lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <50F86595.20607@luigirosa.com> Date: Thu, 17 Jan 2013 21:56:53 +0100 From: Luigi Rosa <lists@...girosa.com> To: full-disclosure@...ts.grok.org.uk Subject: How to prevent HTTPS MitM -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 If this message is offtopic, please excuse me. I was reading about Nokia HTTPS MitM. Many corporate firewall can MitM HTTPS for content inspection and many governments do this for their reasons. I was thinking: could it be possible to create a fake HTTPS stream to DoS the MitM attempt? Ciao, luigi - -- / +--[Luigi Rosa]-- \ Genetics explains why you look like your father, and if you don't, why you should. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with undefined - http://www.enigmail.net/ iEYEARECAAYFAlD4ZZEACgkQ3kWu7Tfl6ZQy7QCgxrctsaiadgM4oxTEDVWViuE/ EEIAoKIm/uEj7HD56++cWg4L+m8RaIoP =9xLU -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists