[TriLUG] Frontier doing packet inspection?
Joseph Mack NA3T
jmack at wm7d.net
Sun Dec 8 14:46:13 EST 2013
On Sun, 8 Dec 2013, Craig Cook wrote:
>>> Or, what makes you think Frontier is not running a large proxy farm that you
>>> can't see.? They make the proxy return "friendly" errors.
>>
>> this is the most likely explanation. I take it there's no easy way around
>> this?
>
> Trying to bypass a proxy like that is difficult. One thought would be to use
> a VPN tunnel though the proxy. Then hope your termination end doesn't use a
> proxy themselves ;)
ah yes. I vpn back to home from laptops, but I never thought of vpn'ing out from
home. I could do that, but it would be slow. As long as they're only proxy'ing
I'm not too worried.
> Some proxies can intercept traffic by doing man-in-the-middle type games. I
> know blue coat proxies can intercept ssl traffic and pass it back to you
> without the user being aware.
On Sun, 8 Dec 2013, David Brain wrote:
> Hopefully not (at least that I am aware of !) - you'd at least have to trust a
> non-standard CA for SSL inspection/interception to work, at least that's how
> it works on the BlueCoat (and other web filter products I've seen). There's
> some filtering & logging (and of course straight up proxying) that can be done
> without decrypting SSL based on certificate content, IPs & SNI but nothing
> that can be seen in the payload itself. Of course in a corp network pushing
> out an additional CA cert via group policy or such like is pretty easy....
thanks Joe
--
Joseph Mack NA3T EME(B,D), FM05lw North Carolina
jmack (at) wm7d (dot) net - azimuthal equidistant map
generator at http://www.wm7d.net/azproj.shtml
Homepage http://www.austintek.com/ It's GNU/Linux!
More information about the TriLUG
mailing list