Stop Breaking TLS

Enterprise TLS interception experiences

  • Multiple anecdotes of corporate MITM: internal CAs pushed to endpoints, Zscaler/Netskope boxes in the path, and half‑baked deployments causing widespread TLS errors.
  • Developers report constant friction: broken tools (Git, Maven, npm, JVM websockets), weird cert chains, and obscure failures (e.g. non‑HTTP TLS killed by middleboxes).
  • Common outcome: people normalize curl -k / “verify=false”, adding insecure hacks to runbooks and code, undermining TLS as a whole.

Security benefits vs harms

  • Pro‑inspection side: claims real wins catching malware C2, credential phishing, data exfiltration, and users pasting sensitive data into SaaS/LLMs.
  • TLS inspection enables fine‑grained DLP rules (e.g. blocking uploads matching customer IDs or card numbers) and lets regulated orgs argue they “did everything they could”.
  • Critics argue there’s little published evidence on net effectiveness and that engineering time lost working around breakage is enormous.

Legal and privacy considerations

  • EU/GDPR angle: handling employee traffic that includes personal or health data can trigger strong privacy protections and data‑minimization duties, even on company devices.
  • Consensus: legality is about “spying on employees” end‑to‑end, not about TLS mechanics; antivirus‑style monitoring may be justifiable, bulk logging of private use likely not.
  • Some argue work networks need strict controls (e.g. to stop Netflix saturating small links or kids accessing inappropriate sites); others see this as overreach or solvable by simpler policies.

Operational and technical complexity

  • TLS interception centralizes risk: one internal CA becomes a single high‑value target that must be run like a real CA (HSMs, ceremonies, rotation).
  • Fragmented trust stores (OS vs browser vs language runtimes) make rollout brittle; Linux/Posix ecosystems highlighted as especially painful.
  • Security appliances themselves often have poor TLS implementations and CVEs, creating new vulnerabilities.

Cloudflare and broader trust model debates

  • Side debate: is using Cloudflare (or similar) for public sites morally equivalent to corporate MITM?
    • One side: it’s effectively a massive global middlebox for critical services, under US jurisdiction.
    • Other side: that’s a chosen reverse proxy for specific endpoints, not blanket interception of all internal traffic.

Alternatives and mitigations

  • Suggested alternatives: explicit HTTP proxies instead of transparent MITM, stronger endpoint security/EDR, DNS/IP blocking, bandwidth shaping, device policies, and better CT log use.
  • Several argue TLS inspection should be limited in scope, only used by mature, highly regulated orgs, and never implemented “half‑assed.”