Solved

SSL Proxy... double proxy.... Will it work?

Posted on 2011-03-01
9
1,045 Views
Last Modified: 2012-05-11
Hi all.

This is the question I have.  If you have a double ssl proxy will it work?  So you are faking a fake certificate basically. In theory, I think it should work.  In reality.. well that is often a different thing.

Your thoughts?
0
Comment
Question by:NYGiantsFan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 4
9 Comments
 
LVL 33

Accepted Solution

by:
Dave Howe earned 500 total points
ID: 35009580
depends on what you mean by a "double proxy"


If you are acting as a classic proxy, then you will be forwarding (unchanged) the ssl handshake you get from upstream, and it doesn't matter too much how many proxies that goes though.

If you are intercept-proxying a ssl connection then you have to be able to represent to the end user (either by having a locally installed cert for reverse proxies such as ISA server and iChain, or spoofing the certificate "on the fly" like, for example, ironport WSAs) a certificate they will accept as valid for the url they entered.

If there is another proxy upstream of type classic, then it doesn't matter - you are planning to either pass though or spoof the certificate anyhow.

If there is another proxy of the intercept type upstream, then it gets a bit more interesting. The certificate must be acceptable where used, either at the end client (for a pass though proxy) or on the intercept proxy itself (if the chain has TWO intercept proxies in it, the first must accept the second's certificate)

this is usually the case (In fact, most intercept proxies don't actually care if their upstream validates or not) but there is an edge case where the first proxy's cert would be acceptable to the end user (via group policy or whatever) but is *not* acceptable to the second proxy, and hence that proxy generates an error to the user rather than passing though the traffic.
0
 
LVL 33

Expert Comment

by:Dave Howe
ID: 35009588
note that most proxies (of either type) can be configured to forward some or all requests explicitly to another proxy, or query the cached data on other proxies for already-downloaded content, or both :)
0
 

Author Closing Comment

by:NYGiantsFan
ID: 35010023
That is what I thought.  Thanks for the confirmation Dave.
0
Resolve Critical IT Incidents Fast

If your data, services or processes become compromised, your organization can suffer damage in just minutes and how fast you communicate during a major IT incident is everything. Learn how to immediately identify incidents & best practices to resolve them quickly and effectively.

 

Author Comment

by:NYGiantsFan
ID: 35010279
Let me clarify in my mind.

For theory sake....

We take one blue coat ssl intercept then we place another blue coat intercept next to it logically.  

Assumptions: 1. That a root CA has been trusted by the end user.  2.  That both Blue Coat devices have an intermediate trusted CA.

We should  not have problems capturing the decrypted traffic twice, because the end user will never see a difference.

Thanks again for you assistance Dave.

0
 
LVL 33

Expert Comment

by:Dave Howe
ID: 35010669
if one bluecoat is "upstream" of the other, then the second bluecoat may well alert if you have not added the CA key for the first bluecoat to it.

however, given you own both bluecoats and the setup procedure pretty much requires that you use an external root CA (usually a MS one, although I have used xca for this in the past) they probably have the same root CA onboard anyhow, so it becomes academic :)
0
 

Author Comment

by:NYGiantsFan
ID: 35010849
How about this situation:
Each blue coat has a self generated CA certificate.  End user has had both certificates pushed out.  Then the two blue coats will have no problem with the others certificate. (Actually, I think you will need to use a MS CA because how will the two blue trust each others certificate?)

So user connects to blue coat 1.  Blue coat 1 decrypts then re-encrypts traffic and creates on the fly certificate which is sent to Blue Coat 2.  Blue Coat accepts blue coat 1 certificate then creates another certificate to connect to the website.  (actually, I think it is more complex then this...however this is the basic logic)

Is this practical..


0
 
LVL 33

Expert Comment

by:Dave Howe
ID: 35012022
sounds about right. assuming 1 is closer to the user than 2, then what will happen is that the user will connect to 1 and ask for the url; 1 will connect to 2, and again, ask for the url, and 2 will connect to the website. the site will respond with a certificate, which 2 will fake a copy off and pass to 1, and 1 will fake a copy off and pass back to the user. both bluecoat devices will then do analysis - which is really a bit of a waste, but if you want to do that it will work :)
0
 

Author Comment

by:NYGiantsFan
ID: 35017124
I just picked two blue coat devices for theory.  I am actually interested in dropping another SSL proxy, however I have greater familiarity with Blue Coat.  

Dave, you have helped me out a few time in the past.  If you are ever in DC, I will buy you lunch if you are interested.  Thanks again!

0
 
LVL 33

Expert Comment

by:Dave Howe
ID: 35019054
lol, based in the Uk, that's a long way to go for some munchies, but I appreciate the thought :)
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
ADFS trust for Skype 4 28
TCP Chat/GPS application security thru firewall 4 55
Web content filtering solution 6 63
User Account Question 6 50
This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question