Skip to content

Return proxy certificate instead of destination server certificate #329

@nithinbandaru1

Description

@nithinbandaru1

I am not really sure if this can be a valid scenario for forward proxies with limited knowledge on them.

I have client C and server S and proxy A.

  • Client C sends HTTP connect to proxy A and destination as S with Proxy Authorization header.
  • Proxy A validates authorization header and creates TCP tunnel to server S and sends 200 to client C and this results in creation of HTTP tunnel (Not really a tunnel but a layer under 2 TCP tunnels with proxy in between acting as relay).
  • Client now requests encryption of this HTTP tunnel (Not sure if there will be some other HTTP method call for this, but assuming that will be happen in subsequent calls from client C like Client Hello etc, Not really sure). Here ideally server S will provide its certificate to client for creating SSL layer.
  • Once this is done then end to end communication is encrypted which will be make it impossible to read subsequent messages.
  • I am just wondering if we could send proxy SSL certificate on SSL request by intercepting it, so that data can be intercepted, validated and then forwarded to server S with doing correct SSL encryption. Proxy certificate is trusted by client and I am guessing client will not check if domain matches, making the SSL successful.

I am thinking most of corporate proxies work this way, but not really sure if that is correct. It sounds like a man in the middle attack here but probably valid for some controlled environments!!

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions