07-08-2020 07:49 AM
Hi,
Are there any ways of having publicly trusted CA sub ordinate CA installed on Firepower so not all machines have to trust the certificate which is re signing the ssl decrypt?
Say if you get a certificate signed by godaddy, when you do ssl decrypt then your intermediate / your CA issued by go daddy is not trusted by end point unless you do so. This means you will get a error not being able to verify the CA identity .
For instance countries with censorship, how do they do this and no one notices?
Thanks
07-08-2020 07:53 AM
Hi,
SSL decryption is basically a Man In The Middle (MITM) attack, so unfortunately no public CA will give you a sub-ordinate certificate in order to spoof a website.
HTH
07-08-2020 01:52 PM
I think some CAs trusted by all browsers used to do this if net worth was more than 5 million dollors
I wonder how countries with extreme censorship do it
07-08-2020 10:25 PM
Some countries have been known to try to require all their citizens to install a country-issued certificate to allow for inspection of all outgoing traffic. That has met with backlash and international condemnation since the sovereignty issues is not clear cut.
Others just put massive middle box (firewalls, content inspection etc.) infrastructure to block anything they deem inappropriate or illegal. It often ends up blocking some legitimate uses inadvertently but they are willing to do so in the course of exercising their authority.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide