Using sslsniff/sslsplit it is possible to mount an SSL MITM attack using a self-signed, untrusted certificate to intercept traffic generated by a caldav account configured on a jolla device. This attack works again newly configured and existing caldav accounts using an https connection.
Tested on Sailfish OS 1.1.1.27 Vaarainjärvi.
![]() | 2 | No.2 Revision |
Using sslsniff/sslsplit it is possible to mount an SSL MITM attack using a self-signed, untrusted certificate to intercept traffic generated by a caldav account configured on a jolla device. This attack works again newly configured and existing caldav accounts using an https connection.
It has already been publicly noted that self-signed certificates "just work" so I consider this issue publicly known.
Tested on Sailfish OS 1.1.1.27 Vaarainjärvi.
![]() | 3 | No.3 Revision |
Using sslsniff/sslsplit it is possible to mount an SSL MITM attack using a self-signed, untrusted certificate to intercept traffic generated by a caldav account configured on a jolla device. This attack works again against newly configured and existing caldav accounts using an https connection.
It has already been publicly noted that self-signed certificates "just work" so I consider this issue publicly known.
Tested on Sailfish OS 1.1.1.27 Vaarainjärvi.