[HamWAN PSDR] Idea for addressing HTTPS on HamWAN

Nick Kartsioukas nick at explodinglemur.org
Fri Aug 16 16:56:20 PDT 2019


HSTS will probably be an issue but I don't think it's widely implemented (yet).

On Fri, Aug 16, 2019, at 12:56, John C. Miller wrote:
> All, 
> 
> Apologies for the lengthy post.
> 
> I've been mulling over potential solutions for the HTTPS over HamWAN 
> dilemmna: 
> Practically universal use of HTTPS web sites + Part 97 makes accessing 
> nearly all web content over HamWAN illegal, and severely limits the 
> utility of HamWAN.
> 
> I'm aware of discussions about HamWAN ceasing to be completely P97. But 
> for as long as HamWAN is even partially subject to P97, I think it's 
> worth looking for solutions or at least work-arounds to P97 
> limitations. Thus the subject of this post. (I also very much hope that 
> sectors are not abandoned in favor of PtP links only!)
> 
> From wearing a network security (white) hat I've used certain tools and 
> techniques for network penetration testing that may be helpful to us in 
> this case. I've just begun testing a methodology for a specialized type 
> of transparent proxy server that should enable some or much of the 
> encrypted content on the web (i.e. https:// sites) to be legally 
> accessed over HamWAN with http. The goal is for this to be essentially 
> transparent to the user, or nearly so.
> 
> The short version is that we would deploy a specialized type of 
> transparent web proxy server that splits off the SSL layer from web 
> requests and allows the transaction to flow non-encrypted over HamWAN 
> using http protocol (non-encrypted) which would be Part 97 compliant. 
> This same server would also circumvent a number of tactics in wide use 
> today that attempt to force web sessions to always use encryption 
> (https). Implementing such an approach is non-trivial, but I think 
> there is a reasonable chance that it can be done. There will almost 
> surely be some web sites that won't work well with this strategy, but 
> those will hopefully be relatively few.
> 
> A key piece of this strategy uses a network penetration testing tool 
> created in 2009, aptly called SSL-Split. This program was initially a 
> fairly simple but powerful tool that intercepted secure web sessions 
> (https:) by executing what's known as a man-in-the-middle attack. Using 
> an attack vector, a server running SSL-Split would insert itself 
> between the person's web browser, and the web server they were 
> accessing. The attacking SSL-Split server would then strip off the SSL 
> layer, making the payload of "secret" data no longer secret. At this 
> point the web session would continue un-encrypteed, and user data could 
> simply be captured, or manipulated. SSL-Split could then re-assemble 
> the SSL layer back onto the data stream on its way to the server. 
> Neither the web user, nor the web site being visited need be aware of 
> the chicanery going on.
> 
> I say that SSL-Split *was* initially fairly simple, because in the 10 
> years since its creation a variety varied steps have been taken by 
> browser developers and web engineers to force encryption to be used for 
> all web traffic. But the developers of SSL-Split have evolved the 
> program considerably and have kept pace to a large extent with current 
> technology. The latest version of SSL-Split is much more powerful than 
> early versions, with the capability of (among other things) essentially 
> creating x.509 security certificates on the fly when needed, refusing 
> certificate revocation status requests, bypassing HSTS, and other 
> tactics that can neutralize the "forced https/encrypted" policies in 
> wide use. 
> 
> The power of SSL-Split to convert web data streams from http to https 
> and back is a central piece of the strategy that I'm examining. In the 
> use case for HamWAN, we are using tools like SSL-Split not as an attack 
> weapon, but rather as a data conversion utility. We insert our 
> "conversion server" running SSL-Split and other tools into the 
> appropriate place on the network, and let it do data stream conversion 
> for us.
> 
> I've glossed over some of the arcane details of this approach, but this 
> is the basic gist of it. I'm testing on a private network at home, and 
> packet sniffing the network to confirm that the data stream is indeed 
> un-encrypted where it needs to be.
> 
> I'll keep the list apprised of progress.
> 
> John Miller, KX7JM
> kx7jm at jmit.com
> (530)873-9005
> 
> 
> 
> _______________________________________________
> PSDR mailing list
> PSDR at hamwan.org
> http://mail.hamwan.net/mailman/listinfo/psdr
>


More information about the PSDR mailing list