Disclaimer: This information is provided as-is for the benefit of the Community. Please contact Sophos Professional Services if you require assistance with your specific environment.
Table of Contents
Overview
This recommended Read describes the TLS/SSL inspection for Smart Devices.
What is TLS/SSL Inspection?
SSL inspection intercepts and reviews SSL-encrypted internet communication between clients and servers.
SSL/TLS inspection rules: https://docs.sophos.com/nsg/sophos-firewall/20.0/help/en-us/webhelp/onlinehelp/AdministratorHelp/RulesAndPolicies/SSL/TLSInspectionRules/index.html
How it works
When the connection is made over HTTPS, SSL/TLS inspection intercepts all traffic and decrypts. After decrypting secure web content, Sophos Firewall encrypts the content again using certificates signed by the CA.
HTTPS decrypt and scan FAQ: https://support.sophos.com/support/s/article/KB-000038420?language=en_US
Configuration
Configure SSL/TLS inspection and decryption: https://docs.sophos.com/nsg/sophos-firewall/20.0/help/en-us/webhelp/onlinehelp/AdministratorHelp/Web/HowToArticles/WebProxyDPITLSDecryption/index.html#add-a-web-policy
Applying SSL/TLS Inspection on Mobile Devices
So, the question is, does it work for mobile devices? It can work. However, there are more cons than pros to using it.
Smartphones don’t work well with decryption for several reasons. Even if you install a Proxy CA on the phones, many systems and 3rd party applications won’t trust certificates in the user store. They’ll cause more applications to not function properly.
Also, you can’t add CAs on the system Store (Google Store/Apple Store) as TLS/SSL using CA.
You may install a custom Certificate for Applications such as Firefox and Chrome, but many applications won’t allow it nor have any option.
It’ll work if you set the “TLS profile decryption to be disabled”. However, this can only scan SNI.
Server Name Indication (SNI): https://knowledge.digicert.com/quovadis/ssl-certificates/ssl-general-topics/what-is-sni-server-name-indication.html
Upon setting the TLS profile to “do not decrypt”, this won’t turn on the “scan for malware “but can still allow or deny categories of Websites. To scan all traffic with decryption, you must manually apply exceptions for all the applications.
Certificate Pinning
This is also one reason why SSL/TLS inspection won’t work well with mobile devices. Some websites and applications are using this approach to prevent Man-in-the-middle Attacks. A Website or an application doesn’t trust the TLS decrypting and scanning the certificate, which, in this case, is presented by the Firewall. Because of this, SSL/TLS inspection won’t work properly, resulting in a broken connection, garbled website output, inconsistent application behavior, and so on.
What is Certificate Pinning:
Certificate Pinning in Android:
https://approov.io/blog/securing-https-with-certificate-pinning-on-android
Web Proxy
When using DPI Engine, you will need to manually maintain a local SSL/TLS list. The SSL/TLS exception list will be overwritten upon update. To bypass this, you may use the Custom URL group in the SSL/TLS inspection rule so it won’t be overwritten.
One workaround is to use “Web proxy“
Use “Transparent with direct mode (hybrid).”
Then confirm that under the FW rules for LAN to WAN, you’ve turned on the option "Use web proxy instead of DPI engine" then > under the Security Features. Ensure a web policy is applied before enabling the option. Also, ensure the following option is also turned on: "Scan HTTP and decrypted HTTPS."
https://support.sophos.com/support/s/article/KB-000036493?language=en_US#Direct
Then Install Firewall CA:
https://support.sophos.com/support/s/article/KB-000035645?language=en_US
Installing the Firewall Certificate into Mobile Devices using Sophos Mobile (Optional)
Using Sophos Mobile, our MDM solution, you can install certificates and CAs on groups of Android and iOS mobile devices instead of manually installing them on individual devices.
Application Control
Another simple solution to work on websites and mobile applications is configuring Application Control policies. https://docs.sophos.com/nsg/sophos-firewall/20.0/help/en-us/webhelp/onlinehelp/AdministratorHelp/Applications/HowToArticles/BlockApplicationsUsingApplicationFilter/index.html
If your use case is to control unwanted traffic from mobile devices and guest/mobile networks, you can configure app control, as this feature can do its job of allowing and denying specified applications from the network without the need to decrypt the traffic and have the firewall's certificate installed on the mobile devices. Again, please note that this activity does not perform “Decryption,” so it can’t scan for viruses; it’s only an option to work on controlling unwanted and usable applications allowed on the network.
Updated links 19.5->V20 latest. Grammar
[edited by: Raphael Alganes at 10:17 AM (GMT -7) on 10 Oct 2024]