Hacker Timesnew | past | comments | ask | show | jobs | submitlogin

Lots of fun things can happen if you control peering points. Putting on my tin foil hat for a minute: trivially place yourself in the middle. The client connects to you, you impersonate Google by spoofing their IP (which you can do becase you control the peering point and routing tables), and using their certificate. Connect to Google simultaneously, spoofing the client's IP. Use EDH to establish independent sessions to both the client and Google, with your (now essentially useless) perfect forward secrecy, MITM away.

Edit: replying to the poster below, it doesn't have to be a passive attack, and I'm not sure what you mean about checksums. The scenario above would look exactly like normal Internet traffic. You're not mutating packets, you're sending entirely new ones.



In that case it's not a passive attack. If the NSA was routinely actively mutating nearly all SSL traffic to Google, I'd expect someone might have eventually noticed that the TCP segments are received with a different checksum than with they were sent.


An attack like that would also mess up the flow of the data.

Me in Europe ------200 ms------- MITM magic --1 ms-- Google

For the attacker not to introduce huge extra latency, it would need to complete the handshake with Google almost instantly. Someone would eventually notice instantaneous TLS handshakes.

Also 2 separate TLS connections would contribute to bufferbloat pretty badly, and someone would also eventually investigate that.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: