What law? Enterprise deployments own the data. This is not allowed in a US Federal University environment due to specific requirements against monitoring, but WHAT law? Regards, Dr Craig Wright (GSE-Compliance)
Craig Wright Manager of Information Systems Direct : +61 2 9286 5497 [EMAIL PROTECTED] +61 417 683 914 BDO Kendalls (NSW) Level 19, 2 Market Street Sydney NSW 2000 GPO BOX 2551 Sydney NSW 2001 Fax +61 2 9993 9497 www.bdo.com.au Liability limited by a scheme approved under Professional Standards Legislation in respect of matters arising within those States and Territories of Australia where such legislation exists. The information in this email and any attachments is confidential. If you are not the named addressee you must not read, print, copy, distribute, or use in any way this transmission or any information it contains. If you have received this message in error, please notify the sender by return email, destroy all copies and delete it from your system. Any views expressed in this message are those of the individual sender and not necessarily endorsed by BDO Kendalls. You may not rely on this message as advice unless subsequently confirmed by fax or letter signed by a Partner or Director of BDO Kendalls. It is your responsibility to scan this communication and any files attached for computer viruses and other defects. BDO Kendalls does not accept liability for any loss or damage however caused which may result from this communication or any files attached. A full version of the BDO Kendalls disclaimer, and our Privacy statement, can be found on the BDO Kendalls website at http://www.bdo.com.au or by emailing [EMAIL PROTECTED] BDO Kendalls is a national association of separate partnerships and entities. ________________________________ From: [EMAIL PROTECTED] on behalf of Marian Ion Sent: Tue 11/12/2007 5:06 PM To: [email protected] Subject: RE: SSL - Man-in-the-Middle filtering Isn't this an interference in an encrypted communication, penalized by the law? And ... as a user, how can you trust the confidentiality this communication when you found out about? marian -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ravi Chunduru Sent: 08 December 2007 18:33 To: [email protected] Subject: SSL - Man-in-the-Middle filtering it seems that some network IPS devices and application firewalls are not only providing SSL based HTTP inspection on server side, but also on client side (i know of one IPS device which is in beta testing). i understand that it is required as attacks can be sent in SSL to avoid blocking. when deployed on client side, these devices resign certificates (of public servers) with local CA certificate. i see two aspects to it - users need to trust local authority (enterprise administrators) and second is users will have false sense of security (that is users are no longer see the actual CA of server certificate). any comments on acceptance of this functionality in enterprise deployments? is there any standard mechanism (in SSL standard or in HTTP standard) to send actual CA certificate to the browser by forward proxies? thanks Ravi ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=in tro_sfw to learn more. ------------------------------------------------------------------------ ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw to learn more. ------------------------------------------------------------------------ ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw to learn more. ------------------------------------------------------------------------
