logoalt Hacker News

cyberaxtoday at 12:04 AM2 repliesview on HN

The vast majority of Let's Encrypt installations don't use CAA records or anything in DNS. Or they host the DNS along with the HTTPS servers.

So if the router between the web server and the Internet is compromised, it can just get trusted certs for all the HTTPS traffic going through it, enabling transparent MITM to inject its payload.


Replies

gzreadtoday at 1:11 AM

This happened: https://notes.valdikss.org.ru/jabber.ru-mitm/

show 1 reply
tptacektoday at 12:21 AM

"The web server"? Which web server? Are the HTTP flows with executable content going to the web server or coming from it? I'm sorry, you haven't really cleared this up.

show 1 reply