I have a fundamental misunderstanding of SSL/TLS that I am hoping can be cleared up.
The way I understand it, when I get a certificate for my site it has all of my information and is signed by my certificate authority (VeriSign, or whomever). When someone requests a page from my site that uses SSL/TLS, the certificate goes to the user and it is validated using the certificate authority's well known public key. Then the user can look at the cert and see my information. They are confident that I am who I say I am and that the message hasn't been tampered with since the validation worked correctly.
What is to stop me from putting a proxy in the middle of the browser and the real site and just sending the real site's certificate (which, and I have no idea if this is right, I assume I have at this point since my browser pulled it down to verify it) to the client and making the client think that it is really site whateverdomain.com when it is really me in the middle?
Thanks.