Author Topic: Beta  (Read 83994 times)

0 Members and 1 Guest are viewing this topic.

Offline tumic

  • Avast team
  • Advanced Poster
  • *
  • Posts: 723
Beta
« on: January 02, 2013, 04:33:17 PM »
As already mentioned here on the avast! forum, we have redesigned the handling
of TLS/SSL connections in the mail/web shield for the next program update. Under the
following link you can find a beta version of avast! for mac with this changes. It will
specially suit those people, who have problems with the current solution.

To use the beta version, simple uninstall the current version using the menu entry in
the avast! GUI and install the beta from the downloaded archive. Note, that this
will not keep any configuration from the old version like a "standard" program
update.

SSL should be NOT disabled in the mail server settings of your mail client anymore,
when using the beta (and any later version). Please check the mail account configuration
and alternatively switch SSL back to "enabled".


Download (Updated 18.2.2013):
http://public.avast.com/~tuma/avast-38330-AAFM.dmg

Technical info:
http://public.avast.com/~tuma/techinfo/
« Last Edit: February 26, 2013, 04:46:08 PM by tumic »

pnoguchi

  • Guest
Re: Beta
« Reply #1 on: January 03, 2013, 12:08:22 AM »
This beta seems to solve the email conflict, but still causes Chrome to spike its activity when accessing websites with resulting slowness. Looking forward to official release


Offline tumic

  • Avast team
  • Advanced Poster
  • *
  • Posts: 723
Re: Beta
« Reply #2 on: January 03, 2013, 11:19:43 AM »
The "slowness" problem is a fileshield issue (you can "prove" this by disabling the fileshield temporary), not a webshield issue. We are aware of this issue and are working on fileshield speed improvements, but this beta (37943) does not contain any fileshield changes.

Muetze

  • Guest
Re: Beta
« Reply #3 on: January 03, 2013, 01:16:26 PM »
Hi,

after installing Beta Version I have following issue:
Chrome WebRep plug-in Fehlercode: 7013

I cant see that avast scanning outgoing msg email.
Incoming is working very well now and much better than before without any modification.

pnoguchi

  • Guest
Re: Beta
« Reply #4 on: January 03, 2013, 04:11:01 PM »
The "slowness" problem is a fileshield issue (you can "prove" this by disabling the fileshield temporary), not a webshield issue. We are aware of this issue and are working on fileshield speed improvements, but this beta (37943) does not contain any fileshield changes.

I understand that from many other posts. Question is, why are Safari and Firefox not so affected by fileshield? They both run faster, and do not seem to choke on some urls?

-P

Offline tumic

  • Avast team
  • Advanced Poster
  • *
  • Posts: 723
Re: Beta
« Reply #5 on: January 03, 2013, 04:43:00 PM »
Hi,

after installing Beta Version I have following issue:
Chrome WebRep plug-in Fehlercode: 7013

I cant see that avast scanning outgoing msg email.
Incoming is working very well now and much better than before without any modification.

Thanks for the report. The webRep plug-ins are kind of "under construction" in the beta, so there may be some issues with them. However, this will be fixed in the final release.

Regarding the outgoing email scan - avast! for mac has never checked outgoing mail traffic and will not do so, at least not in the nearest future. The purpose of the product is to protect you from the bad world out there, not  the other way, so this should be not a such big issue... ;-)

Offline tumic

  • Avast team
  • Advanced Poster
  • *
  • Posts: 723
Re: Beta
« Reply #6 on: January 03, 2013, 04:52:40 PM »
I understand that from many other posts. Question is, why are Safari and Firefox not so affected by fileshield? They both run faster, and do not seem to choke on some urls?

This is still under examination here, but the most probable explanation is that Chrome simple accesses more/bigger files (cache) than the other browsers.

Offline specimen9999

  • Sr. Member
  • ****
  • Posts: 349
Re: Beta
« Reply #7 on: January 04, 2013, 07:30:51 PM »
After reading the technical info, I'm a bit concerned about the security implications. Thru the installation of the SSL CA Certificate in the Keychain the user is giving Avast! and any other program that manages to reverse engineer/hack this process complete control over the encryption trust chain, since technically Avast e resigning the connections with this certificate, if this process is somewhat hacked it could validate any otherwise untrusted connection.
I'm also giving quite a lot of trust to Avast!. The process detailed would be a quite perfect trojan horse and a smart way to circumvent the trust chain of SSL certificates.

We are creating, thru this process, a single point of failure in the trust chain, I would like to know what measures does Avast implement to make sure we aren't in fact being more vulnerable by creating a single point of failure, by exchanging the trust in secure connections and things like prevention of identity theft, for the ability to virus scan the contents of secure connections. Because if I have to pick between the two I rather have my trust chain intact as there are other ways to control viruses (File scan).

Another question is: Is the certificate that is inserted into System Root generated locally and different for every installation or it's the same cert for everyone?
« Last Edit: January 05, 2013, 12:12:24 AM by specimen9999 »

pnoguchi

  • Guest
Re: Beta
« Reply #8 on: January 04, 2013, 08:10:35 PM »
Having briefly commented a few times, with amazingly quick, to the point responses, after more extensive testing the beta I have the following comments:
-regarding the mailshield, the ssl/tls flag does not appear as before with the release version. However my email response was almost totally blocked with access to my mail server timing out, until I set the fileshield to exclude my email client AND its associated support directories. I am guessing that this probably negates the AV scan on my mail. Based on the technical info, my keychain does indeed have the avast! trusted CA inserted, so that part works
-regarding installation, this beta still leaves the avast Application Support directory locked and not accessible from my account (which is an administrative account). Adding and admin r/w permission allows me to see the otherwise nonaccesible directory. I don't know if this is a "bug" or "feature", but it makes avast! free for mac less transparent to me.
-Do appreciate the substantial investment by avast for the Mac platform. I realize that the Mac OSX is by far still a  small blip compared to the various Microsoft OSes.

-P

Offline specimen9999

  • Sr. Member
  • ****
  • Posts: 349
Re: Beta
« Reply #9 on: January 04, 2013, 10:02:58 PM »
I just tried this beta and Mail.app immediately failed to connect to a private mail server, once I changed it back to use SSL, that uses a self signed cert that is already added to the keychain (and was working on the previous version of Avast!). :(
« Last Edit: January 04, 2013, 10:07:00 PM by specimen9999 »

GeoffBur

  • Guest
Re: Beta
« Reply #10 on: January 06, 2013, 10:55:52 PM »
One thing I've noticed, that if "scan secured connections" is set then Dropbox cannot connect to the server.

Offline specimen9999

  • Sr. Member
  • ****
  • Posts: 349
Re: Beta
« Reply #11 on: January 07, 2013, 02:46:38 AM »
One thing I've noticed, that if "scan secured connections" is set then Dropbox cannot connect to the server.


I suggest you read the "Technical Info" link in the first post.

Offline tumic

  • Avast team
  • Advanced Poster
  • *
  • Posts: 723
Re: Beta
« Reply #12 on: January 07, 2013, 11:28:42 AM »
Thanks for examining and testing the beta specimen9999.

After reading the technical info, I'm a bit concerned about the security implications. Thru the installation of the SSL CA Certificate in the Keychain the user is giving Avast! and any other program that manages to reverse engineer/hack this process complete control over the encryption trust chain, since technically Avast e resigning the connections with this certificate, if this process is somewhat hacked it could validate any otherwise untrusted connection.
I'm also giving quite a lot of trust to Avast!. The process detailed would be a quite perfect trojan horse and a smart way to circumvent the trust chain of SSL certificates.

We do not deny, that the process we are now using is a significant intervention into the SSL handling on the machine, but if done correct, it should not bring any security issues. After all, it is the mechanism that all antivirus software capable of scanning secured connections is using.

Also note, that to hack the process, you would need root rights. And a malware, that has managed it to run with root rights on your machine has already won and can use a plenty of other ways to affect SSL handling (e.g. install its own certificate into the system keychain).


...there are other ways to control viruses (File scan).

The problem is, that a "traditional" file scan will not protect you from a big group of malware attacking the web browsers/web content. That's why the web shield is there.

Another question is: Is the certificate that is inserted into System Root generated locally and different for every installation or it's the same cert for everyone?

As described in the technical info, the certificate is generated on install/update and is "uniq" for every installation.

Offline tumic

  • Avast team
  • Advanced Poster
  • *
  • Posts: 723
Re: Beta
« Reply #13 on: January 07, 2013, 11:32:24 AM »
One thing I've noticed, that if "scan secured connections" is set then Dropbox cannot connect to the server.


I suggest you read the "Technical Info" link in the first post.

Just a note - there will be predefined exclusions for such software in the final release.

Offline tumic

  • Avast team
  • Advanced Poster
  • *
  • Posts: 723
Re: Beta
« Reply #14 on: January 07, 2013, 11:44:36 AM »
-regarding the mailshield, the ssl/tls flag does not appear as before with the release version. However my email response was almost totally blocked with access to my mail server timing out, until I set the fileshield to exclude my email client AND its associated support directories. I am guessing that this probably negates the AV scan on my mail. Based on the technical info, my keychain does indeed have the avast! trusted CA inserted, so that part works

Poor fileshield performance on some mailbox files is a known issue and we are working on a fix. However I can not guarantee that this will be solved in the next release. The only think you can currently do is to exclude the folders from the fileshield scan as you did.

-regarding installation, this beta still leaves the avast Application Support directory locked and not accessible from my account (which is an administrative account). Adding and admin r/w permission allows me to see the otherwise nonaccesible directory. I don't know if this is a "bug" or "feature", but it makes avast! free for mac less transparent to me.

The Application Support directory is not user readable by design. The reason is, that there are stored some files, that may not be accessible for user processes, e.g. the private keys for the CA certificates.