• Pixel@lemmy.sdf.org
    link
    fedilink
    arrow-up
    2
    ·
    1 year ago

    Is that for the VPN, or actually all wifi connections? Not sure how it would be possible for wifi

    • Darkassassin07@lemmy.ca
      link
      fedilink
      English
      arrow-up
      6
      ·
      edit-2
      1 year ago

      Corporate networks (especially those utilizing MITM) block vpn access altogether.

      You can’t reach your vpn server, falling back to plain un-tunneled https. Then instead of dns retuning the true ip, it returns a local corporate ip; you connect to that with https and it serves you a cert generated on the fly for that particular domain signed by a root cert your browser already trusts. Your browser sees nothing wrong and transmits via that compromised connection.

      You can usually check for this by connecting via mobile data, taking a screenshot of the cert details, then doing the same on work wifi and compare.

      If the cert details change on wifi, your traffic is being intercepted, decrypted, read/logged, then re-encrypted and passed to the server you’re trying to reach.

      • Pixel@lemmy.sdf.org
        link
        fedilink
        arrow-up
        0
        ·
        1 year ago

        I was talking about work VPN, the thing I connect to every morning to access work’s internal services.

        I don’t see how a 3rd party device connecting to wifi can have https MITM. Otherwise many wifi out there would do it and steal your info.

          • Pixel@lemmy.sdf.org
            link
            fedilink
            arrow-up
            0
            ·
            1 year ago

            Can you link to something with more info on how it works? I know how certs work and CAs but not how some random wifi network can hijack that whole trust system. It sounds like it would defeat the whole purpose of https. Thanks in advance.