| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Fidonet and today |
-=> mark lewis wrote to Sampsa Laine <=- ml> leave out the word "attack" and you have it right... a MitM Attack is ml> one where there is a MitM that is purposely looking at your traffic for ml> the purposes of hijacking data across the encrypted link... there is ml> quite a difference ;) ml> in fact, there are many ISPs who are doing the same thing (using a ml> MitM) specifically for the purposes of protecting their networks and ml> clients/customers :) Really? I have heard people saying this MIGHT be theoretically possible, but how exactly does this work? Got any examples of where this is deployed or products they use? Do the ISPs have the ability to issue new SSL certs by having their CA certificates installed in browsers or something? How would this work with SSH - my client would warn me that the host key has changed so the MITM approach is not going to work - if I have ever connected to my server before, the ISP's attempt will fail.. Sampsa ... MultiMail, the new multi-platform, multi-format offline reader! --- MultiMail/Darwin v0.49 --- SBBSecho 2.11-Win32* Origin: B4BBS = London = b4bbs.sampsa.com 2:250/7 (2:250/7) SEEN-BY: 3/0 633/267 640/954 712/0 313 550 620 848 @PATH: 123/500 261/38 712/848 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.