I work on a corporate laptop that has an infamous root CA certicate installed, which allows the company to intercept all my browser traffic and perform a MITM attack.

Ideally, I’d like to use the company laptop to read my own mail, access my NAS in my time off.

I fear that even if I configure containers on that laptop to run alpine + wireguard client + firefox, the traffic would still be decrypted. If so, could you explain how the wireguard handshake could be tampered with?

What about Tor in a container? Would that work or is that pointless as well?

Huge kudos if you also take the time to explain your answer.

    • KairuByte@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      0
      ·
      8 months ago

      I’m curious on how your systems would handle something like a guacamole instance running on a users home network? It’s pure http traffic afaict, but I’ve always been curious how it would be logged.

      • WanderingCat@lemm.ee
        link
        fedilink
        arrow-up
        0
        ·
        8 months ago

        Depending on the set up, but there should be something that logs all network connections. So they can see the connection to the private IP, just can’t see what it was

    • SnotBubble@lemmy.mlOP
      link
      fedilink
      arrow-up
      0
      ·
      8 months ago

      Thank you for sharing this info. It’s very convincing and well argumented.

      I won’t try anything else and will use my personal device.

  • unlawfulbooger@lemmy.blahaj.zone
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    8 months ago

    The best thing is to use a different device, period.

    Since the company is lord and master over the device, in theory, they can see anything you’re doing.
    Maybe not decrypting wireguard traffic in practice, but still see that you’re doing non-official things on the device that are probably not allowed. They might think you’re a whistleblower or a corporate spy or something.

    I have no idea where you work, but if they install a CA they’re probably have some kind of monitoring to see what programs are installed/running.

    If the company CA is all you’re worried about, running a browser that uses its own CA list should be enough.

    • SnotBubble@lemmy.mlOP
      link
      fedilink
      arrow-up
      0
      ·
      8 months ago

      Yeah, I’ll use my own device, log on to the guest network and start Wireguard on my laptop. Seems a fair choice both for the company and myself.

      • unlawfulbooger@lemmy.blahaj.zone
        link
        fedilink
        arrow-up
        0
        ·
        edit-2
        8 months ago

        That seems more sensible.

        But they still can track some of the things you do (same with any untrusted wifi network):

        • all data of http traffic (i.e. non-https)
        • ip addresses you connect to
        • hostnames you connect to (if SNI is not working correctly)
    • NESSI3@lemmy.sdf.org
      link
      fedilink
      arrow-up
      0
      ·
      8 months ago

      Which browser you use won’t really matter. The company is using an SSL proxy and they’re not going to pass your traffic along and let you bypass it. You don’t really get a choice as the end user. You can accept their proxy cert one time by adding it to your browser store or you can accept it every time you try to visit a site. In either way they’re going to decrypt the traffic and re-encrypt it.

      FWIW the SSL proxy should only impact asymmetric encryption that uses TLS. It shouldn’t impact symmetric crypto but they can still monitor everything you do by other means. They can watch you and they can block any traffic they desire. Chances are if they’re willing to go far enough to deploy an SSL proxy then they’re probably willing to fire you if you try to bypass it.

      • SnotBubble@lemmy.mlOP
        link
        fedilink
        arrow-up
        0
        ·
        8 months ago

        It’s good to know that they can’t bypass wireguard or Tor. I was a worried about that.

        As others have suggests, I will probably use a separate device to check my mail. That seems the safest and fairest option both from the company and my perspective.

    • SnotBubble@lemmy.mlOP
      link
      fedilink
      arrow-up
      0
      ·
      8 months ago

      I tried opening a browser in a Docker container and but couldn’t browse any site except google because it didn’t recognize the CA authority.

  • uzay@infosec.pub
    link
    fedilink
    arrow-up
    0
    ·
    8 months ago

    If it boots from USB, boot a different OS. But overall, preferrably use a different device.

  • catloaf@lemm.ee
    link
    fedilink
    English
    arrow-up
    0
    ·
    8 months ago

    Don’t. Just fucking don’t. Keep your personal stuff off your work equipment and vice versa. I don’t know why people keep wanting to do this, because it only leads to trouble.

    • BearOfaTime@lemm.ee
      link
      fedilink
      arrow-up
      0
      ·
      8 months ago

      Adding on:

      Anything you do with a company device brings liability to them, which is part of why you should keep things separate, and part of why they manage devices.

  • SkyNTP@lemmy.ml
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    8 months ago

    You wouldn’t do this with a stranger’s device, so why insist you do it with your employer’s device? Just don’t.

    If you have a workstation and want to use the same monitors/headsets/peripherals with both the company device and your personal device try one or two KVM switches.

      • ddh@lemmy.sdf.org
        link
        fedilink
        English
        arrow-up
        0
        ·
        8 months ago

        I’ve done this in the past without apparent issue. Could you perhaps expand on where the risks arise here? My impression was that unless there is some independent hardware running code separate from the OS, then it would be OK?

          • ddh@lemmy.sdf.org
            link
            fedilink
            English
            arrow-up
            0
            ·
            8 months ago

            Let’s assume it’s allowed. Obviously it’s untrusted hardware, but for widely issued corporate PCs, what’s the risk that there would be some hardware snooping going on if you controlled the OS?

        • baritone_edge@lemmy.ml
          link
          fedilink
          arrow-up
          0
          ·
          8 months ago

          Not an expert, but I believe that the company could detect that it was booted to another OS and you could have trouble at work for policy violation. But this process would likely be ‘safe’ from a personal privacy/security perspective.

  • randombullet@programming.dev
    link
    fedilink
    arrow-up
    0
    ·
    8 months ago

    Personal stuff on personal devices.

    Company stuff on company devices.

    Never mix. I don’t even check my personal email on my work laptop.

    If I need access to my home, it’s through an external connection like LTE.

  • Possibly linux@lemmy.zip
    link
    fedilink
    English
    arrow-up
    0
    ·
    8 months ago

    What you are wanting to do is likely a misuse of corporate resources. If you are still unsure go talk to IT

  • kylian0087@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    8 months ago

    What I did is use a ssh tunnel and rdp over that. ssh and RDP are both build in to windows. VPNs often don’t work because some software needs to be installed.

  • Rambomst@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    8 months ago

    Use your company laptop for only work…

    If you install non-approved software you will probably get flagged by the security team.

  • x4740N@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    8 months ago

    Don’t use the company laptop, you can only confirm what is going on with your own devices

  • MTK@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    8 months ago

    The computer probably has local security tools (such as an edr) that spy on you any way.

    You need to assume it is completely compromised.

    But… assuming this isn’t in violation of your company computer usage policy (which it very much might be and can put you in trouble) you can install any VPN (avoid spyware shit) and a different browser (ideally something a bit obscure, like librewolf) and this will bypass the MiTM as the the device that does the MiTM would be either:

    A) a network device that hijacks the HTTPS requests (VPN bypass this)

    B) the browser used by the company

    C) some other kind of software that atteches itself to all browsers via admin installed extensions (obscure browser might not be recognised by such software, be sure to check the installed extensions after letting the browser run for an hour)

    And once you are done you can check the certificate chain in the browser to confirm.

    • SnotBubble@lemmy.mlOP
      link
      fedilink
      arrow-up
      0
      ·
      8 months ago

      Before I wrote this thread, I ran for a couple of minutes a browser from a docker container. I couldn’t browse any website because of the missing CompanyName CA certificate. So, I stopped because it was too freaky.