The ability to fully inspect network packets for cybersecurity and application assurance is vital for enterprises and service providers. Over recent years, traditional decryption methods have seen growing capability gaps and operational complexities. For technologies with DPI services, these issues reduce product capability, raise operating costs, slow sales velocity, and increase support requirements. The industry needs an answer. Nubeva SKI offers a new simple approach to enable solution providers and the enterprises they support.
Nubeva SKI is a powerful, new approach to decrypt modern TLS (SSL) traffic. With the advancements in today’s application, computing, and networking environments, SKI delivers a leap forward in capability and performance to quickly enable cybersecurity and application monitoring systems. SKI is employed both as an augmentation to legacy forward and reverse-proxy engines or as a fix to passive intercept systems due to pending obsolescence from Perfect Forward Secrecy.
Nubeva SKI Delivers:The Decryption of Any TLS for Passive and Inline systems
For Any Environment and Traffic Flow
Inbound, outbound, and east-west sessions
SKI provides the ability to GET SESSION KEYS from TLS clients and servers in real-time and to USE SESSION KEYS to decrypt TLS on authorized systems to enable deep packet inspection.
With session keys available, one can decrypt any session with simple and efficient bulk decryption. As such, SKI is universal to all traffic flows and use cases and applications: inbound, outbound, east-west, clients, servers, data center, cloud. Since TLS session keys are symmetric (shared by both endpoints), keys only need to be obtained from one side of a connection and therefore can apply to client connections to foreign servers and services.
The idea of getting and using keys is not a completely new concept. Keylogging, typically used by DevOps/SecOps and in some commercial systems has been widely used for a long time but is not a viable solution for scaled and secure mission-critical use. With SKI, Nubeva has taken the basic idea of keylogging and delivered an enterprise-grade, complete solution for modern TLS visibility.
Unlike legacy man-in-the-middle/forward proxy, session pre-termination/reverse proxy, and RSA Passive Intercept, SKI does not involve certificates or server keys, nor does it manipulate or change traffic, connections, authentication, or PKI. Instead, it simply works with the individual TLS session encryption keys (aka, ephemeral, symmetric, or bulk encryption keys) that are developed during the handshake, shared by the TLS client and servers, used for the bulk encryption/decryption of the communication, then discarded.
Nubeva’s patented SKI Sensors intercept keys directly from TLS processes in the memory of the server or client as they are created during the handshake’s key exchange in real-time. SKI Sensors employ highly efficient key signatures that “understand” how TLS code works in memory so that keys can be traced and extracted.
SKI Sensors are a small piece of software implemented on the server or the client. The software is available as c libraries to be embedded into applications and agents, or delivered as standalone agents or containers available for a broad and growing range of operating systems and platforms.
The use of session keys requires two functions, key handing, and decryption itself.
Once session keys are intercepted, SKI Sensors export the keys. Options for key handling include writing keys to file, piping to other local applications and processes, or securely forwarding them across networks to authorized receivers.
Once decryption is complete, keys are typically destroyed (e.g., inside 5 seconds) but can also be archived for forensics purposes.
Decrypt Using Keys: Using Session keys, high-throughput, low latency, and low-cost decryption can be easily achieved without modifications to authentication, handshakes, or production traffic and without any server keypairs or PKI. Decryption can far exceed the performance specs of exotic crypto cards and chips using commodity CPU instruction sets.
Simple Decrypt using keylog files on any enabled system.
Make minor modifications to an existing decrypt engine to receive keys.
Add SKI-based decryption support using Nubeva’s Decrypt C Library or turnkey Decrypt Container.
Once decryption is completed, keys can be destroyed (typically seconds after creation and use), and perfect forward secrecy is maintained. Optionally and with proper security considerations, keys can be archived for forensic purposes.