Many appliactions terminate Secure Socket Layer (SSL) and Transport Layer Security (TLS) at the network edge
with a load-balancer or web application firewall. If your application uses end-to-end encryption, then we need a copy of the SSL keys and certifications to decrypt traffic on your Network-based Intrusion Detection (NIDS) appliances. In cases where end-to-end encryption is in use and decryption is not working, our Security Operations Center (SOC) will not be able to detect network threats embedded in the SSL and TLS traffic. To enable decryption the following information is required:
- Provide our Rackspace PDR teams the SSL and TLS private keys and public certifications (used by the NIDS appliances for decrypting traffic).
- Disable Diffie-Hellman (DH) key exchange on all applications with end-to-end encryption.
- Configure the SSL and TLS cypher suits with those compatable with the NIDS decryption (see the "Supported cyphers" section).
- Provide our Rackspace PDR teams a list of domains and fully qualified domain names (FQDNs) for endpoints with end-to-end encryption.
Because the Alert Logic® Threat Managers™ that we use to provide our NIDS solution do not support Diffie-Hellman for decryption, you must disable DH for your applications. For more information, see Alert Logic and Diffie-Hellman.
The following cyphers are supported with NIDS decryption:
For more information, see Alert Logic Supported Cyphers.
Updated 4 months ago