DNS server points to a fake web host, which performs the fetch and modifies in stream for the client. Is getting a cert the issue here? I don't think so.
Comments
Log in with your Bluesky account to leave a comment
It'd need to get a valid HTTPS response to the client as the client refuses anything that's not a valid HTTPS response for a site it has HSTS loaded on (with most things worth their salt being preloaded to the browser and the rest loaded on the first visit).
It's a good idea, but thankfully redirects need a HTTP response and this will be blocked by HSTS. This is actually an issue with captive portal setups and why browsers open their own special pages (eg https://msftconnecttest.com/redirect) for WiFi login, that specifically allow DNS to preform this "attack"
If you can do it, that's compromising a CA and unless they very promptly resolve the issue, it WILL get them banished from all maintaned browsers and OSes.
Comments
You'd need to compromise a CA first.
Maybe you guys have a point.