-
Notifications
You must be signed in to change notification settings - Fork 515
Open
Description
I am not really sure if this can be a valid scenario for forward proxies with limited knowledge on them.
I have client C and server S and proxy A.
- Client C sends HTTP connect to proxy A and destination as S with Proxy Authorization header.
- Proxy A validates authorization header and creates TCP tunnel to server S and sends 200 to client C and this results in creation of HTTP tunnel (Not really a tunnel but a layer under 2 TCP tunnels with proxy in between acting as relay).
- Client now requests encryption of this HTTP tunnel (Not sure if there will be some other HTTP method call for this, but assuming that will be happen in subsequent calls from client C like Client Hello etc, Not really sure). Here ideally server S will provide its certificate to client for creating SSL layer.
- Once this is done then end to end communication is encrypted which will be make it impossible to read subsequent messages.
- I am just wondering if we could send proxy SSL certificate on SSL request by intercepting it, so that data can be intercepted, validated and then forwarded to server S with doing correct SSL encryption. Proxy certificate is trusted by client and I am guessing client will not check if domain matches, making the SSL successful.
I am thinking most of corporate proxies work this way, but not really sure if that is correct. It sounds like a man in the middle attack here but probably valid for some controlled environments!!
ssfang
Metadata
Metadata
Assignees
Labels
No labels