<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote">On 8 May 2016 at 08:47, John Winters via GLLUG <span dir="ltr"><<a href="mailto:gllug@mailman.lug.org.uk" target="_blank">gllug@mailman.lug.org.uk</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Not specifically a Linux question, but I know a lot of knowledgeable<br>
people lurk here so I hope it will be forgiven.<br>
<br>
A (physical) site which I visit regularly provides a BYOD WiFi network<br>
to which people can connect their own devices. You need an individual<br>
WPA2 login in order to connect to it.<br>
<br>
Just recently they've announced that they're introducing filtering of<br>
https connections, and thus you will also need to install a certificate<br>
provided by them if you are going to use it to access any https web sites.<br>
<br>
Now the only way I can see this working is if they are proposing to<br>
generate spoof certificates, signed by them, for any such sites which<br>
you access, install their web filter as a man-in-the-middle, and thus<br>
have clear-text access to all your supposedly encrypted communication.<br>
<br>
Am I reading this correctly, or is there some less malign thing which<br>
they could be doing? Should I just stop using their WiFi and rely on my<br>
own 4G connection?<br>
<br></blockquote></div><br></div><div class="gmail_extra">I think you have it spot on.<br></div><div class="gmail_extra">They are setting themselves up as a man-in-middle.<br><br><br></div></div>