Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Surely the phone notices that the root certificate is not one of those it already knows about?


All the device knows is that it trusts some root CAs and not others. You add your personal root CA to the trusted list; so it's trusted.

Unless the site uses some kind of certificate pinning (c.f. HPKP), one trusted root is as good as another.

This is how TLS inspection is done on corporate networks. IT will apply a group policy that puts a company-owned root certificate into the trusted roots on your Windows machine - maybe the same one that's used for the rest of your internal PKI.

You then issue a subordinate CA from that root, and your web proxy infrastructure (Bluecoat or whatever) then uses that CA to do just-in-time provisioning of certs for whatever domains you're intercepting.


The phone doesn’t, as the sibling comment mentions, but the app might (if it’s doing certificate pinning).




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: