logoalt Hacker News

iso1631last Wednesday at 12:19 PM3 repliesview on HN

So deploy end point security, which sits in the kernel and can thus access the unencrypted communication


Replies

sqbiclast Wednesday at 2:13 PM

While eps, edr, etc. solutions have their role in security and some of the products can be used for "TLS inspection" within the localhost already, doing the inspection in separate network appliance brings benefits such as (but not limited to) not needing to care if the client operating system is supported by the eps product or if the eps is functioning correctly, offloading the "heavy lifting" and policy enforcement to the appliances and ensuring that only actual real egress connections to specific services are inspected.

zbentleylast Wednesday at 2:03 PM

That’s vastly more failure prone (crowdstrike crashes workstations) and abuse prone (kernel code has the highest privilege level) than processing network traffic at the network/TLS level.

show 2 replies
treeskneeslast Wednesday at 1:10 PM

Aren’t most TLS implementations still using things like OpenSSL in userspace? How would the kernel get access to the request?

show 1 reply