WojtylaKarol wrote:And the CA has the authority to revoke the certificate at any moment, making the userbase sure that if the certificate will be stolen by malicious side, they will still be protected. Otherwise the stolen certificate would be still accepted by the browser and the user would be sharing his private data with threat actors. Thats one example of why browsers don't accept self signed certificates anymore.
That is only applicable
if the cert gets stolen (highly unlikely and a massive fuckup),
and only if the MITM occurs before the site has presented a new certificate to replace the old one. (Not to mention CA certificates and self-signed certificates aren't mutually exclusive - sites like banks could use CA certs if insta-revoking is a requirement, whereas basically everyone else can use self-signed certs. Really, what's the chance, assuming havenandhearth.com's cert gets stolen, that someone would MITM a Haven player and spoof havenandhearth.com, and all that before the player next visits havenandhearth.com in an environment without a MITM?)
shubla wrote:By giving that big 'warning you are being attacked' message when the certificate for a site unexpectedly changes, rather than when first receiving the certificate. The only way to perform a MITM then would be to have started the MITM attack before the user even accesses the site for the first time - a highly unlikely scenario in practice unless you've got the government after you or something.
Doesn't sound like a very suitable solution really. And I'm pretty sure that you can get MITM'd without any government being after you! Most people connect to any wifi if its free, named something like "mall public" and does not have password etc.
What is the chance of someone connecting to a site where they could enter sensitive information for their first time on a public network
and there's a MITM on that network, the MITM convincingly spoofing that site,
and the user entering sensitive data into that site on their very first visit? The moment they leave the network the whole situation comes to light, so there is a very short window of opportunity to actually do anything (plus literally everyone else notices there's a MITM on that public network). The only way to make actual use of this would be if you could MITM someone's usual connection, like planting a MITM at the service provider, but you need to be a government or similarly influential entity to pull that off.