We have moved to a new Sailfish OS Forum. Please start new discussions there.

Revision history [back]

click to hide/show revision 1
initial version

posted 2015-01-03 16:04:53 +0200

caldav client vulnerable to SSL MITM attack

Using sslsniff/sslsplit it is possible to mount an SSL MITM attack using a self-signed, untrusted certificate to intercept traffic generated by a caldav account configured on a jolla device. This attack works again newly configured and existing caldav accounts using an https connection.

Tested on Sailfish OS 1.1.1.27 Vaarainjärvi.

caldav client vulnerable to SSL MITM attack

Using sslsniff/sslsplit it is possible to mount an SSL MITM attack using a self-signed, untrusted certificate to intercept traffic generated by a caldav account configured on a jolla device. This attack works again newly configured and existing caldav accounts using an https connection.

It has already been publicly noted that self-signed certificates "just work" so I consider this issue publicly known.

Tested on Sailfish OS 1.1.1.27 Vaarainjärvi.

caldav client vulnerable to SSL MITM attack

Using sslsniff/sslsplit it is possible to mount an SSL MITM attack using a self-signed, untrusted certificate to intercept traffic generated by a caldav account configured on a jolla device. This attack works again against newly configured and existing caldav accounts using an https connection.

It has already been publicly noted that self-signed certificates "just work" so I consider this issue publicly known.

Tested on Sailfish OS 1.1.1.27 Vaarainjärvi.