What law?
 
Enterprise deployments own the data. This is not allowed in a US Federal 
University environment due to specific requirements against monitoring, but 
WHAT law?
 
Regards,
Dr Craig Wright (GSE-Compliance)



Craig Wright
Manager of Information Systems

Direct : +61 2 9286 5497
[EMAIL PROTECTED]
+61 417 683 914

BDO Kendalls (NSW)
Level 19, 2 Market Street Sydney NSW 2000
GPO BOX 2551 Sydney NSW 2001
Fax +61 2 9993 9497
www.bdo.com.au

Liability limited by a scheme approved under Professional Standards Legislation 
in respect of matters arising within those States and Territories of Australia 
where such legislation exists.

The information in this email and any attachments is confidential.  If you are 
not the named addressee you must not read, print, copy, distribute, or use in 
any way this transmission or any information it contains.  If you have received 
this message in error, please notify the sender by return email, destroy all 
copies and delete it from your system. 

Any views expressed in this message are those of the individual sender and not 
necessarily endorsed by BDO Kendalls.  You may not rely on this message as 
advice unless subsequently confirmed by fax or letter signed by a Partner or 
Director of BDO Kendalls.  It is your responsibility to scan this communication 
and any files attached for computer viruses and other defects.  BDO Kendalls 
does not accept liability for any loss or damage however caused which may 
result from this communication or any files attached.  A full version of the 
BDO Kendalls disclaimer, and our Privacy statement, can be found on the BDO 
Kendalls website at http://www.bdo.com.au or by emailing [EMAIL PROTECTED]

BDO Kendalls is a national association of separate partnerships and entities.

________________________________


From: [EMAIL PROTECTED] on behalf of Marian Ion
Sent: Tue 11/12/2007 5:06 PM
To: [email protected]
Subject: RE: SSL - Man-in-the-Middle filtering




Isn't this an interference in an encrypted communication, penalized by the
law? And ... as a user, how can you trust the confidentiality this
communication when you found out about?

marian



-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Ravi Chunduru
Sent: 08 December 2007 18:33
To: [email protected]
Subject: SSL - Man-in-the-Middle filtering

it seems that some network IPS devices and application firewalls are
not only providing SSL based HTTP inspection on server side, but also
on client side (i know  of one IPS device which is in beta testing).
i understand that it is required as attacks can be sent in SSL to
avoid blocking.

when deployed on client side, these devices resign certificates (of
public servers) with local CA certificate. i see two aspects to it -
users need to trust local authority (enterprise administrators) and
second is users will have  false sense of security (that is users are
no longer see the actual CA of server certificate).

any comments on acceptance of this functionality in enterprise deployments?

is there any standard mechanism (in SSL standard or in HTTP standard)
to send actual CA certificate to the browser by forward proxies?

thanks
Ravi

------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it
with real-world attacks from CORE IMPACT.
Go to
http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=in
tro_sfw
to learn more.
------------------------------------------------------------------------



------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it
with real-world attacks from CORE IMPACT.
Go to 
http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw
to learn more.
------------------------------------------------------------------------

------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it
with real-world attacks from CORE IMPACT.
Go to 
http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw
to learn more.
------------------------------------------------------------------------

Reply via email to