Fraudulent *.google.com certificate issued
Fraudulent *.google.com certificate issued
Posted Aug 30, 2011 20:49 UTC (Tue) by paravoid (subscriber, #32869)In reply to: Fraudulent *.google.com certificate issued by cortana
Parent article: Fraudulent *.google.com certificate issued
Commercial Wi-Fi hotspots usually redirect your traffic to their own website where you can buy a short-term pass or a subscription.
Since a) those WiFi networks are non-encrypted, b) they require either a short code that's equivalent to some money paid or your credit card, it's frequent to see HTTPS being used on their captive portal.
But the hotspot doesn't allow any kind of traffic besides connecting to the captive portal and even redirects HTTP requests that try to connect elswhere.
Â…which breaks OCSP. And present you with a nice chicken-and-egg problem.
(yes, they're broken by design, and yes I know about iodine :))
Posted Aug 30, 2011 21:51 UTC (Tue)
by raven667 (subscriber, #5198)
[Link] (2 responses)
Posted Aug 31, 2011 16:34 UTC (Wed)
by cesarb (subscriber, #6266)
[Link] (1 responses)
Posted Aug 31, 2011 18:03 UTC (Wed)
by raven667 (subscriber, #5198)
[Link]
Posted Sep 1, 2011 7:58 UTC (Thu)
by Comet (subscriber, #11646)
[Link]
Fraudulent *.google.com certificate issued
Fraudulent *.google.com certificate issued
Fraudulent *.google.com certificate issued
Fraudulent *.google.com certificate issued