TIP: Click on subject to list as thread! ANSI
echo: bbs_carnival
to: mark lewis
from: Sampsa Laine
date: 2011-03-06 20:32:00
subject: Re: Fidonet and today

-=> mark lewis wrote to Sampsa Laine <=-


 ml> leave out the word "attack" and you have it right... a
MitM Attack is
 ml> one where there is a MitM that is purposely looking at your traffic for
 ml> the purposes of hijacking data across the encrypted link... there is
 ml> quite a difference ;)

 ml> in fact, there are many ISPs who are doing the same thing (using a
 ml> MitM) specifically for the purposes of protecting their networks and
 ml> clients/customers :)

Really? I have heard people saying this MIGHT be theoretically possible,
but how exactly does this work? Got any examples of where this is deployed
or products they use? Do the ISPs have the ability to issue new SSL certs
by having their CA certificates installed in browsers or something? 

How would this work with SSH - my client would warn me that the host key
has changed so the MITM approach is not going to work - if I have ever
connected to my server before, the ISP's attempt will fail..

Sampsa



... MultiMail, the new multi-platform, multi-format offline reader!
--- MultiMail/Darwin v0.49
--- SBBSecho 2.11-Win32
* Origin: B4BBS = London = b4bbs.sampsa.com 2:250/7 (2:250/7)
SEEN-BY: 3/0 633/267 640/954 712/0 313 550 620 848
@PATH: 123/500 261/38 712/848 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.