Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If someone has a trusted CA and has access to switches/packets, can't they do a MITM? I thought that's possible.


There are proxies that can dynamically generate certs based on requested domains so the only mitigating controls would be to either cache fingerprints of certs and alert someone if they are different than what other probe nodes are seeing from the rest of the internet or to pin certificates and hardly anyone does this any more. This is currently a manual process so most people would have no idea until it is too late. These would just be missing entries in the crt.sh logs.


Yes, one would need access to both for that to be possible. A trusted CA alone (the topic of your question) is not enough.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: