Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Home Network Design

    Scheduled Pinned Locked Moved General pfSense Questions
    68 Posts 6 Posters 20.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      JT40 @bPsdTZpW
      last edited by

      @bpsdtzpw It's possible that Kaspersky is doing something with it, but normally the cert should not be changed...

      In any case, on the EMEA website there are all the product informations, but not on the international version, probably US.
      https://eu.dlink.com/uk/en

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @JT40
        last edited by

        @jt40 said in Home Network Design:

        Am i good to use such PoE convertor? 802.3af PoE Injector (48v)

        Are you not just buying their injector?
        https://store.ui.com/collections/unifi-accessories-poe-injectors/products/u-poe-af

        But yeah if its an af injector you should be good. Make sure it supports gig.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        J 1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          As long as you don't have one of their older models that uses non-standard 24V PoE. Like I do. 😉
          Those were all supplied with injectors though AFAIK.

          Steve

          J 1 Reply Last reply Reply Quote 0
          • J
            JT40 @johnpoz
            last edited by

            @johnpoz Good point, I totally ignored it :D .
            I struggled to find it on the official website, anyway it's all out of stock.
            I found it on another store, the only difference seems to be a label (UPOE instead of only AF), I didn't spot anything else, it's probably original :D

            I think I need to use iperf from the phone to test it, I don't have 1 Gbit or so.
            Thanks a lot for the heads up.

            1 Reply Last reply Reply Quote 0
            • J
              JT40 @stephenw10
              last edited by

              @stephenw10 I bought the latest AP model, if that's what you are referring to.
              Regarding the parts, I don't have a way to check it now, I don't know if my AP was produced in 2020 or 2018, so to say.

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                The AC-LR I have is pretty clearly labelled 24V and it's a few years old now. I doubt you have that.

                1 Reply Last reply Reply Quote 0
                • B
                  bPsdTZpW @JT40
                  last edited by

                  @jt40 said in Home Network Design:

                  @bpsdtzpw Serial number: 4200000210619acc88

                  This cert does not exist on https://crt.sh . The only hit that Google returns is this conversation. I suspect you're running Kaspersky and it's MITMing your https connections, thus giving this alternate certificate chain. What happens if you use the same browser to navigate to https://www.amazon.com , and look at the cert chain? It should be www.amazon.com -> DigiCert Global CA G2 -> DigiCert Global Root G2 . If there's Kaspersky in there, it's MITMing your connection.

                  J 1 Reply Last reply Reply Quote 0
                  • J
                    JT40 @bPsdTZpW
                    last edited by

                    @bpsdtzpw Yes, it's doing deep scanning of every connection, also HTTPS, but I didn't know that it behaves in this way for the certs...
                    I also have the Windows Certificate store in use from KS, it's weird that it performs such task.
                    On top of that, I don't know where I can disable such thing, it must be a built-in function between the HTTPS scanning or other network scanning options.

                    B 1 Reply Last reply Reply Quote 0
                    • B
                      bPsdTZpW @JT40
                      last edited by

                      @jt40 said in Home Network Design:

                      @bpsdtzpw Yes, it's doing deep scanning of every connection, also HTTPS, but I didn't know that it behaves in this way for the certs...
                      I also have the Windows Certificate store in use from KS, it's weird that it performs such task.

                      Yeah, that's how HTTPS scanning typically works, since the encryption is assumed to be (should be) unbreakable. So the scanner acts as a proxy between your browser (system, if the scanner installer put its root cert in your system root store -- shiver!) and the website. That is, your browser forms an HTTPS connection to the scanner, which allows the scanner to decrypt the traffic and scan it, then the scanner forms an HTTPS connection to the website.

                      The browser-to-scanner connection is thus encrypted with the key from a cert with a wildcard DNS name that matches every possible website. This leaf cert is then signed by a root cert for the scanner "CA". The scanner's installer installs that root cert in your browser's root store so that the browser recognizes the leaf cert as valid.

                      All this rigamarole means that you can no longer use the browser to determine what cert chain the website actually uses. You need |dig| or some other such tool for that.

                      On top of that, I don't know where I can disable such thing, it must be a built-in function between the HTTPS scanning or other network scanning options.

                      Your scanner should provide some UI to disable HTTPS scanning.

                      johnpozJ J 2 Replies Last reply Reply Quote 1
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator @bPsdTZpW
                        last edited by

                        @bpsdtzpw said in Home Network Design:

                        Your scanner should provide some UI to disable HTTPS scanning.

                        This! There is no possible way the benefit of whatever that software is doing that would be worth giving them access to all the encrypted stuff you might be doing - login to your bank accounts for starters..

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        B 1 Reply Last reply Reply Quote 0
                        • B
                          bPsdTZpW @johnpoz
                          last edited by bPsdTZpW

                          @johnpoz Ya. FWIW, Kaspersky is based in Russia, and is currently banned on U.S. government systems and those of U.S. government contractors and subcontractors. https://www.wsj.com/articles/u-s-government-formalizes-kaspersky-ban-11568194206 ; https://www.securityweek.com/kasperskys-us-government-ban-upheld-appeals-court . But any scanner (ha! any program!) with network access creates potential risks. There is no free lunch in this area.

                          1 Reply Last reply Reply Quote 0
                          • J
                            JT40 @bPsdTZpW
                            last edited by JT40

                            @johnpoz said in Home Network Design:

                            @bpsdtzpw said in Home Network Design:

                            Your scanner should provide some UI to disable HTTPS scanning.

                            This! There is no possible way the benefit of whatever that software is doing that would be worth giving them access to all the encrypted stuff you might be doing - login to your bank accounts for starters..

                            @bpsdtzpw said in Home Network Design:

                            @jt40 said in Home Network Design:

                            @bpsdtzpw Yes, it's doing deep scanning of every connection, also HTTPS, but I didn't know that it behaves in this way for the certs...
                            I also have the Windows Certificate store in use from KS, it's weird that it performs such task.

                            Yeah, that's how HTTPS scanning typically works, since the encryption is assumed to be (should be) unbreakable. So the scanner acts as a proxy between your browser (system, if the scanner installer put its root cert in your system root store -- shiver!) and the website. That is, your browser forms an HTTPS connection to the scanner, which allows the scanner to decrypt the traffic and scan it, then the scanner forms an HTTPS connection to the website.

                            The browser-to-scanner connection is thus encrypted with the key from a cert with a wildcard DNS name that matches every possible website. This leaf cert is then signed by a root cert for the scanner "CA". The scanner's installer installs that root cert in your browser's root store so that the browser recognizes the leaf cert as valid.

                            All this rigamarole means that you can no longer use the browser to determine what cert chain the website actually uses. You need |dig| or some other such tool for that.

                            On top of that, I don't know where I can disable such thing, it must be a built-in function between the HTTPS scanning or other network scanning options.

                            Your scanner should provide some UI to disable HTTPS scanning.

                            I don't think that it works in that way, the proxy acts as an third party entity that makes the request.
                            The scanning of encrypted communications doesn't work on the whole communication, it works on the header mainly, or only the header.
                            The content (body) of the communication it's encrypted end to end, there is no way a proxy or scanner can decrypt such data, it's alwasy the browser (endpoint) to manage the communication with the keys, the keys are not managed in anyhow from the AV, it would be a great zero day for a browser.

                            This is what I know about it, but I could investigate more with Wireshark...

                            @bpsdtzpw said in Home Network Design:

                            @johnpoz Ya. FWIW, Kaspersky is based in Russia, and is currently banned on U.S. government systems and those of U.S. government contractors and subcontractors. https://www.wsj.com/articles/u-s-government-formalizes-kaspersky-ban-11568194206 ; https://www.securityweek.com/kasperskys-us-government-ban-upheld-appeals-court . But any scanner (ha! any program!) with network access creates potential risks. There is no free lunch in this area.

                            The story in US is like the one with Huawei, shall I comment? :D
                            The problem with KS is that it was in use by sensitive government institutions, so there was an obvious fear which lead to the ban, aside that, it's only cosmetics I guess.

                            Last thing, no banking with Windows, are you joking guys? :D

                            stephenw10S johnpozJ B 3 Replies Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator @JT40
                              last edited by

                              @jt40 said in Home Network Design:

                              The scanning of encrypted communications doesn't work on the whole communication, it works on the header mainly, or only the header.
                              The content (body) of the communication it's encrypted end to end, there is no way a proxy or scanner can decrypt such data, it's alwasy the browser (endpoint) to manage the communication with the keys, the keys are not managed in anyhow from the AV, it would be a great zero day for a browser.

                              That's exactly what it does. It breaks the end to end encryption. It can see everything in the connection. If it couldn't it wouldn't be able to scan anything.

                              Steve

                              1 Reply Last reply Reply Quote 1
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator @JT40
                                last edited by

                                @jt40 said in Home Network Design:

                                no banking with Windows

                                I don't think anyone said that - what I said is I wouldn't run some software that does MITM on my https connections..

                                I bank on my windows machine and even my phone all the time - but what I don't run is some so called "security" software that breaks my end to end encryption to "protect me" ;)

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                1 Reply Last reply Reply Quote 1
                                • B
                                  bPsdTZpW @JT40
                                  last edited by bPsdTZpW

                                  @jt40 said in Home Network Design:

                                  I don't think that it works in that way, the proxy acts as an third party entity that makes the request.
                                  The scanning of encrypted communications doesn't work on the whole communication, it works on the header mainly, or only the header.
                                  The content (body) of the communication it's encrypted end to end, there is no way a proxy or scanner can decrypt such data, it's alwasy the browser (endpoint) to manage the communication with the keys, the keys are not managed in anyhow from the AV, it would be a great zero day for a browser.

                                  That is how deep inspection works. See, e.g., https://www.fortinetguru.com/2019/11/ssl-inspection-certificate-inspection-deep-inspection/ .

                                  When you use deep inspection, the FortiGate impersonates the recipient of the originating SSL session, then decrypts and inspects the content to find threats and block them. It then re-encrypts the content and sends it to the real recipient.
                                  

                                  It's possible to inspect only the (unencrypted) SSL handshake without MITMing the connection with a pseudo-CA cert, but the fact that your config returns a Kaspersky "CA" cert in the chain to the target website indicates that you're using deep inspection. My non-MITM config returns the chain dlinkmea.com -> cPanel, Inc. Certification Authority -> COMODO RSA Certification Authority , which is exactly the chain indicated by https://crt.sh/?id=5515086855 .

                                  This is what I know about it, but I could investigate more with Wireshark...

                                  Yep.

                                  You can also ask your browser to display the cert chain to dlinkmea.com . I think what you'll see is SAN (subject alt name) *.* -> Kaspersky intermediate CA -> Kaspersky root CA.

                                  1 Reply Last reply Reply Quote 0
                                  • J
                                    JT40
                                    last edited by

                                    Thank you all, that has been an interesting conversation.
                                    When I made the setup, I was probably not aware of it, or I wasn't concerned about it, as long as KS doesn't send these data somewhere, which I doubt, I'll still run an investigation though.
                                    For the moment, what I know is that the traffic is not enough to dump something on their servers, as well as the addresses that it reaches, they are meant for specific purposes and I guess that security measures are in constant review.
                                    On top of that, something like that would crack down the company forever, as a security company I'm pretty sure that no one is pushing thecode skipping the audit process in the build...

                                    johnpozJ 1 Reply Last reply Reply Quote 0
                                    • johnpozJ
                                      johnpoz LAYER 8 Global Moderator @JT40
                                      last edited by

                                      @jt40 I don't care who the maker of the software was - I would not be keen to anything doing mitm on my ssl conversations..

                                      Its not good idea from security/privacy point of view. And the benefits even if all on the up and up are going to be minimal at best for such a breach in your end to end encryption.

                                      Now I can see where it might want to be done from a company point of view - most likely more concerned with DLP.. But it is a whole can of worms that even companies are wary of opening.

                                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                                      If you get confused: Listen to the Music Play
                                      Please don't Chat/PM me for help, unless mod related
                                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                                      J 1 Reply Last reply Reply Quote 0
                                      • J
                                        JT40 @johnpoz
                                        last edited by

                                        @johnpoz Companies do it, also with other tools, like dedicated proxies etc...
                                        They go against the law in almost every country, the excuse of "the laptop is company asset and we monitor what we want" it's actually wrong, they could monitor only the communications of their business, but nothing private.
                                        Unfortunately, they monitor all in the same way, too much manual work to monitor only company resources, at least at that level.
                                        Otherwise, DNS/IP blocks etc are much easier.

                                        DLP is an interesting point, I think you mean from a network point of view considering the previous messages.
                                        Fact is, there is always the way to sneak out and no one is constantly monitoring you...
                                        It's much easier to protect the project at higher level, rather than looking each network packet, plus there is a tiny line between legal and illegal.
                                        What I noticed is that in the recent years, almost in every enterprise nothing is restricted in terms of online resources, you can access everywhere, no one cares of what you do, but I've seen these proxies...
                                        Obviously, they are scared about file system DLP :D , as soon as you plug in an USB device all the security department will know it :D , plus it won't allow you.

                                        johnpozJ 1 Reply Last reply Reply Quote 0
                                        • johnpozJ
                                          johnpoz LAYER 8 Global Moderator @JT40
                                          last edited by

                                          @jt40 I have ran content filtering and security for multiple companies over the years - I know exactly what they do an don't do ;) And how they do it and what they can do..

                                          And MITM is a can of worms that many will not open - that you take it upon yourself to do it - with a company that has had questions, and is banned in some countries on gov type computers..

                                          Filtering where a user can go is simple enough to do with explicit proxies having to be set without having to break the end to end encryption of the ssl connection. I don't have to peek inside your ssl connection to block you from going to xyz.com or allowing you to go to abc.com via https.

                                          Well you do you..

                                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                                          If you get confused: Listen to the Music Play
                                          Please don't Chat/PM me for help, unless mod related
                                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                                          1 Reply Last reply Reply Quote 1
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.