Methods for inspecting security certificates by network security devices to detect and prevent the use of invalid certificates
First Claim
1. A method for inspecting security certificates, the method comprising the steps of by a network security device:
- (a) detecting messages, of a security protocol between a server and a client system, that have a security certificate;
(b) detecting suspicious security certificates from said messages, by steps including;
(i) scanning said messages for an object ID (OID) of a compromised cryptographic hash function, and(ii) scanning said messages for an OID of a certificate extension;
(iii) upon detecting said OID of said certificate extension in said messages, checking a comment length of said OID of said certificate extension for invalid-certificate criteria, said invalid-certificate criteria including an excessive comment length and at least one non-ASCII character contained in said OID of said certificate extension; and
(c) aborting sessions of said security protocol associated with said suspicious security certificates that are determined, by said detecting of said suspicious security certificates, to be invalid.
0 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are methods and media for inspecting security certificates. Methods include the steps of: scanning, by a network security device, messages of a security protocol between a server and a client system; detecting the messages having a security certificate; detecting suspicious security certificates from the messages; and aborting particular sessions of the security protocol associated with the suspicious certificates. Preferably, the step of scanning is performed only on messages of server certificate records. Preferably, the method further includes the step of sending an invalid-certificate notice to the server and the client system. Preferably, the step of detecting the suspicious certificates includes detecting a use of an incorrectly-generated private key for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting an unavailability of revocation information for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting a use of an invalid cryptographic algorithm for the certificates.
-
Citations
14 Claims
-
1. A method for inspecting security certificates, the method comprising the steps of by a network security device:
-
(a) detecting messages, of a security protocol between a server and a client system, that have a security certificate; (b) detecting suspicious security certificates from said messages, by steps including; (i) scanning said messages for an object ID (OID) of a compromised cryptographic hash function, and (ii) scanning said messages for an OID of a certificate extension; (iii) upon detecting said OID of said certificate extension in said messages, checking a comment length of said OID of said certificate extension for invalid-certificate criteria, said invalid-certificate criteria including an excessive comment length and at least one non-ASCII character contained in said OID of said certificate extension; and (c) aborting sessions of said security protocol associated with said suspicious security certificates that are determined, by said detecting of said suspicious security certificates, to be invalid. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable storage medium having computer-readable code embodied on the computer-readable storage medium, the computer-readable code being for inspection of security certificates by a network security device, the computer-readable code comprising:
-
(a) program code for detecting messages, of a security protocol between a server and a client system, that have a security certificate; (b) program code, for detecting suspicious security certificates from said messages, including; (i) program code for scanning said messages for an object ID (OID) of a compromised cryptographic hash function, and (ii) program code for scanning said messages for an OID of a certificate extension; (iii) program code for, upon detecting said OID of said certificate extension in said messages, checking a comment length of said OID of said certificate extension for invalid-certificate criteria, said invalid-certificate criteria including an excessive comment length of more than 200 bytes and at least one non-ASCII character contained in said OID of said certificate extension; and
,(c) program code for aborting sessions of said security protocol associated with said suspicious security certificates that are determined, by said detecting of said suspicious security certificates, to be invalid. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification