My FOSS SSLproxy Needs HTTP/2 Support for Next-Gen Network Security (The "Invisible Threat" is Growing)
I'm the long-time maintainer of SSLproxy (and the co-maintainer of SSLsplit), a unique open-source transparent SSL/TLS proxy. Its core strength lies in its ability to decrypt and divert network traffic to other security tools (like E2guardian, Snort IPS, POP3 proxy, SMTP proxy, Virus and Spam scanners as in my UTMFW firewall) for deep SSL inspection. It's truly the only FOSS tool offering this transparent, real-time diversion capability to enable UTM services on encrypted streams. (For context: popular tools like mitmproxy, while powerful, expect you to write/use extensions for inspection rather than diverting traffic for existing services.)
The Problem: HTTP/2 is Hiding Threats in Plain Sight
In 2025, nearly a third of all websites have adopted HTTP/2. Here's the critical challenge for open-source cybersecurity: Current FOSS security tools, including SSLproxy and many downstream listening programs (like E2guardian, Squid, Snort), often cannot fully understand or process this HTTP/2 traffic in real-time. This is a significant gap, as commercial closed-source firewalls and libraries do offer real-time HTTP/2 SSL inspection capabilities. (For context: there are open/closed-source solutions for offline analysis.)
Currently, SSLproxy either prevents HTTP/2 upgrade or allows you to bypass HTTP/2 traffic using its powerful filtering features. However, neither offers the deep, real-time inspection needed for comprehensive security.
This creates a dangerous "translation gap" in the open-source ecosystem, where a growing portion of encrypted internet traffic is effectively invisible to real-time deep inspection, forcing reliance on proprietary solutions for full visibility.
Why This Matters for You:
- Deep Inspection is Blind: Without real-time HTTP/2 support, the vast majority of modern encrypted traffic bypasses essential content filtering, intrusion detection, and virus scanning that FOSS tools could otherwise provide.
- Essential for UTM: Projects like my UTMFW heavily rely on SSLproxy to feed decrypted traffic into their core services. Lacking HTTP/2 support in SSLproxy (and integrated UTM services) means a critical blind spot in next-gen firewall capabilities.
- Security Professionals Need It: If you're a cybersecurity professional relying on FOSS tools to inspect TCP, SSL/TLS, and HTTPS traffic for analysis, this directly impacts your ability to gain full visibility into modern network communications.
The Solution & The Challenge Ahead:
SSLproxy must evolve to natively speak HTTP/2 and transparently translate it back to HTTP/1 for seamless integration with existing downstream security tools. This is a substantial engineering effort, requiring the integration of complex libraries like nghttp2 and nghttpx, and a dedicated focus.
How You Can Help Fuel This Critical Work:
My FOSS projects are fueled by a deep commitment to open-source security, but developing and maintaining these complex, vital features demands significant time and resources. If you or your organization benefit from open-source network security tools like SSLproxy, your support is invaluable.
Sponsorship enables me to dedicate full-time effort to delivering crucial advancements like comprehensive HTTP/2 support, improved TLS compatibility, Windows support, and much more.
You can learn more about SSLproxy, UTMFW, and my other projects, including the full roadmap, here:
➡️ My New Website: https://sonertari.github.io
➡️ GitHub Project Boards (Full Roadmap): https://github.com/sonertari?tab=projects
#FOSS #Cybersecurity #NetworkSecurity #OpenSource #InfoSec #SSLproxy #UTMFW #HTTP2 #Firewall #IPS #Sponsorship #ComixWall