Comment on Could someone explain the networking behind transparent proxies and MiTM snooping using certificates to me?

<- View Parent
ShellMonkey@lemmy.socdojo.com ⁨11⁩ ⁨months⁩ ago

A decrypting proxy acts like a local certificate authority and issues a certificate on behalf of the site to create one encrypted connection between the client and proxy while creating a second on with the original site on the other side.

The client will get an error (or depending on the site and browser may refuse to connect at all in the case of pinned and pteloaded certificates) indicating that they’re connecting to a site with a certificate from an untrusted issued unless they’ve been configured to trust the CA held on the proxy.

The ‘break’ between the client side connection and the server side connection will be in plaintext and can be examined through internal tools or sent to external ones typically through ICAP.

source
Sort:hotnewtop