[tor-talk] SSL Visibility Appliance

Akademika Aka akademiker1 at googlemail.com
Wed Dec 3 15:50:56 UTC 2014

You need to install the sniffers CA certificate to allow them to break your
TLS connections or you need to hack a trusted CA to create some wildcard
ones (Comodo incident). Some software like Chrome also uses cert pinning,
so only a hardcoded cert is allowed. Afaik Tor uses hardcoded certs for the
dir authority and relay certs are signed by dir authority, so this
technology wouldn't be able to sniff Tor traffic, even if you voluntarly
install their CA on your machine.
On Dec 3, 2014 3:55 PM, "Dedalo Galdos" <seguridadblanca at gmail.com> wrote:

> Last saturday during my Tor Talk in a Security Barcamp someone asked me
> about this technology which I really don't have much information so I want
> to share the link in case someone in here has any experience with this. I
> heard some ISPs are using this in some countries to break into people's ssl
> connections.
> https://www.bluecoat.com/products/ssl-visibility-appliance
> Regards,
> Dedalo.
> --
> Scripter, Pentester N' Independent Security Researcher.
> Blog: Seguridad Blanca <http://blog.dedalo.in>
> Twitter: @SeguridadBlanca <http://www.twitter.com/SeguridadBlanca>
> --
> tor-talk mailing list - tor-talk at lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

More information about the tor-talk mailing list