| |||||||||||||||||||||||
| |||||||||||||||||||||||
SOLUTION | |||||||||||||||||||||||
BACKGROUND The Dutch Certificate Authority DigiNotar suffered a breach, in which an unknown number of forged certificates were issued to unknown attackers. Some of these certificates later surfaced, where they were being used to silently intercept HTTPS traffic in Iran. DigiNotar kept the attack secret for six weeks, until an Iranian user reported the problem to Google. A good summary of the attack can be found here:http://www.computerworld.com/s/article/9219663/Hackers_may_have_stolen_over_200_SSL_certificates Because of the scope of the breach, and the lack of disclosure by the Certificate Authority, the major browser vendors (Microsoft, Mozilla, and Google) have decided to no longer trust certificates signed by DigiNotar. As an explanation of the rationale, see this: https://blog.mozilla.com/security/2011/09/02/diginotar-removal-follow-up/ To address this threat Check Point released an update of trusted certificate stores for the following products:
RESOLUTION Removing DigiNotar CA from trusted CA store for Security Gateway and Security Management server Perform the following:
Run the following commands:
Removing DigiNotar CA from trusted CA store for the SSL Inspection feature Check Point recommends updating the certificate list by removing the two DigiNotar certificates.
Related Solution:sk64521 - HTTPS Inspection Trusted CA list updates Removing DigiNotar CA from trusted CA store for SmartDashboard Perform the following:
Removing DigiNotar CA from trusted CA store for Provider-1 Perform the following:
|
Tuesday, February 7, 2012
How to secure SSL connections and remove DigiNotar certificates from the Trusted CAs list
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment