Jump to content

Encrypted network traffic. Untrusted certificate.


Recommended Posts

Sorry for the inconvenience, about 3 days to the date this message is appearing to me, usually when visiting microsoft sites.

 

post-8641-0-76852100-1481178520_thumb.jpg

post-8641-0-71090000-1481178527_thumb.jpg

 

This happens to me both with version 10 of ESS and Kaspersky. But it does not happen with other antivirus and version 8 of ESET Smart.

 

It happens in Chrome and occasionally with Internet explorer 9.

 

Please, I am very worried about this behavior, which had never been presented to me before.

Link to comment
Share on other sites

Web site cert. OK per QUALS SSL Server test; see below. Also server used is rated "A" - the highest rating.

 

Suspect this is a Chrome issue. Chrome uses its own internal root CA cert. store. Suspect something amiss with the way they have the certs. in the validation path pinned.

 

As far as Eset ver. 8 goes, you would not have an issue there if SSL protocol scanning is disabled; it is by default. Appears Kaspersky also is doing SSL protocol scanning, hence the issue there. As far as other AVs, many don't do SSL protocol scanning; hence no issue with them. When a product does SSL protocol scanning, it is responsible for performing cert. chain pinning validation. Both FireFox and Chrome use their own root CA cert. store versus the Windows one. Anything amiss there will cause Eset to throw these types of cert. alerts.

 

Certificate #1: RSA 2048 bits (SHA256withRSA)

icon-certificate.png

Server Key and Certificate #1
 

Subject

*.vortex.data.microsoft.com
Fingerprint SHA1: 99b532a23e6f1ddd57cf25a2f80b527262a86c21
Pin SHA256: MDX8rQO5/mtWO5SRNvCK84RD5H+11KQdU4i4eKtVkwY=

Common names

*.vortex.data.microsoft.com

Alternative names

vortex.data.microsoft.com *.vortex.data.microsoft.com

Valid from

Wed, 27 May 2015 20:09:42 UTC

Valid until

Fri, 26 May 2017 20:09:42 UTC (expires in 5 months and 18 days)

Key

RSA 2048 bits (e 65537)

Weak key (Debian)

No

Issuer

Microsoft IT SSL SHA2
AIA: hxxp://www.microsoft.com/pki/mscorp/msitwww2.crt

Signature algorithm

SHA256withRSA

Extended Validation

No

Certificate Transparency

No

OCSP Must Staple

No

Revocation information

CRL, OCSP
CRL: hxxp://mscrl.microsoft.com/pki/mscorp/crl/msitwww2.crl
CRL: hxxp://crl.microsoft.com/pki/mscorp/crl/msitwww2.crl
OCSP: hxxp://ocsp.msocsp.com

Revocation status

Good (not revoked) 

Trusted

Yes



icon-certificates.png

Additional Certificates (if supplied)
 

Certificates provided

2 (3374 bytes)

Chain issues

None

#2

Subject

Microsoft IT SSL SHA2
Fingerprint SHA1: 97eff3028677894bdd4f9ac53f789bee5df4ad86
Pin SHA256: CzdPous1hY3sIkO55pUH7vklXyIHVZAl/UnprSQvpEI=

Valid until

Mon, 07 May 2018 17:03:30 UTC (expires in 1 year and 4 months)

Key

RSA 4096 bits (e 65537)

Issuer

Baltimore CyberTrust Root

Signature algorithm

SHA256withRSA



icon-chain.png

 

collapse.png

expand.png Certification Paths

Path #1: Trusted
 

1

Sent by server

*.vortex.data.microsoft.com
Fingerprint SHA1: 99b532a23e6f1ddd57cf25a2f80b527262a86c21
Pin SHA256: MDX8rQO5/mtWO5SRNvCK84RD5H+11KQdU4i4eKtVkwY=

RSA 2048 bits (e 65537) / SHA256withRSA 

2

Sent by server

Microsoft IT SSL SHA2
Fingerprint SHA1: 97eff3028677894bdd4f9ac53f789bee5df4ad86
Pin SHA256: CzdPous1hY3sIkO55pUH7vklXyIHVZAl/UnprSQvpEI=

RSA 4096 bits (e 65537) / SHA256withRSA 

3

In trust store

Baltimore CyberTrust Root   Self-signed
Fingerprint SHA1: d4de20d05e66fc53fe1a50882c78db2852cae474
Pin SHA256: Y9mvm0exBk1JoQ57f9Vm28jKo5lFm/woKcVxrYxu80o=

RSA 2048 bits (e 65537) / SHA1withRSA
Weak or insecure signature, but no impact on root certificate

Edited by itman
Link to comment
Share on other sites

Thank you for your attention. 

 

Excuse me, English is not my native language.

 

I didn't quite understand his answer.

Edited by Hijin25
Link to comment
Share on other sites

Here's what I wrote translated to Spanish per Google Translate:

 

Cert del Web site. Aceptar por QUALS SSL Server test; vea abajo. También el servidor utilizado tiene la calificación "A", la clasificación más alta.

Sospecha que se trata de un problema de Chrome. Chrome utiliza su propio certificado CA raíz interno. almacenar. Sospechar algo mal con la forma en que tienen los certs. En la ruta de validación fijada.

En cuanto a Eset ver. 8 va, usted no tendría un problema allí si la exploración del protocolo SSL está deshabilitada; Es por defecto. Aparece Kaspersky también está haciendo escaneo de protocolo SSL, de ahí el problema. En cuanto a otros AVs, muchos no hacen escaneo de protocolo SSL; Por lo tanto ningún problema con ellos. Cuando un producto realiza el escaneo de protocolo SSL, es responsable de realizar cert. Cadena de validación. Tanto FireFox como Chrome utilizan su propio certificado CA raíz. Tienda frente a Windows. Cualquier cosa que no esté bien hará que Eset lance estos tipos de cert. Alertas

Link to comment
Share on other sites

I did the test on another PC with Windows 10, and it's the same problem, jump alerts on the same sites.

Both on Google and on internet explorer

Link to comment
Share on other sites

What is needed is the actual URL you are connecting to when you receive these alerts. Neither of the URLs shown in your alerts can be accessed directly.

Link to comment
Share on other sites

Thanks again for your attention.

 

The first thing that appeared to me this message was when entering these addresses:

 

 


 


 

 

It was supposed to be the information of a windows update.

 

Subsequently I left sporadically when doing searches in bing.

 

This one just appeared to me when entering the microsoft help forum.

 

post-8641-0-30875900-1481251602_thumb.jpg

 

And this when entering the page

 


 

post-8641-0-70174100-1481251615_thumb.jpg

 

 

In the images it says eset is the test version, because it is the one installed to confirm if you pass the same thing on my pc with windows 7, where I have my licensed version paid.
Edited by Hijin25
Link to comment
Share on other sites

I can access all the links you posted in IE11 running on Win 10 w/o any cert. alerts appearing.

 

Only thing I can think of is there has been an update to Chrome recently and Eset's SSL protocol scanning cert. processing is no longer compatible with it. So I will let Eset take it from here.

 

Your current options are live with the alerts; disable SSL protocol scanning for Chrome which will eliminate the alerts but decrease your security level on HTTPS web sites; or use IE.

Link to comment
Share on other sites

Thanks for your help, although as I commented, it also happens to me with IE. I hope Eset tells me at least why the alert says "detected a week ago" and I only started to appear on Monday.

Link to comment
Share on other sites

The "light just came on in my head" so to speak.

 

Below is a screen shot of an URL from the screen shot you posted: https://answers.microsoft.com/es-es/windows . Note the following:

 

1. Eset has whitelisted this site from SSL protocol scanning.

2. This conclusion made based on the fact that the root CA certificate shown is Baltimore Trust; not Eset's root CA certificate.

 

In other words, Eset would not be doing SSL scanning on this web site under normal circumstances.

 

Appears to me that you are a victim of some type of man-in-the-middle activity that is occurring somewhere on the external network you are using. That is what Eset and also Kaspersky are detecting. This also explains why you receiving alerts on both Chrome and IE.

 

-EDIT- It is also possible and more likely something installed a local host proxy server on your PC and is intercepting HTTPS traffic using their own root CA certificate.

 

post-6784-0-60001400-1481322819_thumb.png

Edited by itman
Link to comment
Share on other sites

Thanks for your help, in fact, seems to be my network problem, I tried with that of a family member who has a different provider and alert messages do not appear.

Link to comment
Share on other sites

One commonality in your issue is all the MS web sites where you are receiving alerts on use the below certificate chaining path:

 

post-6784-0-07855500-1481380697_thumb.png

 

Since you are receiving the same alerts from multiple browsers and AV products, it points to the strong possibility of some type of Windows certificate store corruption.

 

Using certmgr.msc, you need to verify that:

 

1. The Digicert Baltimore Root certificate exists in the Root CA certificate store. The cert. thumbprint should being with "d4 de 20 5e 66 fc 53 .............."

2. The Microsoft IT SSL SHA2 exist in the Intermediate CA certificate store. The cert. thumbprint should begin with "97 ef f3 02 86 77 89 .................... "

 

Next open both IE and Chrome and verify that the above two certificates are shown in the browser as noted above. That is the Digicert Baltimore Root certificate exists in the browser Root CA certificate store and the Microsoft IT SSL SHA2 exists in the browser Intermediate CA certificate store.

 

Note that Chrome's issues with certificates are notorious. There is a current issue with Symantec certificates noted here: hxxp://www.pcworld.com/article/3146718/security/chrome-bug-triggered-errors-on-websites-using-symantec-ssl-certificates.html . There also have been past Chrome issues with reissued SHA2 certificates which it appears Microsoft did with their intermediate certificate as noted here: https://sslmate.com/blog/post/chrome_cached_sha1_chains . However, these issues don't address the fact that you are getting the same alerts in IE. Hence, the strong suspicion that there is an issue with your Windows CA certificate stores.

Edited by itman
Link to comment
Share on other sites

Thanks for your help, in fact, seems to be my network problem, I tried with that of a family member who has a different provider and alert messages do not appear.

Did you connect your PC to the family member's Internet connection when you performed this test?

Link to comment
Share on other sites

In effect, I connect to my network and as soon as I open any Microsoft page, either MSN or Hotmail, alert messages are displayed. If I connect to my sister's network, I can open the same pages without any problem.

Link to comment
Share on other sites

In effect, I connect to my network and as soon as I open any Microsoft page, either MSN or Hotmail, alert messages are displayed. If I connect to my sister's network, I can open the same pages without any problem.

The likelihood of an external man-in-the-middle on your ISP network is low. It can happen but it isn't likely. I would say that your router/modem is probably infected with some type of hijacking malware.

Link to comment
Share on other sites

thanks for your help. For the moment I will switch from internet provider. But as for what he mentions of malware in the modem, why it only affected specific pages and not all browsing?

Link to comment
Share on other sites

But as for what he mentions of malware in the modem, why it only affected specific pages and not all browsing?

 

It probably is affecting more than just the Microsoft web sites. You became aware of the issue because those are HTTPS web sites and Eset's SSL protocol scanning alerted to a cert. issue. If HTTP web sites are being hijacked at the router, you might not be able to detect it.

 

Best way to test this issue is to temporarily swap your router with another and see if the Microsoft web sites alerts disappear. I would also strongly advise not using your PC for financial activity until this issue is resolved. 

 

-EDIT- Here is software that will test for the presence of an external man-in-the-middle: hxxp://www.ghacks.net/2015/08/06/ssl-eye-check-if-you-are-the-victim-of-a-man-in-the-middle-attack/ . Note: When I tried to use this a while back, Eset flagged the Singapore server used as a threat and wouldn't allow the software to run. You might have better luck with it.

Edited by itman
Link to comment
Share on other sites

Thanks again.

At the moment I will not be able to try another model of my provider since I have changed companies.

 

But in case that with my new proovedor this behavior does not appear, does it mean that I am safe?

 

What problem was in the router or network of my old proovedor in not in my PC?

 

Since I have run antivirus, malwarebytes and other disinfection tools and have come out clean.

 

Try to use the tool that recommends me, but I do not find download link on the descriptive page of it.

Link to comment
Share on other sites

You can download SSL Eye here: https://www.digi77.com/ssl-eye-prism-protection/

 

If the previous behavior does not appear with your new ISP provider, I would say it is safe to assume the old provider was the issue. If the behavior persists, I would say the issue is your router is infected. You asked how can that happen? Did you assign a strong password to your router's admin logon page? Many routers have no password assigned or use the default one of "Admin."

 

The fact that the behavior did not manifest when using your sister's network is a strong indicator that this activity was not originating from your PC.

Edited by itman
Link to comment
Share on other sites

My router was ARRIS, I do not know the specific model.

 

As for the password to access it, I have always changed the one that comes by default, I also change the name and password of the wifi network. I also use DNS of opnenDNS or Norton, I keep my antivirus updated and I do periodic security exams with several tools, so it is a true mystery to me that could have happened.

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...