OPNsense
  • Home
  • Help
  • Search
  • Login
  • Register

  • OPNsense Forum »
  • English Forums »
  • Web Proxy Filtering and Caching (Moderator: fabian) »
  • Hardening the TLS interception config
« previous next »
  • Print
Pages: [1]

Author Topic: Hardening the TLS interception config  (Read 1671 times)

squiddylicious

  • Newbie
  • *
  • Posts: 1
  • Karma: 0
    • View Profile
Hardening the TLS interception config
« on: August 03, 2020, 03:56:34 pm »
Recently some researches tested several applicanes for TLS interception. Among them is also opnsense (they use "opensense"). It's a fairly lengthy, but interesting publication:
https://dl.acm.org/doi/10.1145/3372802
The Sorry State of TLS Security in Enterprise Interception Appliances

There were also some issues with opnsense. Maybe they are already fixed or the researches already have contacted the team?
If this is not the case, do you know any config options for squid to mitigate these issues?
Logged

  • Print
Pages: [1]
« previous next »
  • OPNsense Forum »
  • English Forums »
  • Web Proxy Filtering and Caching (Moderator: fabian) »
  • Hardening the TLS interception config
 

OPNsense is an OSS project © Deciso B.V. 2015 - 2024 All rights reserved
  • SMF 2.0.19 | SMF © 2021, Simple Machines
    Privacy Policy
    | XHTML | RSS | WAP2