- Aug 4, 2015
- 36
I have a question for the community regarding Avast. A long time ago, when I used Avast Free on a daily basis, I noticed that their Web Shield intercepted HTTPS traffic because all of the sudden every HTTPS website I visited was certified by Avast. The Web Shield was basically intercepting all HTTPS requests made by the browser and acting as a "Man in the Middle" (MITM) between the web server and the web browser. Another AV that I have noticed to do EXACTLY the same is the new Kaspersky Free 2019. This concept of having the SSL chain of trust broken by my AV is something that I'm not very fond of. Therefore, I disabled Avast Web Shield for HTTPS traffic. In fact, I eventually disabled it altogether because I don't like the idea of willingly let my AV spy all my web traffic.
I recently tried the current version of Avast Free on a VM and I was surprise to notice that the Web Shield is now lets the browser display the website's certificate, despite the traffic being intercepted by Web Shield. I tested if the an EICAR Test File (Download ° EICAR - European Expert Group for IT-Security) served through HTPS was actually being intercepted, and it was. Therefore, the shield was working correctly for HTTPS traffic, while passing the correct certificate down to the browser.
This new behavior I just described was observed in both Chrome and Firefox. However, I noticed that if I used Edge or IE11, the certificate would show up as coming from Avast. This suggests that Avast is not using a generic approach to ALL HTTPS traffic. Avast Web Shield should be using some interface exposed by Chrome and Firefox to manipulate the certificates more freely. And, no, it's not thanks to the "Avast Online Security" addon/extension. I didn't even installed it and I really doubt it that the a WebExtension is able to do this kind of spoofing.
After all that I've said, does anyone have any idea how is Avast doing this? And why is not Kaspersky doing the same? Have you tried to test if the certificates get replaced or not on other products with a Network Inspection layer?
I recently tried the current version of Avast Free on a VM and I was surprise to notice that the Web Shield is now lets the browser display the website's certificate, despite the traffic being intercepted by Web Shield. I tested if the an EICAR Test File (Download ° EICAR - European Expert Group for IT-Security) served through HTPS was actually being intercepted, and it was. Therefore, the shield was working correctly for HTTPS traffic, while passing the correct certificate down to the browser.
This new behavior I just described was observed in both Chrome and Firefox. However, I noticed that if I used Edge or IE11, the certificate would show up as coming from Avast. This suggests that Avast is not using a generic approach to ALL HTTPS traffic. Avast Web Shield should be using some interface exposed by Chrome and Firefox to manipulate the certificates more freely. And, no, it's not thanks to the "Avast Online Security" addon/extension. I didn't even installed it and I really doubt it that the a WebExtension is able to do this kind of spoofing.
After all that I've said, does anyone have any idea how is Avast doing this? And why is not Kaspersky doing the same? Have you tried to test if the certificates get replaced or not on other products with a Network Inspection layer?