Alex Xu on X: "/2 Step 1 - The client requests to establish a TCP connection with the server. The request is maliciously routed to an intermediate server, instead of the real
![Topology of the intermediate server environment. File system requests... | Download Scientific Diagram Topology of the intermediate server environment. File system requests... | Download Scientific Diagram](https://www.researchgate.net/publication/3643068/figure/fig1/AS:670035508998145@1536760322087/Topology-of-the-intermediate-server-environment-File-system-requests-from-clients-are.png)
Topology of the intermediate server environment. File system requests... | Download Scientific Diagram
SSL/TLS Server and Client Authentication with Intermediate Certificates · Issue #551 · vernemq/vernemq · GitHub
![Trust in mutual TLS on chain of certificates in multi-intermediate-CA configuration - Information Security Stack Exchange Trust in mutual TLS on chain of certificates in multi-intermediate-CA configuration - Information Security Stack Exchange](https://i.stack.imgur.com/tewbp.png)