Originally posted by: SagaLore
Originally posted by: Crusty
Originally posted by: bsobel
SSH uses SSL. The weakness is in SSL, not https or ssh.
Actually this is a weakness in https much more than SSL itself. It relies on seeing the plaintext traffic and stripping out ssl links (or directing the user to a different domain on SSL for which the attacker got a cert). Its not a break of SSL itself at all.
Yeah, the article I read didn't make a note of the fact that you need the plaintext traffic first. I thought it was just like the exploit that the MD5 collisions would allow. Either way, publicly broadcast wifi = bad news for personal information.
Only going by the article, here is what happens:
* Watches traffic
* When it sees HTTPS, it substitutes it with HTTP
* Tells the server that an encrypted page has been sent
* Adds padlock icon to URL
So the server actually doesn't know you're on http, so it won't redirect you? Its funny that the padlock icon is what really is getting everyone.