--
You received this message because you are subscribed to the Google Groups "Techies for schools" group.
To unsubscribe from this group and stop receiving emails from it, send an email to techies-for-sch...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
Any particular system you are planning to use?
We found issues with N4L's system and I would have difficulty
recommending it.
To unsubscribe from this group and stop receiving emails from it, send an email to techies-for-schools+unsub...@googlegroups.com.
Any particular system you are planning to use?
We found issues with N4L's system and I would have difficulty recommending it.
On 01/11/16 12:15, Peter Mancer wrote:
Hello--
I'm doing some consulting work for a school that is considering full SSL decryption and inspection. I'm interested to know if any schools are doing this and if so what they are using and the issues that they had implementing it.
Thanks
Peter
You received this message because you are subscribed to the Google Groups "Techies for schools" group.
To unsubscribe from this group and stop receiving emails from it, send an email to techies-for-schools+unsub...@googlegroups.com.
Peter
To unsubscribe from this group and stop receiving emails from it, send an email to techies-for-schools+unsubscribe...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
We have been running it, but have reduced the amount of full inspection we do due to the FortiGate 600C hitting memory limits. Internet stats for the last 6 hours: 185Mbps average, peek 406Mbps. Active IPv4 Sessions: 13.39K average, 20.51k max.
For the certificates we run an offline root CA, with an intermediate CA certificate issued to the FortiGate.
There are two modes the FortiGate can working in, flow based and proxy based. We’ve been using proxy. In flow based, the FortiGate can replace the certificate for a SSL session, but can’t add any additional certificates that are in the certificate chain, where as in proxy mode it can included include all certificates in the chain. Therefore if you use flow based SSL inspection, clients will need both the root CA certificate and the intermediate Fortigate certificate, whereas using proxy mode the clients just need the root CA certificate. Based on comments from another school, we’d probably have less memory problems if we swapped to the flow mode.
In regards to installing the certificates, we have written windows and android apps which: install the certificates, create desktop shortcuts to our Intranet and Moodle, and configures the wireless network (we use Dynamic PSK on our Ruckus BYOD network). For Mac and iOS we have a webpage which generates a profile which does the same. The apps / profiles are downloaded by users from an open provisioning SSID.
Regards
Tracy B
--
You received this message because you are subscribed to the Google Groups "Techies for schools" group.
To unsubscribe from this group and stop receiving emails from it, send an email to techies-for-sch...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
Note: This communication may contain privileged and confidential information intended only for the addressee named above. Any views or opinions presented are solely those of the author. If you have received this message in error, we request you delete the message and notify the sender. Please do not distribute, copy or disclose any information. This e-mail has been scanned for viruses but all liability for viruses or similar in any attachment or message is excluded.
St Peter's School, Cambridge, New Zealand
Telephone: 647 827 9899 Fax: 647 827 9812
Website: www.stpeters.school.nz
Please consider the environment before printing this email
Question: What do you consider severe performance degradation through the N4L filtering proxy?Gerard
On Tue, Nov 1, 2016 at 2:47 PM, Peter Mancer <pe...@watchdog.net.nz> wrote:
PatrickThe school has a Watchguard firewall that will need to be replaced with a much gruntier (and expensive) model if this is to be implemented. I would have considered a FortiGate as an option as well. Thanks for your feedback on the N4L system. We have not considered this as I have yet to find a school on a 500Mbps connection that is using their filtering without severe performance degradation through the proxy. If there is one out there, I would love to hear from them.Kind regards
Peter
On Tuesday, 1 November 2016 14:23:49 UTC+13, Patrick Dunford wrote:
Any particular system you are planning to use?
We found issues with N4L's system and I would have difficulty recommending it.
On 01/11/16 12:15, Peter Mancer wrote:
Hello--
I'm doing some consulting work for a school that is considering full SSL decryption and inspection. I'm interested to know if any schools are doing this and if so what they are using and the issues that they had implementing it.
Thanks
Peter
You received this message because you are subscribed to the Google Groups "Techies for schools" group.
To unsubscribe from this group and stop receiving emails from it, send an email to techies-for-schools+unsub...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
We have been running it, but have reduced the amount of full inspection we do due to the FortiGate 600C hitting memory limits. Internet stats for the last 6 hours: 185Mbps average, peek 406Mbps. Active IPv4 Sessions: 13.39K average, 20.51k max.
For the certificates we run an offline root CA, with an intermediate CA certificate issued to the FortiGate.
There are two modes the FortiGate can working in, flow based and proxy based. We’ve been using proxy. In flow based, the FortiGate can replace the certificate for a SSL session, but can’t add any additional certificates that are in the certificate chain, where as in proxy mode it can included include all certificates in the chain. Therefore if you use flow based SSL inspection, clients will need both the root CA certificate and the intermediate Fortigate certificate, whereas using proxy mode the clients just need the root CA certificate. Based on comments from another school, we’d probably have less memory problems if we swapped to the flow mode.
In regards to installing the certificates, we have written windows and android apps which: install the certificates, create desktop shortcuts to our Intranet and Moodle, and configures the wireless network (we use Dynamic PSK on our Ruckus BYOD network). For Mac and iOS we have a webpage which generates a profile which does the same. The apps / profiles are downloaded by users from an open provisioning SSID.
Regards
Tracy B
From: techies-f...@googlegroups.com [mailto:techies-f...@googlegroups.com] On Behalf Of Peter Mancer
Sent: Tuesday, 1 November 2016 12:16 p.m.
To: Techies for schools <techies-f...@googlegroups.com>
Subject: [techies-for-schools] Anyone doing full SSL decryption and inspection on their network?
Hello
I'm doing some consulting work for a school that is considering full SSL decryption and inspection. I'm interested to know if any schools are doing this and if so what they are using and the issues that they had implementing it.
Thanks
Peter
--
You received this message because you are subscribed to the Google Groups "Techies for schools" group.
To unsubscribe from this group and stop receiving emails from it, send an email to techies-for-schools+unsub...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
To unsubscribe from this group and stop receiving emails from it, send an email to techies-for-sch...@googlegroups.com.
I'm not aware of that but we have only supported one school using
it for any length of time. However we have largely ditched the SSL
inspection due to challenges.
To unsubscribe from this group and stop receiving emails from it, send an email to techies-for-sch...@googlegroups.com.
We were running full inspection on all internet bound policies, with exclusions for categories like banking websites.
One program which we couldn’t get working was Skype (consumer version) – we ended up setting up one laptop with a static IP, and applied a policy allowing uninspected traffic from that. Skype for Business (formally called Lync) did work though the firewall.
A site which we had problems with was Premier League Pass / neulion.com. They couldn’t be convinced not to send unencrypted http traffic over port 443, and as the Fortigate was expecting SSL traffic on that port, it was blocking it.
An international student stated that our firewall was harder to get round than the Great Firewall of China.
Regards,
Tracy
From: techies-f...@googlegroups.com [mailto:techies-f...@googlegroups.com]
On Behalf Of Peter Mancer
Sent: Tuesday, 1 November 2016 5:28 p.m.
To: Techies for schools <techies-f...@googlegroups.com>
Subject: Re: [techies-for-schools] Anyone doing full SSL decryption and inspection on their network?
Tracy
Thank you for the information. That's a big load for a 600C so I can fully understand the memory issues, but those boxes are great workhorses. It looks like a 'D' model should be on your shopping list. The 600D is rated at up to 3.5Gbps throughput doing SSL inspection but FortiGate don't have figures on the 600C for a comparison. However the 600D does about four times the session performance.
Do you limit the full inspection to certain policies only?
On Tuesday, 1 November 2016 15:46:30 UTC+13, Tracy Briscoe wrote:
We have been running it, but have reduced the amount of full inspection we do due to the FortiGate 600C hitting memory limits. Internet stats for the last 6 hours: 185Mbps average, peek 406Mbps. Active IPv4 Sessions: 13.39K average, 20.51k max.
For the certificates we run an offline root CA, with an intermediate CA certificate issued to the FortiGate.
There are two modes the FortiGate can working in, flow based and proxy based. We’ve been using proxy. In flow based, the FortiGate can replace the certificate for a SSL session, but can’t add any additional certificates that are in the certificate chain, where as in proxy mode it can included include all certificates in the chain. Therefore if you use flow based SSL inspection, clients will need both the root CA certificate and the intermediate Fortigate certificate, whereas using proxy mode the clients just need the root CA certificate. Based on comments from another school, we’d probably have less memory problems if we swapped to the flow mode.
In regards to installing the certificates, we have written windows and android apps which: install the certificates, create desktop shortcuts to our Intranet and Moodle, and configures the wireless network (we use Dynamic PSK on our Ruckus BYOD network). For Mac and iOS we have a webpage which generates a profile which does the same. The apps / profiles are downloaded by users from an open provisioning SSID.
Regards
Tracy B
From: techies-f...@googlegroups.com [mailto:techies-f...@googlegroups.com] On Behalf Of Peter Mancer
Sent: Tuesday, 1 November 2016 12:16 p.m.
To: Techies for schools <techies-f...@googlegroups.com>
Subject: [techies-for-schools] Anyone doing full SSL decryption and inspection on their network?
Hello
I'm doing some consulting work for a school that is considering full SSL decryption and inspection. I'm interested to know if any schools are doing this and if so what they are using and the issues that they had implementing it.
Thanks
Peter
Note: This communication may contain privileged and confidential information intended only for the addressee named above. Any views or opinions presented are solely those of the author. If you have received this message in error, we request you delete the message and notify the sender. Please do not distribute, copy or disclose any information. This e-mail has been scanned for viruses but all liability for viruses or similar in any attachment or message is excluded.
--
To unsubscribe from this group and stop receiving emails from it, send an email to techies-for-schools+unsubscribe...@googlegroups.com.
To unsubscribe from this group and stop receiving emails from it, send an email to techies-for-schools+unsub...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
User privacy with HTTPS traffic
When inspecting HTTPS traffic it is possible to select only the specific traffic that should get decrypted for inspection. This can be based on certain categories or a list of domains. Users can also list specific hosts and domains that should be excluded from HTTPS inspection, or choose to decrypt only applications covered in the list of AVC applications for decryption.
Note also that when HTTPS traffic gets scanned CWS does not log the Path and Query attributes of the URL, only the Host will be logged. For example, if a user browses to Google and searches for “cisco cloud web security” and hits Enter, the full URL will be:
https://www.google.com/?gws_rd=ssl#q=cisco+cloud+web+security
That full URL can be broken down to these three attributes: ● Host: https://www.google.com
● Path: ?gws_rd=ssl# (where on the site the user went to)
● Query: q=cisco+cloud+web+security (what the user searched for)
For privacy reasons CWS will log only the Host and not the Path nor the Query for HTTPS traffic that is inspected
To unsubscribe from this group and stop receiving emails from it, send an email to techies-for-schools+unsubscribe...@googlegroups.com.
--
You received this message because you are subscribed to the Google Groups "Techies for schools" group.
To unsubscribe from this group and stop receiving emails from it, send an email to techies-for-schools+unsubscribe...@googlegroups.com.
--
You received this message because you are subscribed to the Google Groups "Techies for schools" group.
To unsubscribe from this group and stop receiving emails from it, send an email to techies-for-schools+unsub...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
Actually, it is exactly MIM. In order to be able to decrypt SSL traffic the N4L server has to be in the middle of the SSL transaction. Therefore it is the "man in the middle".
When you connect to a secure site the transaction between you and the remote server (e.g. your bank) is secure and nothing can get into it.
To be able to intercept the communications so that the SSL interception can take place, the N4L server impersonates the remote server. It does this by splitting the transaction into two pieces: one piece between you and the N4L server, and the other piece is between the N4L server and the bank (or whoever). This works because the N4L server creates its own certficate that pretends to be the one from your bank.
The reason you have to install the certificate provided by N4L
onto each device is that it says that the N4L server is a Trusted
Root Certification Authority, which means it can issue
certificates to the client, which pretend to be the real
certificate issued by the secure website you are accessing. Next
time you are on a secure website, have a look at the certificate;
it will have been issued by N4L rather than Google or Verisign or
one of the other SSL certificate providers.
To unsubscribe from this group and stop receiving emails from it, send an email to techies-for-sch...@googlegroups.com.
<snip>
Hi BenI agree that the function is "Man in the middle" but don't agree with the attack word.
<snip>
On Thursday, 17 November 2016, <gre...@staff.cbhs.school.nz> wrote:
<snip>
at a software level, an SSL decrypt step is 101% MitM attack.
<snip>- Ben.
On Thursday, November 17, 2016 at 8:06:13 PM UTC+13, Tim Harper wrote:Hi again LandynYes I've heard people refer to this as MIM. However my understanding of MIM is that using a certificate is not MIM. MIM (according to the definition I know) does something different.
<snip>
yeah, look at SuperFish and a few other examples that come to mind!
our experience of CCWS was basically a lot of work and a lot of
compatibility issues - in the end we just gave up - the school
closes in 4 weeks!
--
--
You received this message because you are subscribed to the Google Groups "Techies for schools" group.
To unsubscribe from this group and stop receiving emails from it, send an email to techies-for-schools+unsub...@googlegroups.com.
I would hope people are educated on the perils of public wifi in
general, or looking at the source of any certificate.
Unfortunately we have been told that have a secure certificate on
a website means it is legit and secure - clearly not always the
case with SSL interception / MITM becoming more common.
--
You received this message because you are subscribed to the Google Groups "Techies for schools" group.
To unsubscribe from this group and stop receiving emails from it, send an email to techies-for-sch...@googlegroups.com.