Comment on Could someone explain the networking behind transparent proxies and MiTM snooping using certificates to me?

<- View Parent
MigratingtoLemmy@lemmy.world ⁨1⁩ ⁨year⁩ ago

Basically, if I were to run a CA locally (on my network) and use that certificate in some OS, I should be able to set up a MiTM setup easily. Except that applications like web browsers don’t care and will utilise certificate pinning anyway, regardless of which certificates I keep in my certificate store in the OS.

Also, let’s say I’m running HAProxy/Caddy/NGINX at home which acts as my SSL-termination point for my network. In this case, if a service wants to access the internet, do these reverse proxies encrypt the outbound traffic with a different certificate?

source
Sort:hotnewtop