Recently I decided to start checking HTTPS certificate fingerprints when I'm on public Wifi. I have a long list of domains for which I obtain the certificate fingerprints and then compare against my "gold standard" set of fingerprints, which I obtained when my network connection was solely through tethering with my phone, which uses the T-mobile network. Some of the domains on my list are subdomains for logging into sites, or making payments, which an attacker might find attractive.
I started on this certificate checking crusade because my web browsers had begun to complain when I was on public Wifi about suspicious certificates on pretty basic websites like Reddit and Craigslist. Initially I checked to see if the same certificate warnings appeared while I was tethering with my phone and they did not, and then I checked whether the certificate warnings appeared while I was on Wifi but using TOR, and they did not. Thus something was sketchy with that Wifi. Certainly a VPN would be advisable, but I decided to see what fingerprint comparisons show.
Now that I am checking certificate fingerprints, I currently see that most are the same between my T-mobile set and those obtained when I'm on the public Wifi. There are a few discrepancies but nothing too alarming-- at the moment. The most suspicious discrepancy is developer.android.com's certificate, from which a person might download software although at the moment the download link provided over Wifi points to what I assume is a randomly chosen server r1---sn-a5meknek.gvt1.com, which traceroute suggests is actually Google.
I assume the intention of having this kind of randomly chosen server is for network efficiency and not preventing MITM, because if a MITM attacker used a regular expression to intercept all gvt1.com subdomains, she could handle all of those subdomains and send an infected executable to the user, e.g. AndroidStudio.exe modified by Sketchy Telcom Inc.
I started on this certificate checking crusade because my web browsers had begun to complain when I was on public Wifi about suspicious certificates on pretty basic websites like Reddit and Craigslist. Initially I checked to see if the same certificate warnings appeared while I was tethering with my phone and they did not, and then I checked whether the certificate warnings appeared while I was on Wifi but using TOR, and they did not. Thus something was sketchy with that Wifi. Certainly a VPN would be advisable, but I decided to see what fingerprint comparisons show.
Now that I am checking certificate fingerprints, I currently see that most are the same between my T-mobile set and those obtained when I'm on the public Wifi. There are a few discrepancies but nothing too alarming-- at the moment. The most suspicious discrepancy is developer.android.com's certificate, from which a person might download software although at the moment the download link provided over Wifi points to what I assume is a randomly chosen server r1---sn-a5meknek.gvt1.com, which traceroute suggests is actually Google.
I assume the intention of having this kind of randomly chosen server is for network efficiency and not preventing MITM, because if a MITM attacker used a regular expression to intercept all gvt1.com subdomains, she could handle all of those subdomains and send an infected executable to the user, e.g. AndroidStudio.exe modified by Sketchy Telcom Inc.
Last edited: