I was recently pointed to the app ettercap
(http://ettercap.sourceforge.net/), which claims (among other things):

"HTTPS support : you can sniff http SSL secured data... and even if the
connection is made through a PROXY"

Google yielded this info:
http://lists.debian.org/debian-security/2001/debian-security-200109/msg00060
.html but I'm still not clear on what exactly is going on.  From what I
gather, the ettercap box will serve as a go-between for all traffic between
server and client, and the client will get some kind of an error about the
key changing, and if the user chooses to continue the transaction, there's
nothing more that can be done.  Does anyone know anything more about this
program, or how serious a threat this is?  Has anyone ever actually had an
SSL session intercepted with this?  

It looks like the app has been out for a while so maybe this has been
discussed before, but it's new to me, and any info would be appreciated.

Reply via email to