-
Content Count
34 -
Joined
-
Last visited
-
Days Won
2
Posolsvetla last won the day on November 14 2019
Posolsvetla had the most liked content!
Profile Information
-
Location
Slovakia
Recent Profile Visitors
The recent visitors block is disabled and is not being shown to other users.
-
Posolsvetla started following Broken Cryptography, Web Control behind a proxy not showing blocking page for https sites, Using Multiple Messages and 5 others
-
This is intended behavior of both Chrome and Firefox. We serve the blocking page with HTTP/1.0 403 Blocked by ESET Security, as the immediate response to CONNECT blocked.domain.com:443 HTTP/1.1 Such response is blocked by browsers, and therefore not shown, in the case of https for security reasons, see e.g. https://bugs.chromium.org/p/chromium/issues/detail?id=137891 In order to make the browsers show the page we would need to proceed with the tunnel establishment and serve the blocking page only in there. Currently there is no ETA when this change will be done. It would be impleme
-
Peter Randziak reacted to a post in a topic: Sources of Web Control categories in Endpoint Security
-
If you mean customized messages, than no, it's not possible to setup multiple, each one for different scenario.
-
Sources of Web Control categories in Endpoint Security
Posolsvetla replied to pcubed's topic in ESET Endpoint Products
In most cases only domain is sent, but the whole URL can be sent as well. The URL part after ? or # is not sent. Currently the URL can be quite easily read from the request, however these days we are in the process of releasing a new functionality for the encryption of these requests. The process should be finished in November if no blocking issues emerge. The URLs are not kept at our servers at all. -
We are already investigating an issue with the same symptoms, so it might be the same issue in fact. Does the certificate used on the server have CRL Distribution Point X509 extension? If so, is the URL in there accessible on the affected local machine? The certificate is verified using the functionality OS provides. As a part of that process, the URL mentioned above is accessed.
-
Unfortunately we are not able to provide any update on this issue yet.
-
According to our testing of www.rahvastikuregister.ee, the issue is on the server side. We recommend you to contact the server administrator. In the meantime, we recommend to add the server certificate of www.rahvastikuregister.ee into the List of known certificates (https://help.eset.com/eav/13/en-US/?idh_config_epfw_ssl.html) and set Scan action to Ignore. The technical details discovered during the testing which might be useful: The issue is present when there is TLS version 1.3 advertised in the Client Hello, but there is not advertised x25519 group in the Supported Groups Client
-
NewbyUser reacted to a post in a topic: Certificate Issues for Firefox 74.0 64bit
-
Broken Cryptography
Posolsvetla replied to Sammo's topic in ESET Internet Security & ESET Smart Security Premium
CVE-2020-0601 is related to ECC, not SHA1. Only Win10 were affected. We have implemented the detection of the attack shortly after is was published, so our users are protected (to be precise, this applies only to the TLS connections scanned by Web access protection, not the complete protection of the whole OS) even if they don't have the Win patch installed. -
Broken Cryptography
Posolsvetla replied to Sammo's topic in ESET Internet Security & ESET Smart Security Premium
We already tried to solve this issue. Unfortunately, there is no general solution which would work out-of-the-box. Currently it's put on-hold and there is no progress being made on this.