Answer the question
In order to leave comments, you need to log in
How does SSL\TLS encrypt traffic?
Let's say we raised an OpenVpn server on some kind of Vps, so we launch the vpn client
and go to some resource with https. But suppose
we got a kind of inquisitive hoster who does not hesitate
to listen to our traffic, so he gets the keys from our virtual machine and deciphering what
he is will see?
As I understand it, he will see encrypted SSL traffic, the question is, will all
traffic be encrypted? Not only outgoing openvpn, but also incoming openvpn?
Actually, what is the question: will SSL encryption be from the browser to the final resource-https or still from the server\proxy (in this
case
OpenVpn) to the final resource-https?
ordinary user.
Answer the question
In order to leave comments, you need to log in
If the provider is responsible only for the VPS, then he will only see HTTPS traffic to the final server and may try to attack it.
If the same provider also has a destination server, then what prevents the provider from also decrypting traffic with keys?
In general, HTTPS traffic goes to the target server and it doesn’t matter if it goes through WiFi, VPN or something else.
The only possibility of listening is HTTPS proxy, but for this, as far as I know, you need to install a proxy certificate locally.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question