Jump to content

SSL certificate authority issue (Firefox or ESET's issues or both?)


cmit

Recommended Posts

Why three certificate postings? There should only be one Eset certificate in the Trusted Root Certification Authorities folder. Also why is the last certificate shown with a valid from date of today? Did you reinstall Eset on the device today?

Edited by itman
Link to comment
Share on other sites

2 hours ago, itman said:

Why three certificate postings? There should only be one Eset certificate in the Trusted Root Certification Authorities folder. Also why is the last certificate shown with a valid from date of today? Did you reinstall Eset on the device today? 

for three testing computers.
Don't know why the date valid from date of today. Did not reinstall ESET.

Link to comment
Share on other sites

In IE11 and for the Eset forum web site, click on the lock symbol on the IE11 toolbar. Does it state Eset SSL Filter CA for Website Identification?

Likewise, go https://badssl.com/dashboard/ and do the same and verify Eset SSL Filter CA is also shown.

Also for both these sites, verify that the web site certificate chains to the Eset SSL Filter CA certificate:

Eset_Cert.png.5ffc06b8ba162f8843168ed723770340.png

-EDIT- Additionally for both web sites, verify that the thumbprint for the Eset SSL Filter CA chained root certificate matches the thumbprint for the corresponding Eset SSL Filter CA certificate stored in the Windows Trusted Root Certification Authorities folder:

Eset_Thumbprint.thumb.png.c2ce8bc7a738a4719db341c0febefab1.png

Edited by itman
Link to comment
Share on other sites

If "you're following my drift" in the previous posting, it's starting to appear to me that some type of man-in-the-middle activity is occurring for your Internet connections. It is the only explaination I can think of for the Eset non-alert status when accessing the https://badssl.com/dashboard/ web site.

Edited by itman
Link to comment
Share on other sites

On 5/12/2019 at 5:49 AM, itman said:

In IE11 and for the Eset forum web site, click on the lock symbol on the IE11 toolbar. Does it state Eset SSL Filter CA for Website Identification?

Likewise, go https://badssl.com/dashboard/ and do the same and verify Eset SSL Filter CA is also shown.

Also for both these sites, verify that the web site certificate chains to the Eset SSL Filter CA certificate:

Eset_Cert.png.5ffc06b8ba162f8843168ed723770340.png

-EDIT- Additionally for both web sites, verify that the thumbprint for the Eset SSL Filter CA chained root certificate matches the thumbprint for the corresponding Eset SSL Filter CA certificate stored in the Windows Trusted Root Certification Authorities folder:

Eset_Thumbprint.thumb.png.c2ce8bc7a738a4719db341c0febefab1.png

 

Both the ESET forum and the badssl.com/dashboard websites state ESET SSL Filter CA on all three tested computers
but two of three tested computers' IE's ESET SSL Filter CA's thumbprint do not match the ESET SSL Filter CA in the certmgr.msc's Windows Trusted Root Certification Authorities folder.

What does this mean? How is this related to the issues we are having?

All certificates are valid (not expired).
Every time there's newer version of ESET EndPoint AntiVirus released, we trigger update from ESMC. Would this be the cause of some thumbprint not matched?

image.png.2df1392517ecec8ebc71852a43908aeb.png

 

I need at least two people from ESET to comment on the issues I'm having.
@Marcos @MichalJ

image.png

image.png

image.png

Link to comment
Share on other sites

On 5/12/2019 at 1:21 PM, itman said:

If "you're following my drift" in the previous posting, it's starting to appear to me that some type of man-in-the-middle activity is occurring for your Internet connections. It is the only explaination I can think of for the Eset non-alert status when accessing the https://badssl.com/dashboard/ web site.

@itman Could you give example of the man-in-the-middle activity on our Internet connections?
Do you mean could be related to our ESMC setup, our domain controller policies, or from possible external threat activities?

I am still waiting for @Marcos or someone else from ESET to explain why you and I both have the
badssl.com result (ESET non-alert status) instead of ESET's alert.

Link to comment
Share on other sites

1 hour ago, cmit said:

I am still waiting for @Marcos or someone else from ESET to explain why you and I both have the badssl.com result (ESET non-alert status) instead of ESET's alert.

To begin with, I am having no issues in regards to the badssl.com web site test using either IE11 or Firefox. My test results are identical to those previously posted by @Marcos; initially a red popup Eset alert is displayed about a revoked certificate and thereafter,  a yellow untrusted certificate popup alert for each badssl.com test performed. 

Edited by itman
Link to comment
Share on other sites

1 hour ago, cmit said:

Both the ESET forum and the badssl.com/dashboard websites state ESET SSL Filter CA on all three tested computers
but two of three tested computers' IE's ESET SSL Filter CA's thumbprint do not match the ESET SSL Filter CA in the certmgr.msc's Windows Trusted Root Certification Authorities folder.

What does this mean? How is this related to the issues we are having?

All certificates are valid (not expired).
Every time there's newer version of ESET EndPoint AntiVirus released, we trigger update from ESMC. Would this be the cause of some thumbprint not matched?

Do this:

1. Navigate to IE11's Tools option.

2. Open Internet options.

3, Click on Content tab. Click on Clear SSL slate. When the popup message appears that SSL slate has been cleared, click on OK for that popup. Close IE11.

The above forces IE11 to repopulate its SSL cache with current certificates from all Windows CA stores sources. Reopen IE11 and perform the badssl.com test again reverifying that the web site's Eset root certificate matches the thumbprint in the Windows root CA certificate store.

Eset's updates via ESMC should not have any bearing on replacement of Eset's root certificate in the endpoint's Windows root CA certificate store; at least it doesn't for EIS. My Eset root certificate dates back to my last full install of EIS ver. 12. 

Link to comment
Share on other sites

23 minutes ago, itman said:

To begin with, I am having no issues in regards to the badssl.com web site test using either IE11 or Firefox. My test results are identical to those previously posted by @Marcos; initially a red popup Eset alert is displayed about a revoked certificate and thereafter,  a yellow untrusted certificate popup alert for each badssl.com test performed. 

this is the opposite from what you mentioned before:
image.png.4be888f96466f42a05a7b53a7b248a3d.png

Link to comment
Share on other sites

9 minutes ago, itman said:

Do this:

1. Navigate to IE11's Tools option.

2. Open Internet options.

3, Click on Content tab. Click on Clear SSL slate. When the popup message appears that SSL slate has been cleared, click on OK for that popup. Close IE11.

The above forces IE11 to repopulate its SSL cache with current certificates from all Windows CA stores sources. Reopen IE11 and perform the badssl.com test again reverifying that the web site's Eset root certificate matches the thumbprint in the Windows root CA certificate store.

Eset's updates via ESMC should not have any bearing on replacement of Eset's root certificate in the endpoint's Windows root CA certificate store; at least it doesn't for EIS. My Eset root certificate dates back to my last full install of EIS ver. 12. 

how is your IE11 verification procedure on ESET SSL certificate related to the issues I have been talking about since all ESET certificates are valid (not expired)?

Link to comment
Share on other sites

1 minute ago, cmit said:

this is the opposite from what you mentioned before

You misinterpreted the statement. What I stated was the only test I failed was the SHA-1 test when Eset SSL protocol scanning was enabled.

Link to comment
Share on other sites

6 minutes ago, cmit said:

how is your IE11 verification procedure on ESET SSL certificate related to the issues I have been talking about since all ESET certificates are valid (not expired)?

The issue is to verify that no man-in-the-middle activity is occurring. Again when you perform the badsll.com test, you should be receiving multiple Eset alerts which are not occurring from any browser you test with.

BTW - you do have Eset SSL Protocol scanning enabled on all test endpoint devices?

Edited by itman
Link to comment
Share on other sites

There is another possibility in regards to your Eset installations.

Reviewing again your posted badssl.com test results, it appears the connections were actually blocked. So the real issue is why you're not receiving any Eset alerts? In the List of SSL/TLS filtered applications section of the Eset GUI are all your browsers set to "Auto?"

Link to comment
Share on other sites

Refer to the below screen shot. Is the noted option set to "Ask ……….?" I believe if that is set to block, Eset will just block the activity and you will not receive any alerts on the activity:

 

Eset_Ask.thumb.png.b67663a95ae049accadd0996fd654c59.png

 

Link to comment
Share on other sites

5 minutes ago, itman said:

Refer to the below screen shot. Is the noted option set to "Ask ……….?" I believe if that is set to block, Eset will just block the activity and you will not receive any alerts on the activity:

 

Eset_Ask.thumb.png.b67663a95ae049accadd0996fd654c59.png

 

16 minutes ago, itman said:

There is another possibility in regards to your Eset installations.

Reviewing again your posted badssl.com test results, it appears the connections were actually blocked. So the real issue is why you're not receiving any Eset alerts? In the List of SSL/TLS filtered applications section of the Eset GUI are all your browsers set to "Auto?"

 

Screenshot below my setting should answer your question.

image.thumb.png.29e86ee57c27348324fb53e5f438297c.png

 

Our "Display alerts" and "Display notifications on desktop" is set to disabled. Is this the reason we didn't get that red and yellow alert? Some of our computer's Firefox do display the yellow untrusted alert within the browser (not the ESET popup) though. Some of our staff freak out when seeing popup from antivirus program.

image.png.d22ecb72c335025cc68fc75a1d673924.png

Edited by cmit
Link to comment
Share on other sites

4 minutes ago, cmit said:

Our "Display alerts" and "Display notifications on desktop" is set to disabled. Is this the reason we didn't get that red and yellow alert?

I would say that is the answer we have been looking for. So we can "bury" that issue from discussion.

Link to comment
Share on other sites

28 minutes ago, itman said:

I would say that is the answer we have been looking for. So we can "bury" that issue from discussion.

@itman this is not the 100% answer you have been looking for because it is only the popup notification disabled but the Firefox itself the first time did show the yellow untrusted alert that shows the option to accept and continue for users' Firefox but not all.

thanks but the people from ESET still do not have any answer to my original question (my first two posts) why we had to delete the ESET certificate from Firefox's Certificate Manager -> restart computer for every user of the same computer in order to have an option to "accept and continue" or be able to just able to view websites right away?

This is getting more confusing is the issue from ESET, from Firefox, or from both, or simply our own ESET policy setting?
From other threads other people have posted on ESET Forum, i don't think we are the only ESET customer having this inconvenient issue.

 

image.png.b6dc48cba4aa770ebc51ddc819688f6b.png

Edited by cmit
Link to comment
Share on other sites

On a device that FireFox displays the "Secure Connection failed" message, open up FireFox's Authorities CA store and verify that Eset's certificate setting for "This certificate can identify websites" is enabled as shown in the below screen shot:

Eset_Firefox.thumb.png.2e46f9f5b45d729203566e7bb179c7ac.png

 

Link to comment
Share on other sites

13 minutes ago, itman said:

On a device that FireFox displays the "Secure Connection failed" message, open up FireFox's Authorities CA store and verify that Eset's certificate setting for "This certificate can identify websites" is enabled as shown in the below screen shot:

Eset_Firefox.thumb.png.2e46f9f5b45d729203566e7bb179c7ac.png

 

 

My screenshot below, it is already enabled when I verified.

image.png.40a088cc77728638fecffe7d9383d610.png

Link to comment
Share on other sites

What we really need to know for sure at this point, is what certificate FireFox is triggering the "Secure Connection failed" message on.

Click on the FireFox lock symbol and from there you can extract info on both the web site cert. and what it is chained to. Note this is shown in a single display screen versus how IE11 graphically shows the chaining path.

Eset_Firefox.thumb.png.90c0c5625e3fb91c5a888779884d2020.png

Edited by itman
Link to comment
Share on other sites

Also, Firefox doesn't store the Win root CA store certificate thumbprint like IE11. As far as matching what stored in FireFox in regards to Eset's Authorities certificate, Subject Key Identifier is probably the best match: Eset_Sub_Key.thumb.png.48107e0c2f11d10c35705215fa279f96.png

Edited by itman
Link to comment
Share on other sites

@itman thanks a lot for your help but this is still going nowhere.

People from ESET still do not have a proper solution nor willing to have an explanation about this.
I'm definitely not the only ESET customer having this issue.

This suggested temp solution probably should not be posted if it's not recommended to disable the SSL protocol scanning.
(Re-enabling the SSL/TLS rotocol filtering or re-enabling the 'add the root certificate to known browsers did not resolve the issue for all ESET cusotmers)
https://support.eset.com/kb3126/?locale=en_US&viewlocale=en_US
image.png.fd0a48e167363604b90a2bf806d6b407.png

At this point I'm still not 100% sure if this is totally ESET's issue or the web browsers themselves.
(I don't believe it's all ESET's issues)
Thanks to the people from ESET (who are supposed to be responsible for responding) for not able to at least try to explain nor break down this type of issue that's been going on for years.

 

https://stackoverflow.com/questions/36309562/err-bad-ssl-client-auth-cert
image.png.c07e970d52284324d21a933861af0537.png

image.png.aed23ea4379e3587b401e7d6f8f2197d.png

https://answers.microsoft.com/en-us/windows/forum/windows_10-networking/i-get-error-message-errbadsslclientauthcert-while/fd1cabfe-1778-42a9-8fc1-ab2dd02b6db4?page=2
image.thumb.png.002ea6c4002fc32a556e8995f2c0ff50.png

image.png

Link to comment
Share on other sites

 Here's a Sophos posting where the OP was having SSL protocol scanning issues in an AD environment: https://community.sophos.com/products/unified-threat-management/f/web-protection-web-filtering-application-visibility-control/47035/certificate-warning-with-https-set-to-url-filtering-only#pi2353=1 . Since I am not knowledgeable when it comes to AD usage, what I gleaned from the postings was the issue had something to do with option to use AD certificates versus client certs. on Internet traffic.

What is needed here is someone using EES in an AD environment to "chime in" here.

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...