troglodyte wrote:
<Hey, you said "Insert User Name Here" so I picked one.>
> Avast doesn't like Comcast's SSL/TLS Certificate and so replaces it
> with it's own.
You have enabled Avast's HTTP scanning feature. That interrogates your
secure web traffic (like it does with insecure web traffic). A MITM
(man-in-the-middle) attack method is needed to look inside encrypted
traffic. So Avast's installer adds Avast's certificate to your local
certificate store. Avast's proxy intercepts your web traffic. For
HTTPS, to your client Avast's proxy pretends it is the target site and
to the target site it pretends it is your client. Encrypted traffic can
only be decrypted at the endpoints of the secure connection. So Avast
sits in the middle between client and target site by creating an
endpoint to allow decryption. If Avast's cert is not in the local cert
store then you won't be able to reach HTTPS sites (unless you disable
Avast's HTTP scanning feature).
Avast is not replacing Comcast's or any other site's certificate. Avast
still has to use the site's cert to re-encrypt the intercepted web
traffic to make a secure connection to the target HTTPS site.
Read up on HTTPS. Then research how MITM attacks using locally
installed certs are used to intercept and reveal otherwise secure
traffic. This is also done at companies on their workstations. Their
sysprep image they put on their workstations includes the company's own
cert. They can then use their own proxy to intercept traffic on your
workstation so they can see what is inside. Their property, their
resources, and you're supposed to be working at work plus they need to
protect their assets from deliberate or accidental disclosure.
> OE plays very nice with it, Thunderbird asks if it's OK to replace it
> and Eudora yacks up a bone on it. I keep getting messages to OK it,
> but even after clicking 'yes', it chokes before it ever downloads a
> single email. I do not know what it is about the Comcast certificate
> that Avast doesn't like, but then, I really don't know much about
> certificates.
No, the client knows the domain to which it intended to connect. That
will NOT match the domain in Avast's local certificate. So the client
SHOULD warn you that the endpoint your client reached is not the one
specified by the client. OE doesn't burp because it probably doesn't
have any code to alert users when a server connection is not to the
specified domain. It will burp when an encrypted e-mail (which is NOT
the same as a secure connection) has been corrupted (it's hash doesn't
match the public key used in the encryption). Thunderbird notices the
domain for the server to which it intended to connect is not the domain
in the cert it got back from Avast's proxy.
> Avast has a button to save a certificate file to import into Eudora or
> whatever (a copy of the one Eudora already doesn't like).
All that means is Eudora has its own internal cert store to add more
certs than what are already available in the OS cert store. If you want
to see the cert store in Windows, run:
certmgr.exe
You'll find Avast's cert under the "Trusted Root Certificates ->
Certificates" node in the tree. Eudora should be able to use certs in
the OS cert store. Maybe that client is deficient and can't use the
local cert store which means you have to add it to Eudora's cert store.
> Is there a place to download such a file from Comcast that I might try
> to force in Eudora?
I don't know that Avast provides a separate .cer file to allow
independent installation of their certificate into the local cert store
for the OS or to an app (e.g., Eudora). Avast's installer should take
care of installing Avast's cert in the local store but it obviously
won't go around to each app to find out if that app has its own cert
store to add Avast's cert there.
If you don't see Avast's cert were mentioned in the Certificate Manager
applet then reinstall Avast to see if the installer succeeds on the next
install. If you do see Avast's cert in the local store then there is
something defective or deficient in Eudora that it cannot use the local
cert store.
https://blog.avast.com/tag/security-certificate/
You can always disable the HTTPS scanning feature in Avast. It will
slow down retrieving the content of a secure web page along with all the
external resources (links) to other secure content. Having to decrypt
web traffic, interrogate the traffic, and re-encrypt that traffic to
pass it along takes time and that incurs lag. Whether you see the lag
depends on how fast is your hardware, what software you add that will
slow your OS, client, or network, and how many secured sources have to
be intercepted that are referenced in a web page. The moment I
installed the major version of Avast that introduced their HTTPS
scanning feature was when I noticed there was a lag in responsiveness in
getting web pages to paint. Took me awhile to realize it was just the
HTTPS web pages that got slowed and then I discovered the addition of
the new HTTP scanning feature. Disabled it and all web pages, including
HTTPS ones, popped immediately on the screen in the web browser.
Until Avast improves their HTTPS scan engine (make it faster, make it
work in parallel with multiple HTTPS sources in a web page, or whatever
it takes), I will leave disabled their HTTPS scanning feature. Besides
the slowdown, and as you have experienced, the MITM attach to intercept
and interrogate HTTPS traffic can cause problems in some software.
The folks in Avast's own forums might know where you can get a .cer file
with Avast's certificate inside; else, you could contact Avast support
to ask for a .cer file so you can import it into some app's private cert
store, like Eudora, because it won't use the local cert store in the OS.