If one of the main advantages of a next-generation firewall is application and protocol identification and control, then SSL decryption is a basic requirement. We looked at the SSL decryption capabilities of the next-generation firewalls to see how well they would be able to discover applications, protocols, and URLs hidden within encrypted connections.
When SSL decryption is in place, the firewall performs a "sanctioned man-in-the-middle attack." This means that the firewall intercepts the SSL connection and performs a man-in-the-middle attack to decrypt the contents. Because the attack is done with the permission of the enterprise, it's called "sanctioned.''
This requires that the enterprise have a private certificate authority that is trusted by all users behind the firewall, and that the certificate authority can issue a "signing" certificate. The signing certificate is loaded into the next generation firewall, and for every SSL connection, the firewall generates a new certificate in real-time and uses it to secure the SSL connection between the end-user and the firewall, replacing the original certificate. The firewall then secures the connection using the original certificate. Because the firewall is stacking together two encrypted connections, it can see the traffic, unencrypted.
The only next-generation firewall we tested that did a good job of SSL decryption was SonicWall. With two check boxes, we were able to enable SSL decryption and then apply the next-generation firewall features to the traffic. Four more check boxes enable anti-virus, anti-spyware, intrusion prevention, and content filtering on the SSL traffic. The configuration, including loading our own certificate authority certificate, was simple and fast, and the decryption worked. Additional features we were looking for, such as the ability to exempt traffic from decryption by IP address, user group, or certificate common name (such as "www.bankofamerica.com" or "www.kaiserpermanente.org") were no problem.
We also tested that the SonicWall system could pass through certain errors to clients, such as a self-signed certificate (SonicOS figured that one out) or a certificate that was revoked by the issuer (not detected by SonicOS), and discovered that there is still some work to be done.
The story was not nearly as good with the other firewalls. Check Point's Security Gateway has a more elaborate and better thought-out configuration system with more bells and whistles. For example, with the Security Gateway you could exempt all domains in a certain category (such as financial services) from being inspected. The Security Gateway also passed all of our SSL validation checks, detecting revoked and self-signed certificates just fine. However, the Security Gateway can only inspect HTTP traffic on known SSL ports. This means that an application that runs over non-standard ports won't be inspected, and neither will any application that uses a different protocol — such as email, instant messaging, or file transfer.
Fortinet's FortiGate did a better job at covering more protocols, handling HTTP, SMTP, POP3, FTP, and IMAP running over SSL, but only on known ports. Fortinet's engineers told us that the SSL decryption is linked to their anti-virus transparent proxy system, which is what kept it from running across more ports. But what FortiGate made up for in coverage, it lost in configuration controls. There's no way to exempt traffic from decryption except by IP address, and the FortiGate let through both self-signed and revoked certificates, making two invalid web sites look as if they were well-secured, even when it was configured to block invalid SSL certificates.
We were also disappointed in the SSL decryption capabilities of the Barracuda NG Firewall. Unlike other next-generation firewalls, the NG Firewall requires you to explicitly configure HTTP clients (no other protocol is covered) to use the HTTPS proxy on the NG Firewall. This means that if the client can get through the firewall without using the proxy or send the traffic over any other port, it won't be able to apply next-generation controls or IPS signatures to the encrypted traffic, even if the traffic goes through the NG Firewall. Barracuda's engineers told us that this limitation will be lifted in Version 5.4.
Overall, the results were disappointing, since only one product, SonicWall SonicOS, supported what we considered basic functionality. This suggests that the products are still evolving rapidly to meet the requirements for this new product category and that the PR and marketing are moving a bit faster than the engineers.
Read more about wide area network in Network World's Wide Area Network section.
This story, "SonicWall stands tall in SSL decryption testing" was originally published by Network World.
If you enjoy a sharply-worded insult, read on. This slideshow’s for you.
Cool new features on the horizon include power-sipping chips and the Hello authentication technology.
In a few weeks, the long-awared Samsung Galaxy S6 will go on sale. Here are seven things you need to...
The fact that our eyes can't even tell what color that dress is? That's great for Oculus.
Carriers and consumers would get access to a fat frequency band used mostly by government today
Intel is in talks to acquire Altera, according to a report in The Wall Street Journal
The jury found against her on almost all counts, though one remains