Fascinating and sophisticated MiTM ('man in the middle') at Hetzner (DE) and Linode, targeting Russia's largest XMPP/Jabber (civilian) chat service. The authors of the article make a reasonably compelling case that "this is lawful interception Hetzner and Linode were forced to setup."

notes.valdikss.org.ru/jabber.r…

Excellent mitigation walkthrough here:

devever.net/~hl/xmpp-incident

Sure gets me thinking.

#infosec #sysadmin #forensics

in reply to old sysops

A lesson in here, nonetheless. As the datacenter owns the route, they can do the LE ACME challenge at the hop facing the customer server, for which DNS resolves, set up a proxy and transparently decrypt traffic, effectively hijacking each STARTTLS connection on initiation. It's like a datacenter implementation of Moxie's 'ssl stripping' back in the day, and so the CA itself doesn't need to be poisoned.