tag:blogger.com,1999:blog-4088979.post4984753243071723276..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: NSM vs Encrypted Traffic, Plus VirtualizationRichard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-4088979.post-89133423328078879482008-06-04T13:44:00.000-04:002008-06-04T13:44:00.000-04:00Richard, how come you are not mentioning passive S...Richard, how come you are not mentioning passive SSL decryption as an option?Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-22070693459382619962008-05-29T10:29:00.000-04:002008-05-29T10:29:00.000-04:00So what do you say and do when your NSM Sensor/SSL...So what do you say and do when your NSM Sensor/SSL Load Balancer/SSL Proxy gets compromised, exposing your most sensitive data (by nature, because it is being encrypted)?<BR/><BR/>Am I supposed to rely on my IDS' and my own ability to detect 0day attacks against hardened hosts?<BR/><BR/>I'm playing devil's advocate here, but I think we can agree that there definitely needs more research and work done to address this problem.Marcinhttps://www.blogger.com/profile/02403324596880195518noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-48972289564421781852008-05-27T17:29:00.000-04:002008-05-27T17:29:00.000-04:00So can I infer that you would prefer to MITM encry...So can I infer that you would prefer to MITM encrypted channels where you can, so to inspect that traffic on the wire? :)Unknownhttps://www.blogger.com/profile/15357840241031190415noreply@blogger.com