Jump to content

Protocol scaning and Certificate trust exceptions

Recommended Posts


ESET protocol scanning replaces server certificate with it's own.
Depending if server certificate is trusted or not, it uses it's own trusted or not trusted certificate.
When Certificate's TA is added to computer Trusted Root Certification Autorities (see image), many programs on computer consider this certificate signed bu trusted party.
I suspect some ESET versions (endpoint Antivirus 7.3.2041) are not seeing these certificate as signed by trusted authority? (see image)



Link to comment
Share on other sites

  • Administrators

Check if you have the ESET root certificate in the Tunderbird's trusted root CA certificate store.


If not, export the root certificate and import it manually.


Link to comment
Share on other sites

Thank you, definitely useful information in some cases (like portable Thunderbird etc).
In my case this certificate was already there.

I got to look at ESET certificate and it has "The original certificate provided by the web server is untrusted" in issuer data.
Then i used openssl to check original certificate of email server.
Turns out, there was just regular self signed certificate. My mistake.
Sorry for bothering, ESET works as expected

Link to comment
Share on other sites

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Create New...