<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
BLOG

Part 1 – Passive Inspection of TLS 1.3 Within The Enterprise

June 26, 2025

Part 1 – Passive Inspection of TLS 1.3 Within The Enterprise

This blog is the first in a series that looks at a NIST project “Addressing Visibility Challenges with TLS 1.3 within the Enterprise.” The home page for the project is here: https://www.nccoe.nist.gov/addressing-visibility-challenges-tls-13. The NIST site includes details of the project and organizations involved in the project as well as drafts of the project documents which will be updated as the project progresses.

Mira Security has been a participant in the project since its inception and the latest Encrypted Traffic Orchestrator (ETO) software includes support for the capabilities being developed and tested by the project.

So, what are the challenges raised by the use of TLS 1.3 with regard to visibility into TLS traffic within the enterprise? The primary issue is that TLS 1.3 enforces the use of ephemeral Diffie-Hellman key exchange in order to guarantee “Perfect Forward Secrecy” (PFS) to every TLS 1.3 session. This change prevents passive decryption of the session by a device receiving a copy of the packets and holding a copy of the TLS server’s certificate and private key.  Passive TLS decryption is widely used within Enterprise data centers allowing security and troubleshooting tools to be used. While it is still possible for a network device to provide visibility into TLS 1.3 this has to be done by an in-line device performing a “break and inspect” (B&I) function. Within an enterprise data center visibility may be required at many points in the network which is not an issue if passive visibility can be used but is a major issue if an in-line device is required at every point as failure of any of the in-line devices will cause the TLS session to fail.

The Mira ETO software supports passive decryption of TLS traffic prior to TLS 1.3. So, for example a TLS 1.2 session that uses RSA key exchange mechanisms can be passively decrypted by ETO as long as it has a copy of the destination TLS server’s certificate and key. ETO can also decrypt all versions of TLS (including TLS 1.3) traffic when operating as an in-line (B&I) device. In B&I mode ETO can decrypt either by using a copy of the server certificate and key or by re-signing the server certificate using a trusted certificate authority (CA) before it is sent on to the client.

Inline Bypass

It is worth pointing out that any mechanism to gain visibility into a TLS flow requires some control over either the client or server involved in the connection. Without control over one or other end of the connection a passive or B&I device will be unable to decrypt a TLS session. TLS is a very robust and secure protocol and prevents a third party network device from intercepting and decrypting the traffic unless it has control over one or other end of the connection. The most frequent forms of control are:

  • Possessing a copy of the TLS servers certificate and private key
  • Being a trusted CA allowing server certificates re-signed by the device to be trusted by the TLS client

Certificate re-signing can only be used by an in-line device as it involves changing the server certificate sent by the TLS server before it reaches the TLS client. This rules out the use of certificate re-signing as a way to address the TLS 1.3 visibility issue being considered in the NIST project.

The following diagrams show the mechanisms used to gain visibility into TLS  traffic prior to the work being done in the NIST project and make clear that passive decryption is not possible with TLS 1.3 or when certificate re-signing is being used.

active-decrypt-known-server-key-arch

Active decrypt with known server key and also using certificate re-sign

There are two new mechanisms being investigated in the NIST project, both of which require control over the TLS server. In the enterprise data center the visibility requirement is primarily for traffic terminating on TLS servers owned by the enterprise so control over the TLS server is easily achieved. One mechanism involves the use of static Diffie-Hellman keys by the server which are changed at frequent intervals. The second mechanism involves the use of an agent on the server which can capture the ephemeral key generated as the result of a TLS handshake and then export this for use by passive decryption devices.

New call-to-action

See Everything. Secure Everything.

Contact us now to secure and optimized your network operations

Heartbeats Packets Inside the Bypass TAP

If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.

If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.

While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.

Some of you may have noticed a flaw in the logic behind this solution!  You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.

Glossary

  1. Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.

  2. Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.

  3. Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.

NETWORK MANAGEMENT | THE 101 SERIES