Hi,
The local mirrored VPS respository is one of the feature that will make choose Avast! for our servers.
As VPS repository use no secured connection and no identification mechanism, how can I guarantee the VPS files has not be tempered ?
The absence of identification mechanism make this process vulnerable at man-of-the-middle attack. How can I ensure the virus definition downloaded by Avast! is not corrupted in any way?
Even if I guess the answer of my question, I need an official documented response.
This is a dealbreaker and basic tests seems to confirm there is indeed security mechanism inside Avast! to ensure the VPS database integrity so it's just a matter of documentation..
Thanks in advance.
Regards,