Hi there's one thing left to say: If you open SSL on your Firewall, the data stream goes, without virus-scanning at the perimeter, directly to your client. For normal http-traffic you should have virus and active content filterering on a gateway at your perimeter. This line of defence does not count for you by using ssl.
The risk is: A Website gets infected by a worm (like nimda, and there will be other worms in the future), gets its whole html-files infected, and now you let them through via ssl to your client. If you have no up to date virus detection at every Worksation Boom This is my opinion, why you can't treat ssl as http Best regards Holger Reichert www.holysword.de -----Ursprüngliche Nachricht----- Von: Kutulu [mailto:[EMAIL PROTECTED]] Gesendet: Montag, 1. Oktober 2001 18:59 An: Walker Andrew Cc: '[EMAIL PROTECTED]' Betreff: Re: SSL connections through firewall At 11:52 AM 09/28/2001 +0200, Walker Andrew wrote: >I read up about SSL as a protocol and about public key encryption, but I'm >still undecided. I have no help from the firms Internet policy to guide me >so I'm looking for advise regarding how one would go about allowing it by a >rule on FW1, if there are any security risks to be aware of, and also if >anyone has any guidelines or experience of internet policies that deal with >this kind of Internet usage from within the firm. From a technological standpoint, all you need to do to permit this is open the https port, which I believe is 443, for outgoing connections. As for security risks, there aren't any specific to SSL web traffic, that I know of. On the individual level (the user), there is a big difference in security between http and https, but from an overall corporate network perspective, it's basically all just web traffic. There's always the risk of the user downloading some sort of trojan or virus or whatnot, but this risk is no larger than with standard web traffic. In fact, it is probably smaller given the cost and effort required to set up an SSL web server properly (e.g., purchase valid keys and certificates, install and perhaps licence the SSL software, etc). The major decision here, not surprisingly, is one of corporate policy, not technical policy. SSL traffic, on the whole, is more likely to be 'legitimate' use than non-SSL traffic. That is, you will find most SSL traffic being used for internet banking, online shopping, etc. (Of course, you also find it on most adult sites). So the decision comes down to wether or not you want your employees using the web for personal reasons during the day. If you already have an established web-use policy, then it should apply as-is to secure web-use. If you don't have an established web-use policy, then you probably will need input from several higher-ups to create one. Smaller companies I have worked for had basically no usage policy apart from "don't do anything illegal on our equipment." I know of other companies that completely block all traffic except for web traffic, which is all shunted through restrictive and logging proxy servers. Most companies are probably somewhere in between. My own personal opinion is that it's much better to enforce web policy on a management level than a technical level. That is, not to have the firewall and proxy servers enforcing a 'no use' rule, but rather, simply have an established internet usage policy that is enforced by management on a case by case basis. This works out well for my current company, though YMMV. I feel this approach is more flexible, as it allows those who have a (somewhat) legitimate need to access the internet (our developers for support, out MIS department for patches and updates, our accountants for financial news, the CEO for whatever he wants, etc), to do so without intervention from the network administrators.. It's also easier to get an exception from your immediate supervisor than to implement a change to the firewall ruleset. --K