Deep Security 10.3 has reached end of support. Use the version selector (above) to see more recent versions of the Help Center.
Inspect SSL or TLS traffic
For the intrusion prevention module, you can configure SSL inspection for a given credential-port pair on one or more interfaces of your protected computer.
Credentials can be imported in PKCS#12 or PEM format. The credential file must include the private key. Windows computers can use CryptoAPI directly.
For an overview of the intrusion prevention module, see Block exploit attempts using intrusion prevention.
In this topic:
- Configure SSL inspection
- Change port settings
- Work around Perfect Forward Secrecy
- Supported ciphers
- Supported protocols
Configure SSL inspection
- In Deep Security Manager, select the computer to configure and click Details to open the computer editor.
- In the left pane of the computer editor, click Intrusion Prevention > Advanced > View SSL Configurations, and click View SSL Configurations to open the SSL computer Configurations window.
- Click New to open the SSL Configuration wizard.
- Specify the interface to which to apply the configuration on this computer:
- To apply to all interfaces on this computer, select All Interface(s).
- To apply to specific interfaces, select Specific Interface(s).
- Select Port(s) or Ports List and select a list, then click Next.
- On the IP Selection screen, select All IPs or provide a Specific IP on which to perform SSL inspection, then click Next.
- On the Credentials screen, select how to provide the credentials:
- I will upload credentials now
- The credentials are on the computer
The credential file must include the private key. -
If you chose the option to upload credentials now, enter their type, location, and pass phrase (if required).
If the credentials are on the computer, provide Credential Details.
- If you are using PEM or PKCS#12 credential formats stored on the computer, identify the location of the credential file and the file's pass phrase (if required).
- If you are using Windows CryptoAPI credentials, choose the credentials from the list of credentials found on the computer.
- Provide a name and description for this configuration.
- Review the summary and close the SSL Configuration Wizard. Read the summary of the configuration operation and click Finish to close the wizard.
Change port settings
Change the port settings for the computer to ensure that the agent is performing the appropriate intrusion prevention filtering on the SSL-enabled ports. The changes you make are applied to a specific application type, such as Web Server Common, on the agent computer. The changes do not affect the application type on other computers.
- Go to Intrusion Prevention Rules in the computer's Details window to see the list of intrusion prevention rules being applied on this computer.
- Sort the rules by Application Type and locate the "Web Server Common" application type. (You can perform these changes to similar application types as well.)
- Right-click a rule in the application type and click Application Type Properties.
- Override the inherited "HTTP" Port List so that you include the port you defined during the SSL Configuration setup as well as port 80. Enter the ports as comma-separated values. For example, if you use port 9090 in the SSL configuration, enter 9090, 80.
- To improve performance, on the Configuration tab, deselect Inherited and Monitor responses from Web Server.
- Click OK to close the dialog.
Work around Perfect Forward Secrecy
Perfect Forward Secrecy (PFS) can be used to create a communication channel that cannot be decrypted if, at a later time, the server's private key is compromised. It relies on the Diffie-Hellman key exchange algorithm which uses ephemeral keys to establish a TLS session. You can identify a server that uses Diffie-Hellman Exchange if its cipher suite contains the string DHE (for example, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) or EDH in some OpenSSL configurations.
Since the intent of Perfect Forward Secrecy is to prevent decryption after the session is over, it also prevents SSL inspection through the Deep Security intrusion prevention module.
To work around this issue, we recommend you do the following:
- Use Perfect Forward Secrecy for TLS traffic between the Internet and your load balancer (or reverse proxy).
- Terminate the Perfect Forward Secrecy session at your load balancer (or reverse proxy).
- Use a non-PFS cipher suite (see Supported ciphers below) for traffic between the load balancer (or reverse proxy) and the web server or application server, so that the intrusion prevention module on the server can decrypt the TLS sessions and inspect them.
- Restrict traffic to the web server for application server ports that do not use Perfect Forward Secrecy.
Special considerations for Apache servers
On Apache web servers, Diffie-Hellman ciphers might be the default, so it is important to check the server's configuration file and disable it for TLS traffic between the web server and load balancer (or reverse proxy). To disable Diffie-Hellman on an Apache server:
- Open the server's configuration file. The file name and location of web server configuration files vary by operating system (OS) and distribution. For example, the path could be:
- Default installation on RHEL4:
/etc/httpd/conf.d/ssl.conf
- Apache 2.2.2 on Red Hat Linux:
/apache2/conf/extra/httpd-ssl.conf
- Default installation on RHEL4:
- In the configuration file, find the "
SSLCipherSuite
" variable. - Add
!DH:!EDH:!ADH:
to these fields, if this string does not already appear. (The "!
" tells Apache to "not" use this cipher.) - For example, you might edit the Apache configuration file's cipher suite to look like this:
SSLCipherSuite !DH:!EDH:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL
For more information, see the Apache Documentation for SSLCipherSuite : http://httpd.apache.org/docs/2.0/mod/mod_ssl.html#sslciphersuite.
Supported ciphers
Hex Value |
OpenSSL Name |
IANA Name |
NSS Name |
---|---|---|---|
0x00,0x04 |
RC4-MD5 |
TLS_RSA_WITH_RC4_128_MD5 |
SSL_RSA_WITH_RC4_128_MD5 |
0x00,0x05 |
RC4-SHA |
TLS_RSA_WITH_RC4_128_SHA |
SSL_RSA_WITH_RC4_128_SHA |
0x00,0x09 |
DES-CBC-SHA |
TLS_RSA_WITH_DES_CBC_SHA |
SSL_RSA_WITH_DES_CBC_SHA |
0x00,0x0A |
DES-CBC3-SHA |
TLS_RSA_WITH_3DES_EDE_CBC_SHA |
SSL_RSA_WITH_3DES_EDE_CBC_SHA |
0x00,0x2F |
AES128-SHA |
TLS_RSA_WITH_AES_128_CBC_SHA |
TLS_RSA_WITH_AES_128_CBC_SHA |
0x00,0x35 |
AES256-SHA |
TLS_RSA_WITH_AES_256_CBC_SHA |
TLS_RSA_WITH_AES_256_CBC_SHA |
0x00,0x3C |
AES128-SHA256 |
TLS_RSA_WITH_AES_128_CBC_SHA256 |
TLS_RSA_WITH_AES_128_CBC_SHA256 |
0x00,0x3D |
AES256-SHA256 |
TLS_RSA_WITH_AES_256_CBC_SHA256 |
TLS_RSA_WITH_AES_256_CBC_SHA256 |
0x00,0x41 |
CAMELLIA128-SHA |
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA |
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA |
0x00,0x84 |
CAMELLIA256-SHA |
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA |
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA |
0x00,0xBA |
CAMELLIA128-SHA256 |
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 |
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 |
0x00,0xC0 |
not implemented |
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 |
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 |
Supported protocols
The following protocols are supported:
- SSL 3.0
- TLS 1.0
- TLS 1.1
- TLS 1.2