Proxies in the Data Center

There are a number of reasons that inline proxies are not a scalable solution 
for monitoring communications in enterprise environments.

--  cost
--  production risk
--  latency

Here are some specific examples of where the use of proxies for monitoring 
communications is not viable:


Network Security Monitoring

Network security monitoring is not just monitoring traffic that results from 
communications with customers and partners.  All it takes is for one user to 
click on a phishing email and there is malware inside the enterprise.  Once 
this happens, TLS becomes the enemy, because 30% of malware is TLS encrypted, 
and any TLS features intended to thwart payload inspection work against the 
enterprise.

Malware does not always phone home out to the Internet on day 1 of infection.  
Sometimes it does reconnaissance and lateral movement for a long time.  The 
longer this goes on undetected, the worse the situation becomes for the 
enterprise.

Microsegmentation is an attempt to contain this movement, but if the malware is 
TLS encrypted it will go right through the firewalls.  The answer to this 
problem is ubiquitous plain-text traffic inspection.  The scale at which this 
is needed can't be accomplished by inline solutions (proxies).  Traffic 
inspection is needed at the Internet, the Extranet, the mainframe, the WAN, DNS 
servers, email servers, wireless controllers, and a host of other locations.  
Traffic inspection is also needed in the virtual environment, where all the 
virtual tools necessary don't exist yet.  My Seoul presentation documented 150 
physical tap points feeding network security monitoring devices - and this 
footprint is growing.  There are too many inspection points to replace with 
inline solutions.  You simply cannot place a proxy between every system in the 
enterprise.

One other crucial point to this discussion is that endpoint monitoring doesn't 
catch everything.  The strategy of "Defense in Depth" says that the more layers 
of security infrastructure you have, the better your chances of blocking or 
identifying malware.  Network security monitoring is catching lots of malware 
missed by endpoint inspection.


Threat Detection and Incident Analysis

Threat detection inside the enterprise is not just receiving IDS or endpoint 
monitoring alerts.  Threat detection analysts need to track down the source of 
the infection, which could be anywhere within the enterprise, and the primary 
tool for doing this is packet capture with a decrypted payload.  Because the 
source of the infection could be anywhere, we need ubiquitous packet capture 
and ubiquitous decryption capability.  Again, inline solutions don't scale to 
the number of monitoring points needed for this level of visibility.

No only does an out-of-band solution like static DH allow many more permanent 
monitoring points with simple network taps, it also allows enterprises to deal 
with gaps in visibility.  If a needed flow is missing, we can set up span or 
mirror sessions, capture the packets, and decrypt them after the fact.  This 
can't be done when relying only on inline proxies.  Adding a new inline proxy 
is a multi-month or more project.  In the midst of an active 
attack/infiltration every minute is crucial and network re-architecture is not 
an option.


Troubleshooting

Enterprises provide services through complex, multi-layer applications and 
backend infrastructure.  Inevitably, there are bugs in these applications and 
the source of the problem must be found through troubleshooting.  Network 
troubleshooters need to inspect the packet payload in order to find 
transactions on the wire in environments where there is extensive NAT and 
extensive encryption.  Both of these are very common in enterprise networks, 
and encryption inside the data center is becoming  more ubiquitous over time.  
NAT, by the way, is being used in large part not for IP address exhaustion, but 
to allow for multiple redundant paths.

Complex applications can have hundreds of application and infrastructure nodes 
as well as many tiers, any of which could be the cause of a slowdown or 
failure.  Often there are no log messages on any device giving a clue as to the 
source of a problem.  Troubleshooters need to be able to take a packet trace at 
any layer of the infrastructure and decrypt the trace in order to find the 
transaction of interest.  This tracing could be between physical devices, like 
between a firewall and load balancer, or it could be between VMs.  Tracing in 
the virtual space could involve tracing between VMs on different blades of the 
same blade chassis or between VMs on the same ESX host.  Since the root cause 
of a problem can be anywhere in an enterprise, this translates into thousands 
of locations in a large enterprise where troubleshooters may need to take a 
trace, decrypt it, and locate a transaction.



Inline proxy solutions add cost, production risk, and latency at every layer in 
which they are implemented.  It doesn't take very many inline locations before 
the cost is in the millions of dollars.  Because the solution is inline, lots 
of redundancy has to be built in, including multiple columns (doubling the 
cost), bypass taps for failure scenarios, and extensive procedures for 
troubleshooting and failover.  Bypass taps and TLS decryption appliances can 
and do fail, and when they are inline a production outage is caused, usually in 
a critical part of the network and affecting multiple critical applications.  
Proxy solutions also add 1-3 ms of latency to every packet.  This is not a big 
problem at one layer, but when many tiers are implemented with inlien proxy 
solutions the latency adds up.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to