logoalt Hacker News

vman81yesterday at 8:23 PM2 repliesview on HN

Well, I may want to have a say in what websites the employees at work access in their browsers. For example.


Replies

altairprimeyesterday at 8:31 PM

That’s not a meaningful issue here. Either snoop competently or snoop wire traffic, pick one.

In the snooping-mandatory scenario, either you have a mandatory outbound PAC with SSL-terminating proxy that either refuses CONNECT traffic or only allows that which it can root CA mitm, or you have a self-signed root CA mitm’ing all encrypted connections it recognizes. The former will continue functioning just fine with no issues at providing that; the latter will likely already be having issues with certificate-pinned apps and operating system components, not to mention likely being completely unaware of 80/udp, and should be scheduled for replacement by a solution that’s actually effective during your next capital budgeting interval.

kccqzyyesterday at 8:34 PM

That’s usually done not on the network side but through the device itself. Think MDM and endpoint management.

show 1 reply