Jump to content

Protocol scaning and Certificate trust exceptions


Andrey_Petrov
 Share

Recommended Posts

Hello

ESET protocol scanning replaces server certificate with it's own.
Depending if server certificate is trusted or not, it uses it's own trusted or not trusted certificate.
When Certificate's TA is added to computer Trusted Root Certification Autorities (see image), many programs on computer consider this certificate signed bu trusted party.
I suspect some ESET versions (endpoint Antivirus 7.3.2041) are not seeing these certificate as signed by trusted authority? (see image)

ESET_certificate_problem.png

TrustedCertificates.png

Link to comment
Share on other sites

  • Administrators

Check if you have the ESET root certificate in the Tunderbird's trusted root CA certificate store.

image.png

If not, export the root certificate and import it manually.

image.png

Link to comment
Share on other sites

Thank you, definitely useful information in some cases (like portable Thunderbird etc).
In my case this certificate was already there.

I got to look at ESET certificate and it has "The original certificate provided by the web server is untrusted" in issuer data.
Then i used openssl to check original certificate of email server.
Turns out, there was just regular self signed certificate. My mistake.
Sorry for bothering, ESET works as expected

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...