Certificate Status Decryption Rule Conditions
For each certificate status decryption rule you configure, you can match traffic against the presence or absence of a given status. You can select several statuses in one rule condition; if the certificate matches any of the selected statuses, the rule matches the traffic.
You can choose to match against the presence or absence of multiple certificate statuses in a single certificate status rule condition; the certificate needs to match only one of the criteria to match the rule.
You should consider, when setting this parameter, whether you're configuring a decrypt rule or a block rule. Typically, you should click Yes for a block rule and No for a decrypt rule. Examples:
-
If you're configuring a Decrypt - Resign rule, the default behavior is to decrypt traffic with an expired certificate. To change that behavior, click No for Expired so traffic with an expired certificate is not decrypted and resigned.
-
If you're configuring a Block rule, the default behavior is to allow traffic with an expired certificate. To change that behavior click Yes for Expired so traffic with an expired certificate is blocked.
The following table describes how the system evaluates encrypted traffic based on the encrypting server certificate’s status.
Status Check |
Status Set to Yes |
Status Set to No |
---|---|---|
Revoked |
The policy trusts the CA that issued the server certificate, and the CA certificate uploaded to the policy contains a CRL that revokes the server certificate. |
The policy trusts the CA that issued the server certificate, and the CA certificate uploaded to the policy does not contain a CRL that revokes the certificate. |
Self-signed |
The detected server certificate contains the same subject and issuer distinguished name. |
The detected server certificate contains different subject and issuer distinguished names. |
Valid |
All of the following are true:
|
At least one of the following is true:
|
Invalid signature |
The certificate’s signature cannot be properly validated against the certificate’s content. |
The certificate’s signature is properly validated against the certificate’s content. |
Invalid issuer |
The issuer CA certificate is not stored in the policy’s list of trusted CA certificates. |
The issuer CA certificate is stored in the policy’s list of trusted CA certificates. |
Expired |
The current date is after the certificate Valid To date. |
The current date is before or on the certificate Valid To date. |
Not yet valid |
The current date is before the certificate Valid From date. |
The current date is after or on the certificate Valid From date. |
Invalid certificate |
The certificate is not valid. At least one of the following is true:
|
The certificate is valid. All of the following are true:
|
Invalid CRL |
The Certificate Revocation List (CRL) digital signature is not valid. At least one of the following is true:
|
The CRL is valid. All of the following are true:
|
Server mismatch |
The server name does not match the server's Server Name Indication (SNI) name, which could indicate an attempt to spoof the server name. |
The server name matches the SNI name of the server to which the client is requesting access. |
Note that even though a certificate might match more than one status, the rule causes an action to be taken on the traffic only once.
Checking whether a CA issued or revoked a certificate requires uploading root and intermediate CA certificates and associated CRLs as objects. You then add these trusted CA objects to an decryption policy’s list of trusted CA certificates.