Has anyone found a solution for the dozens of "Fraudulent Microsoft Certificate Blocked" alerts that are hitting our firewalls (SonicWALL).
These alerts are triggered by Symantec / Norton AntiVirus updates and they began firing around the 9th of January, 2004.
The source addresses of these alerts consist of the following four (4) addresses:
12.158.80.10 crl.verisign.com
64.94.110.11 crl.verisign.com
64.94.110.12 SPAMMERSAREBAD.EUQINOM.COM
198.49.161.200 crl.verisign.com
I am aware of the following notice from VeriSign but I do not understand why these alerts still continue to trigger when thick clients periodically run their scheduled Symantec / Norton AntiVirus updates:
VeriSign Update on Certificate Revocation List Expiration
Any ideas?
Thanks in advance!
Errol
These alerts are triggered by Symantec / Norton AntiVirus updates and they began firing around the 9th of January, 2004.
The source addresses of these alerts consist of the following four (4) addresses:
12.158.80.10 crl.verisign.com
64.94.110.11 crl.verisign.com
64.94.110.12 SPAMMERSAREBAD.EUQINOM.COM
198.49.161.200 crl.verisign.com
I am aware of the following notice from VeriSign but I do not understand why these alerts still continue to trigger when thick clients periodically run their scheduled Symantec / Norton AntiVirus updates:
VeriSign Update on Certificate Revocation List Expiration
Any ideas?
Thanks in advance!
Errol