this post was submitted on 07 Mar 2024
86 points (90.6% liked)

Privacy

32025 readers
986 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

I work on a corporate laptop that has an infamous root CA certicate installed, which allows the company to intercept all my browser traffic and perform a MITM attack.

Ideally, I'd like to use the company laptop to read my own mail, access my NAS in my time off.

I fear that even if I configure containers on that laptop to run alpine + wireguard client + firefox, the traffic would still be decrypted. If so, could you explain how the wireguard handshake could be tampered with?

What about Tor in a container? Would that work or is that pointless as well?

Huge kudos if you also take the time to explain your answer.

EDIT: A lot of you suggested I use a personal device for checking mails. I will do that. Thanks for your answers!

all 42 comments
sorted by: hot top controversial new old
[–] catloaf@lemm.ee 102 points 8 months ago (1 children)

Don't. Just fucking don't. Keep your personal stuff off your work equipment and vice versa. I don't know why people keep wanting to do this, because it only leads to trouble.

[–] BearOfaTime@lemm.ee 26 points 8 months ago

Adding on:

Anything you do with a company device brings liability to them, which is part of why you should keep things separate, and part of why they manage devices.

[–] unlawfulbooger@lemmy.blahaj.zone 77 points 8 months ago* (last edited 8 months ago) (1 children)

The best thing is to use a different device, period.

Since the company is lord and master over the device, in theory, they can see anything you’re doing.
Maybe not decrypting wireguard traffic in practice, but still see that you’re doing non-official things on the device that are probably not allowed. They might think you’re a whistleblower or a corporate spy or something.

I have no idea where you work, but if they install a CA they’re probably have some kind of monitoring to see what programs are installed/running.

If the company CA is all you’re worried about, running a browser that uses its own CA list should be enough.

[–] SnotBubble@lemmy.ml 9 points 8 months ago (1 children)

Yeah, I'll use my own device, log on to the guest network and start Wireguard on my laptop. Seems a fair choice both for the company and myself.

[–] unlawfulbooger@lemmy.blahaj.zone 8 points 8 months ago* (last edited 8 months ago)

That seems more sensible.

But they still can track some of the things you do (same with any untrusted wifi network):

  • all data of http traffic (i.e. non-https)
  • ip addresses you connect to
  • hostnames you connect to (if SNI is not working correctly)
[–] randombullet@programming.dev 60 points 8 months ago (1 children)

Personal stuff on personal devices.

Company stuff on company devices.

Never mix. I don't even check my personal email on my work laptop.

If I need access to my home, it's through an external connection like LTE.

[–] delirious_owl@discuss.online 3 points 8 months ago (1 children)

This, but if you use an OS like Qubes then you can keep them separate while still using the same device

[–] randombullet@programming.dev 2 points 8 months ago

I think that with 802.1X you can't do that unless you export the keys somehow.

[–] SkyNTP@lemmy.ml 37 points 8 months ago* (last edited 8 months ago) (1 children)

You wouldn't do this with a stranger's device, so why insist you do it with your employer's device? Just don't.

If you have a workstation and want to use the same monitors/headsets/peripherals with both the company device and your personal device try one or two KVM switches.

[–] TexMexBazooka@lemm.ee 2 points 8 months ago

Power toys and mouse without borders would like a word

[–] antlion@lemmy.dbzer0.com 25 points 8 months ago

Don’t. And beyond that if you use their WiFi, connect to a VPN. Best just use LTE.

[–] possiblylinux127@lemmy.zip 21 points 8 months ago

What you are wanting to do is likely a misuse of corporate resources. If you are still unsure go talk to IT

[–] sharkfucker420@lemmy.ml 15 points 8 months ago (1 children)

Use a tails usb

Preferably just dont though

[–] delirious_owl@discuss.online 1 points 8 months ago

I'd its tails then its not an issue at all. Its using the same keyboard but for all intents and purposes, its a different machine

[–] uzay@infosec.pub 7 points 8 months ago

If it boots from USB, boot a different OS. But overall, preferrably use a different device.

[–] lemmyseizethemeans@lemmygrad.ml 6 points 8 months ago (1 children)

If you want to use the same physical device just put Linux on a bootable USB stick and boot off that

[–] possiblylinux127@lemmy.zip 5 points 8 months ago (1 children)

Do not do this if it let's you. Its a good way to get in trouble

[–] DarkDarkHouse@lemmy.sdf.org 2 points 8 months ago (2 children)

I’ve done this in the past without apparent issue. Could you perhaps expand on where the risks arise here? My impression was that unless there is some independent hardware running code separate from the OS, then it would be OK?

[–] possiblylinux127@lemmy.zip 2 points 8 months ago (1 children)

Its likely a violation of company policy

[–] DarkDarkHouse@lemmy.sdf.org 1 points 8 months ago (1 children)

Let’s assume it’s allowed. Obviously it’s untrusted hardware, but for widely issued corporate PCs, what’s the risk that there would be some hardware snooping going on if you controlled the OS?

[–] possiblylinux127@lemmy.zip 1 points 8 months ago

The "snooping" is called a good security policy. Security should always come first.

[–] Geometrinen_Gepardi@sopuli.xyz 4 points 8 months ago (3 children)

Just run portable Firefox without the root cert?

[–] NESSI3@lemmy.sdf.org 9 points 8 months ago* (last edited 7 months ago) (1 children)
[–] SnotBubble@lemmy.ml 3 points 8 months ago (1 children)

It's good to know that they can't bypass wireguard or Tor. I was a worried about that.

As others have suggests, I will probably use a separate device to check my mail. That seems the safest and fairest option both from the company and my perspective.

[–] wizardbeard@lemmy.dbzer0.com 1 points 8 months ago

Protecting your traffic over the wire also doesn't stop them from getting the data directly from the OS or program itself.

It's their hardware, you're just allowed to use it (and according to papers you signed when hired, likely only for work use).

My company uses a similar MITM technique on all our network traffic, but we have also used a number of other tools that don't have the ability to snoop on the network traffic but can still get browsing data from user machines. Most browsers have "enterprise mode" features, or just store browsing history in a file that other programs can read.

We've also used systems that installed at the BIOS and/or bootloader level to allow us to track the location of and take certain remote actions on company hardware that was taken off the company network. If the device got an internet connection at all, it was still ours to control. Was very handy for people who tried to keep their laptop after they quit.

Technically they could use OCR on automatic screencaptures, which would bypass anything you could do. There's a ton of "management" software that does automatic screen captures, or allows someone to look at an overview of desktops like a security guard looking at a bank of camera monitors. Usually that's something schools use, but it is available for companies.

They could use a keylogger too.

The point is, you cannot control, or have any foolproof knowledge of, what they have installed on your work machine. That means that you cannot effectively work around or bypass it. If you absolutely need to, make a new "personal" email account to use for things like spotify or youtube on your work machine, and just use your damn phone for personal stuff.

[–] SnotBubble@lemmy.ml 3 points 8 months ago

I tried opening a browser in a Docker container and but couldn't browse any site except google because it didn't recognize the CA authority.

[–] kylian0087@lemmy.world 2 points 8 months ago

Often gets blocked. I tried on my work and you can't use any other browser.

[–] kylian0087@lemmy.world 2 points 8 months ago

What I did is use a ssh tunnel and rdp over that. ssh and RDP are both build in to windows. VPNs often don't work because some software needs to be installed.

[–] MTK@lemmy.world 2 points 8 months ago (1 children)

The computer probably has local security tools (such as an edr) that spy on you any way.

You need to assume it is completely compromised.

But... assuming this isn't in violation of your company computer usage policy (which it very much might be and can put you in trouble) you can install any VPN (avoid spyware shit) and a different browser (ideally something a bit obscure, like librewolf) and this will bypass the MiTM as the the device that does the MiTM would be either:

A) a network device that hijacks the HTTPS requests (VPN bypass this)

B) the browser used by the company

C) some other kind of software that atteches itself to all browsers via admin installed extensions (obscure browser might not be recognised by such software, be sure to check the installed extensions after letting the browser run for an hour)

And once you are done you can check the certificate chain in the browser to confirm.

[–] SnotBubble@lemmy.ml 2 points 8 months ago (1 children)

Before I wrote this thread, I ran for a couple of minutes a browser from a docker container. I couldn't browse any website because of the missing CompanyName CA certificate. So, I stopped because it was too freaky.

[–] MTK@lemmy.world 1 points 8 months ago

That makes sense, the MiTM was still going on but you browser was not configures with the company CA

[–] delirious_owl@discuss.online 1 points 8 months ago

Either double-fist with a second laptop or install QubesOS on your laptop

[–] x4740N@lemmy.world 0 points 8 months ago

Don't use the company laptop, you can only confirm what is going on with your own devices

[–] Rambomst@lemmy.world 0 points 8 months ago

Use your company laptop for only work....

If you install non-approved software you will probably get flagged by the security team.