Yeah, I know what the article says. But just speaking to the general case, this sort of attack could be carried out without having equipment installed at the ISP. The only reason you would want to do it that way is if you need for the attack to work against any and all hosts attached to that system. This might be desirable if you absolutely
need the attack to work against a specific target, but it's not necessary if you're just a cracker looking to indiscriminately swipe data from anybody that you can successfully mis-direct to your compromised web server/network device. There are any number of ways to do this, and most of them don't require terribly much in the way of technical knowledge. For instance, a very significant portion of malware already does this, for example by modifying the system's host file or otherwise sabotaging the client's name resolver. There are also several
external attacks which would not require malware on the target's machine (such as DNS cache poisoning) which will work for at least
some portion of the population. In fact, I see a pretty constant stream of cache-poisoning attempts against my own BIND server on a daily basis, most likely being carried out in a fully automated way by botnets.
shuyung wrote:
Those aren't casual hacks.
Mmm...for sufficiently small values of "casual", sure. The sorts of exploits I mentioned above are certainly trivial, though, and are routinely carried out by your typical 13-year-old 133t h4x0r. ARP poisoning and IP spoofing are trickier, and certainly not guaranteed to succeed. However, they are well known and not
that technically challenging to pull off. That is, you don't have to be an "expert" cracker to exploit them.
shuyung wrote:
Fair enough. This is a bone fide man-in-the-middle attack. The renegotiation gap is of somewhat limited scope, though. Don't get me wrong; a person could do a lot of damage with it. But it's not the sort of thing that a typical user doing typical things with their browser (ex. banking) is likely to be vulnerable to, though it is properly a flaw in the SSL/TLS standards themselves.