012
On 10/26/2012 04:15 PM, Craig Askings wrote:
> On 26/10/2012 4:05 PM, Paul Gear wrote:
>> I would really love to know how these UTM devices think they can do
>> this securely, given the appalling level of proxy support in Mac,
>> iOS, and Android apps. Or is their certificate validation so poor
>> that they just don't care that they're being MitM-ed?
>>
>> Paul
>
> The normal trick for SSL is to make a new root ca + wildcard cert and
> forcibly install the root ca onto each PC via A/D or MDM for the iOS
> and Android devices. From there you just MitM with the wildcart cert
> installed on the UTM.
On 10/27/2012 06:43 AM, Scott Howard wrote:
>
> They do involve a new root CA as you've mentioned, but not a wildcard
> cert. Instead, they create dynamic certs for the sites being
> accessed, and then sign them with the root CA which the end-user trusts.
> ...
> The problem here is getting the cert in the users browser. In a
> controlled corporate environment this is relatively easy (standard
> build, MS GPO, etc). In an uncontrolled environment, it's pretty much
> impossible.
So what do you do for the scenario where you're providing service for
BYOD or public networks (as the OP seemed to be) and have no authority
to touch the end user's device? When we tried this, we came to the
conclusion that we would have to allow unfettered outbound HTTPS if we
weren't to have massive user experience rage, and this basically
eliminates the benefit of any filtering.
I usually intercept all outbound DNS and SMTP (and NTP, but that's just
for efficiency) and force it through the local server so that we can at
least force use of OpenDNS and virus/spam check outgoing mail. But
that's not much of a mitigation...
Paul
P.S. I would have thought that creating dynamic certificates on the fly
would be too processor intensive for all but the smallest sites...
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20121027/35812652/attachment.html>
More information about the AusNOG
mailing list