E
E
Eva Ra2015-07-08 15:44:39
Cryptography
Eva Ra, 2015-07-08 15:44:39

Filtering HTTPS traffic without disclosing crypto keys - is it possible?

A notorious ddos ​​protection company offers a service such as filtering HTTPS traffic without revealing crypto keys. No details, it is only written that this is a "unique" technology. So, is this really some kind of their development or just a marketing ploy?

Answer the question

In order to leave comments, you need to log in

3 answer(s)
M
Max, 2015-07-08
@MaxDukov

marketing. realtime https does not break. Only a couple of weeks ago I was at the Tsiska conference - they clearly spoke it.

V
Vasily, 2015-07-08
@DobriyJuk

Is not a fact. Depends on what is meant.
For example, here is a recent article on Habré: habrahabr.ru/company/billing/blog/261301/?utm_camp...
Most likely, they interact at the Proxy level with your company and can initiate connections instead of you. You are already being passed the output of the request. This means that they will initially have the keys and they can open https.

P
Puma Thailand, 2015-07-08
@opium

Well, they can terminate HTTPS on themselves and then send you at least HTTPS, at least HTTP
, let’s say CloudFlare has it when they add your domain to their certificates

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question