Jump to content

HTTPS Pixel-serv Adblocking Browser Cert Triggers Eset on Every Ad


tzuzut

Recommended Posts

I am using the cutting edge pixelserv-tls to block ads, it runs on the router, and serves a pixel in place of ads served over http & https. I have imported the cert both into windows and firefox browser, Eset sees each CA cert "issued" as unique, on every website, for every unique ad... thus eset warns me sometimes 5-10 times on a single website, and on every website that has ads I must allow each one individually.
981981585_ESETTLSCustomizationbug.thumb.png.371650dac03686ab00ce8dd3dc9caec6.png

The problem is that ESET does not whitelist all issuance by a single CA, or allow users to custom define the certificate name and subject, as seen below; These options are greyed out when defining a new custom rule as well. If we could add strictly a wildcard * to certificate name and subject, then ALL pixelserv certs would be accepted; but we're forced to allow them one at a time on every single ad, on every single website that has ads. The only solution I can see is disabling SSL protocol filtering, which means no realtime antivirus scanning within web-browsers, or automatically blocking all communication that uses any so called 'invalid' certificate. This reduces functionality, and may decrease browsing performance, as importing the certs is supposed to speed up the blocking process.

If there is no other solution, please add the appropriate functionality to whitelist certificates.

1445604511_Eset2.png.4336b963d8c168423cff7b98ffda2935.png

 

Edited by tzuzut
fixing it up
Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...