Solved

Is the path of an url encrypted when using https?

Posted on 2002-07-17
5
158 Views
Last Modified: 2010-04-11
Let's say I connect to https://niceserver.com/howtofoolyourboss.html trough a proxy, using https. Will the proxy then only see the server  and port I connect to (niceserver.com:80) or will it also be able to pick up the document i requested from the server (howtofoolyourboss.html)?

I'm asuming that the proxy doesn't do any man-in-the-middle attack.
0
Comment
Question by:tunheim
5 Comments
 
LVL 11

Expert Comment

by:geoffryn
ID: 7159796
If your browser is set to use the proxy, then the https://url will be listed in the proxy logs.  If you are using only the winsock proxy client and not the browser settings, then the logs record ip, source and destination port.
0
 
LVL 51

Accepted Solution

by:
ahoffmann earned 50 total points
ID: 7160473
depends on the proxy.
If you get the notification for accepting the certificate from the remote server, the proxy sees only IP and port.
If the notificatipn for the certificate is from the proxy, it does not forward the https connection, but do it itself. In this case the proxy can see the data too.
0
 
LVL 24

Expert Comment

by:SunBow
ID: 7161086
> I'm asuming that the proxy doesn't do any man-in-the-middle attack.

true.  tunheim, you have it! plain proxy does plain stuff, just the address.

Now there are many other ways devices or services, add-ons can get in the middle and run interference. See also: Carnivore.
0
 

Author Comment

by:tunheim
ID: 7161704
I _do_ get the notification from the remote server. Didn't think of it as relevant for the question. Thanks for bringing it up, it sort of fills some gaps in my understanding of networks.
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 7162051
so you just need to proofe that the certificate is not faked (man-in-the-middle), simple, isn't it ;-)
0

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Sonicwall blocks a site 49 78
php extract($_REQUEST) 5 53
Home wireless security 10 48
User account lockout - Server 2012R2 7 30
This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
With healthcare moving into the digital age with things like Healthcare.gov, the digitization of patient records and video conferencing with patients, data has a much greater chance of being exposed than ever before.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question