Author Topic: Is the Bitdefender TrafficLight connection doing a MitM?  (Read 1318 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34054
  • malware fighter
Is the Bitdefender TrafficLight connection doing a MitM?
« on: March 31, 2017, 07:44:48 PM »
Insecure Renegotiation  :o The server's certificate is untrusted.Non-compliant with PCI DSS requirements
The server supports a client-initiated secure renegotiation that may be unsafe and allow Denial of Service attacks.Misconfiguration or weakness


Re: https://urlscan.io/result/c703243d-6812-47d5-ad8c-580817327a3f#summary
See: http://toolbar.netcraft.com/site_report?url=ec2-35-157-249-166.eu-central-1.compute.amazonaws.com
Certificate is not installed correctly
-ec2-35-157-249-166.eu-central-1.compute.amazonaws.com
You have 1 error
Wrong certificate installed.
The domain name does not match the certificate common name or SAN. ->
Common name:  nimbus.bitdefender.net
 Enabled
Downgrade attack prevention:
 Enabled
Next Protocol Negotiation:
 Not Enabled
Session resumption (caching):
 Enabled
Session resumption (tickets):
 Not Enabled
Strict Transport Security (HSTS):
 Not Enabled
SSL/TLS compression:
 Not Enabled
Heartbeat (extension):
 Not Enabled
RC4:
 Not Enabled
OCSP stapling:
 Not Enabled

F-I-F-F-X-status: https://observatory.mozilla.org/analyze.html?host=ec2-35-157-249-166.eu-central-1.compute.amazonaws.com

polonus (volunteer website security analyst and website error-hunter)
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!