Introduction
In general, TLS cannot be compatible with middleboxes,
since the TLS protocol prohibits man-in-the-middle attacks
TLS with Middleboxes
An image will be inserted
▸ Middleboxes are widely used
Middleboxes such as anti-virus software and a firewall are widely used to enhance security and performance in networking.
▸ TLS does not allow a man-in-the-middle
TLS is an end-to-end security protocol; thus, TLS does not permit middleboxes to be involved in the session.
▸ Middleboxes cannot be used with TLS
Middleboxes that should read application data become dumb with TLS.
SplitTLS is risky
▸ Middleboxes perform man-in-the-middle attacks
To utilize functionalities of middleboxes, the current approach splits the TLS session by using private key sharing or custom root certificates
▸ One approach: Private key sharing
A middlebox such as web application firewalls previously gets the private key and the corresponding certificate from the server and impersonates the servers, when the client initiates a TLS handshake with the middlebox.
▸ The other approach: Custom root certificate
A middlebox such as anti-virus software initially installs the custom root certificate into the client's trusted store and forges the certificate, when the client initiates a TLS handshake with the middlebox
An image will be inserted