from what I understand, this is a government issued wiretapping against that 
specific services/servers (hosted by Hetzner and Linode in Germany?) and not a 
general TLS exploit.

so nothing interesting or unique.


On Sun, 22 Oct 2023 09:04:39 +0000 Slavko via mailop <mailop@mailop.org> wrote:

> Hi all,
> 
> while not directly about email, recently was published details
> about success MiTM attack against XMPP server, the attacker
> was able to decrypt TLS communication without notice (from
> both sides, the server and client) and was success for at least
> three months, see
> 
>     https://notes.valdikss.org.ru/jabber.ru-mitm/
> 
> In short: The attacker used valid LE certificate (requested by
> self) to intercept traffic. The victims was services hosted on
> Hetzner and LinodeĀ and it seems as Germany government's
> action (not confirmed, but if true, it will never be).
> 
> IMO, that attack can be success on any TLS service (including
> email) and for any place (clouds, own, ...), thus it is worth to be
> aware of it, as your service can be not as private as one can
> think.
> 
> regards
> 
> -- 
> Slavko
> https://www.slavino.sk/
> _______________________________________________
> mailop mailing list
> mailop@mailop.org
> https://list.mailop.org/listinfo/mailop
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to