This article applies to PRTG Network Monitor 13 or later
Connection Attempts to Akamai CDN
Sensors that make use of SSL secured connections need corresponding certificates for communication. These certificates are used to encrypt data in https connections. Certificates have to be issued by a trustworthy certificate authority (CA). To check this, there is a list of trustable root certificates. Every Application that relies on the CryptoAPI provided by Windows uses root certificates provided by Microsoft.
However, Windows’ CryptoAPI has a mechanism which dynamically updates the list of root certificates in the case that the currently needed one is not found on the system. This Automatic Root Certificates Update is activated on all Windows versions by default.
If the certificate of a server indicates that it was certificated by a CA which the browser does not know, Windows downloads the file authrootstl.cab from the Windows update server. This list includes digitally signed information about CAs. If the unknown CA is on the list, this CA’s certificate will be downloaded and marked as trustworthy from the system. This import runs automatically in background—the user will not be notified.
In order to get the root CA list authrootstl.cab, Windows tries to connect to the Akamai content delivery network (CDN). This explains the “strange” connections from your probe when using sensors with SSL secured connections.
You can find details about this issue of automatic CA certificate updates in this article by the c’t magazine (only available in German): Microsofts Hintertür — Zweifelhafte Updates gefährden SSL-Verschlüsselung
Consequences of Automatic Root CA Updates
- Potentially, all sensors with SSL connections can be affected of connection attempts to Akamai.
- Affected sensors might have a longer runtime.
- If you use dedicated certificates for your VMware machines, ensure that root-ca is installed on your probe machine.
- You might encounter problems with the trust. For example, if you turn off the automatic update of root CAs and regular, bought certificates are used, the system could classify these CAs not as trusted if it does not know the root certificate of a particular CA.
Add comment