<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I'm not sure how the AC VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/anyconnect-display-server-certificate/m-p/3007855#M145583</link>
    <description>&lt;P&gt;I'm not sure how the AC VPN agent responds to a trusted MITM. A Wireshark capture would definitely be a definitive source to see exactly what's going on.&lt;/P&gt;
&lt;P&gt;I do know that you can pull a DART log and see the connection to the ASA. I just checked my DART log (select AnyConnect Secure Mobility Client log option only and then look at anyconnect,txt log file) as follows:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;Date : 03/22/2017&lt;BR /&gt;Time : 23:23:18&lt;BR /&gt;Type : Information&lt;BR /&gt;Source : acvpnagent&lt;BR /&gt;Description : Function: CSslTunnelTransport::postSocketConnectProcessing&lt;BR /&gt;File: SslTunnelTransport.cpp&lt;BR /&gt;Line: 1360&lt;BR /&gt;Opened SSL socket from [192.168.0.104]:2204 to [&amp;lt;my ASA public address redacted&amp;gt;]:443&lt;/PRE&gt;</description>
    <pubDate>Wed, 22 Mar 2017 15:46:44 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2017-03-22T15:46:44Z</dc:date>
    <item>
      <title>AnyConnect display server certificate?</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-display-server-certificate/m-p/3007854#M145582</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;I've been asked a question about a customer who uses AnyConnect for access to a secure network from related networks in their organization, some of which use TLS-decrypting proxy servers.&lt;/P&gt;
&lt;P&gt;I realized that there are a number of possible scenarios where there might be personnel running SSL VPN sessions from these networks. &amp;nbsp;I had, at first thought, presumed that a correctly configured certificate store on the ASA 5515 (software version 9.4(3).8) would ensure that if a proxy was inline with an untrusted certificate the user would be warned of a problem in the certificate chain. &amp;nbsp;I do understand that this question assumes that the CA and/or certificate(s) presented by the proxy are untrusted by the client, though I'd still like to be able to know if possible if that certificate is being substituted.&lt;/P&gt;
&lt;P&gt;But (for the PCI assessors) I don't know how to verify this. &amp;nbsp;I would think that the client "knows" which certificate is presented by the VPN server, so as with other applications I can verify the certificate identity is correct - but I don't know whether this is something that can be queried or displayed by the AnyConnect client. &amp;nbsp;That's the easiest approach, if this is accessible somewhere on the client. &amp;nbsp;Other approaches:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;logging on the server would indicate whether there is an anomaly in session setup with a AnyConnect client?&lt;/LI&gt;
&lt;LI&gt;query on the ASA console with detail on the connection?&lt;/LI&gt;
&lt;LI&gt;fire up Wireshark on the client and watch the datastream?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The initial indication that I have is that there is nothing out of the ordinary, though connection to the AnyConnect https service (we've disabled WebVPN but the software download page is still accessible) &lt;EM&gt;is&lt;/EM&gt; proxied (and the browser generates the expected "certificate invalid" warning). &amp;nbsp;But the AnyConnect client does not, which is what raises our concern.&lt;/P&gt;
&lt;P&gt;So, two questions:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Under what circumstances will the AnyConnect client complain that there is an SSL MITM with an untrusted certificate? &amp;nbsp;Or is there a way to configure something&amp;nbsp;similar to "certificate stapling" in the configuration?&lt;/LI&gt;
&lt;LI&gt;How to verify that an AnyConnect session is using a specific certificate on the server?&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope this isn't overly difficult to answer... thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:06:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-display-server-certificate/m-p/3007854#M145582</guid>
      <dc:creator>K. M. Peterson</dc:creator>
      <dc:date>2019-03-12T09:06:21Z</dc:date>
    </item>
    <item>
      <title>I'm not sure how the AC VPN</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-display-server-certificate/m-p/3007855#M145583</link>
      <description>&lt;P&gt;I'm not sure how the AC VPN agent responds to a trusted MITM. A Wireshark capture would definitely be a definitive source to see exactly what's going on.&lt;/P&gt;
&lt;P&gt;I do know that you can pull a DART log and see the connection to the ASA. I just checked my DART log (select AnyConnect Secure Mobility Client log option only and then look at anyconnect,txt log file) as follows:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;Date : 03/22/2017&lt;BR /&gt;Time : 23:23:18&lt;BR /&gt;Type : Information&lt;BR /&gt;Source : acvpnagent&lt;BR /&gt;Description : Function: CSslTunnelTransport::postSocketConnectProcessing&lt;BR /&gt;File: SslTunnelTransport.cpp&lt;BR /&gt;Line: 1360&lt;BR /&gt;Opened SSL socket from [192.168.0.104]:2204 to [&amp;lt;my ASA public address redacted&amp;gt;]:443&lt;/PRE&gt;</description>
      <pubDate>Wed, 22 Mar 2017 15:46:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-display-server-certificate/m-p/3007855#M145583</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-22T15:46:44Z</dc:date>
    </item>
    <item>
      <title>Hello Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-display-server-certificate/m-p/3007856#M145585</link>
      <description>&lt;P&gt;Hello Marvin,&lt;/P&gt;
&lt;P&gt;Thanks, that's an informative response.&lt;/P&gt;
&lt;P&gt;I recall DART from a prior version of AnyConnect, but I don't see any of its functionality in the version I am running (4.2.02075). &amp;nbsp;Funny, I could have sworn it was there.&lt;/P&gt;
&lt;P&gt;I did decide to go poking around to see whether it was a separate executable. On Windows (not my primary platform) I found a few other files. &amp;nbsp;There's &lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;vpnui.exe&lt;/SPAN&gt; (what gets started by the installed Start Menu item), and also &lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;vpncli.exe&lt;/SPAN&gt; and &lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;vpnagent.exe&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;I haven't had a chance to play around with the &lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;vpnagent.exe&lt;/SPAN&gt;, but the &lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;vpncli.exe&lt;/SPAN&gt; was what I would have expected, a command-line version of the application. &amp;nbsp;Within it, there are several commands that make sense; a state command which provides pretty much the same information as from the UI. Perhaps there are command line options for&amp;nbsp;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;vpnagent.exe&lt;/SPAN&gt;, but I suspect not. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have any idea where the DART functionality lives (perhaps I need another installer), I'd be interested to hear. &amp;nbsp;Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 22 Mar 2017 23:17:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-display-server-certificate/m-p/3007856#M145585</guid>
      <dc:creator>K. M. Peterson</dc:creator>
      <dc:date>2017-03-22T23:17:54Z</dc:date>
    </item>
    <item>
      <title>Yes - DART is not installed</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-display-server-certificate/m-p/3007857#M145587</link>
      <description>&lt;P&gt;Yes - DART is not installed by default.&lt;/P&gt;
&lt;P&gt;I always use the offline installer for my own machine and choose it as an option in addition to the VPN, NAM and Umbrella modules I use daily.&lt;/P&gt;
&lt;P&gt;Note that AnyConnect also has an application event log under Windows. There's a lot of overlap in the info that you can find there as well.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2017 02:13:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-display-server-certificate/m-p/3007857#M145587</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-23T02:13:51Z</dc:date>
    </item>
  </channel>
</rss>

