On Wed, 28 Jan 2009 13:18:10 +0100 André Warnier <[email protected]> wrote:
> But any MITM attack would first have to start by corrupting the DNS > system anyway, which should not be that easy, or is it ? > (excepting phishing of course) A network admin (e.g. an ISP) can insert their own transparent proxy. Or require all users to configure a proxy. -- Nick Kew --------------------------------------------------------------------- The official User-To-User support forum of the Apache HTTP Server Project. See <URL:http://httpd.apache.org/userslist.html> for more info. To unsubscribe, e-mail: [email protected] " from the digest: [email protected] For additional commands, e-mail: [email protected]
