Yes it is classical forgery as you say, but that is how SSL interception works.
And yes, I created a self signed CA cert for the proxy and manually
installed it into FF and IE browsers.

Firefox: Open 'Options' > 'Advanced' > 'Encryption' > 'View
Certificates' >e 'Authorities' >'Import' button, select the .der file
attached press 'OK'
IE: Tools > Options > Content > Certificates > Trusted Root
Certification Authorities

Sean


On 3 December 2011 04:11, Amos Jeffries <squ...@treenet.co.nz> wrote:
>
> On 3/12/2011 6:22 a.m., Sean Boran wrote:
>>
>> Well yes, we are trying to incept...
>> I dont see where the "forgery" is, if my proxy CA is trusted and a
>> cert is generated for that target, signed by that CA, why should the
>> browser complain?
>
>
> The "forgery" is that you are creating a certificate claiming to be fetched 
> from that website and authorizing you to act as their intermediary with 
> complete security clearance. When it is not. Exactly like me presenting 
> someone with a cheque against your bank account signed by myself. Forgery, by 
> the plain and simple definition of the word. This is why the browser 
> complains unless it has explicitly been made to trust the CA you use to sign.
>
> I missed the part where you had your signing CA already in the browser and 
> read that as the browser not complaining when only presented with the plain 
> cert.
>
>
>> And why would FF not complain but IE9 does?
>
>
> The one complaining does not trust the certificate or some part of its CA 
> chain. As others have said, each of the three browser engines uses their own 
> CA collections.
>
> Amos

Reply via email to