SSL Monitor

Prev Next

Catchpoint’s SSL monitor periodically checks the validity of SSL certificates installed on your web server so you can be alerted when they are approaching expiration. It also detects certificate revocation, hostname mismatch, and if any certificate in the entire chain is signed by a weak algorithm.

Why monitor SSL certificates?

There are many reasons why you should monitor SSL certificates. A few key reasons are listed below:

  • Expired certificates can negatively impact your organization’s websites, applications, and security.
  • Expired SSL certificates compromise the trust and integrity of the site, making it vulnerable for hackers to target and breach.
  • When an SSL certificate expires and loses validity, secure networks and browsers may not allow access to your site, rendering it unavailable.
  • According to Symantec, 90% of consumers end transactions upon getting an SSL warning and 72% abandon transactions or go to competitor sites.

Learn more about SSL

Using the SSL Monitor

Below is the screen showing the properties Catchpoint’s SSL monitor. The layout is similar to the other Catchpoint monitors.

SSL_monitor.png

Note that the URL starts with ‘SSL://’ and not ‘HTTPS://’. This is because Catchpoint’s SSL monitor harvests SSL certificates at the TCP level, so it doesn't matter application protocol your server is using (HTTPS, SMTPS, POPS, IMAPS, FTPS, WSS, MQTTS, etc) as all such protocols are supported.

Certificate pinning

The SSL monitor can be used to check certificate pinning. Use these checkboxes to enforce specific pinning.

pining.png

After enabling any pinning option, you need to upload the certificate and the corresponding passphrase (certificate password). For the certificate, only .pfx (usually contains data in PKCS#12 format) is supported since it can securely store multiple certificates with the corresponding private key.

Enforce Certificate Pinning

Select this flag to pin the full certificate. Here the monitor checks the entire certificate chain with pre-loaded certificates (a combination of Root CA, Intermediate CAs, and End entity certificate).

After the test is run, you can see the pinned certificate thumbprint and the actual certificate thumbprint of the host certificate on the waterfall page.

Enforce Public Key Pinning

Select this flag to pin the certificate public key. Here the monitor checks the public key of the server certificate (any certificate invalid chain) with the stored public key.

After the test is run, you can see the pinned public key thumbprint and the actual public key thumbprint of the host certificate on the waterfall page.

Certificate Revocation Disabled

advanced_setting_ssl.png

Under Advanced Settings, you can select Certificate Revocation Disabled. This keeps the test from checking certificate revocation, which is handy if the website uses a self-signed certificate or when you create a custom certificate without the ‘CRL Distribution Points’ extension.

Certificate details captured by the monitor

The below table lists the certificate details captured by the SSL monitor.

Sl No

Field name

Description

1

Version number

The X.509 format version of a certificate

2

Serial number

Used to uniquely identify the certificate within a CA's systems. This is used to track revocation information.

3

Signature algorithm

The algorithm used to sign the public key certificate.

4

Issuer

The entity that verified the information and signed the certificate.

5

Not Before

Issue date - the earliest time and date on which the certificate is valid.

6

Not After

Expire date - the time and date past which the certificate is no longer valid.

7

Subject

The entity a certificate belongs to a machine, an individual, or an organization.

8

Public Key Parameters

The field holds an elliptic curve per RFC 5480 section 2.1.1.

The value “05 00” simply means NULL in DER (and CER and BER) per RFC.

9

Public Key

A public key belonging to the certificate subject.

10

Key Usage

The valid cryptographic uses of the certificate's public key. Common values include digital signature validation, key encipherment, and certificate signing.

11

Extended Key Usage

The applications in which the certificate may be used. Common values include TLS server authentication, email protection, and code signing.

12

Certificate Signature Algorithm

The algorithm used to create the signature of a certificate.

13

Certificate Signature / Thumbprint

A signature of the certificate body by the issuer's private key.

14

Key Usage

The Key Usage extension defines the purpose of the key contained in the certificate. The Key Usage, Extended Key Usage, and Basic Constraints extensions act together to specify the purposes for which a certificate can be used. OID is 2.5.29.15.

15

Authority Information Access

The Authority Information Access extension indicates how and where to access information about the issuer of the certificate. OID is 1.3.6.1.5.5.7.1.1.

16

Certificate Policies

The Certificate Policies extension defines one or more policies, each of which consists of an OID and optional qualifiers. The extension can include a URI to the issuer's Certificate Practice Statement or can embed issuer information, such as a user notice in text form. OID is 2.5.29.32.

17

Basic Constraints

This extension is used during the certificate chain verification process to identify CA certificates and to apply certificate chain path length constraints. OID is 2.5.29.19.

18

CRL Distribution Points

This extension defines how CRL (Certificate Revocation List) information is obtained. It should be used if the system is configured to use CRL issuing points. OID is 2.5.29.31.

19

Subject Alternative Name

The Subject Alternative Name extension includes one or more alternative (non-X.500) names for the identity bound by the CA to the certified public key. OID is 2.5.29.17.

20

Enhanced Key Usage

The Extended Key Usage extension indicates the purposes for which the certified public key may be used. These purposes may be in addition to or in place of the basic purposes indicated in the Key Usage extension. OID is 2.5.29.37.

21

Subject Key Identifier

The Subject Key Identifier extension identifies the public key certified by this certificate. This extension provides a way of distinguishing public keys if more than one is available for a given subject name. OID is 2.5.29.14.

22

Authority Key Identifier

The Authority Key Identifier extension identifies the public key corresponding to the private key used to sign a certificate. This extension is useful when an issuer has multiple signing keys, such as when a CA certificate is renewed. OID is 2.5.29.35.

23

Certification Path

Chain of trust built using the certification path validation algorithm.

Other metrics captured by the monitor

The below table lists the metrics captured by the SSL monitor other than the basic certificate details.

Sl No Metric name Description
1 DNS time DNS resolution time in milliseconds.
2 Host details Details like the Name, IP address, and port of the host.
3 Connect time The time it took to connect to the host in milliseconds.
4 SSL time The total SSL handshake time in milliseconds.

Complete list of SSL monitor errors:

Error Code Error Name Description
60 NotTimeValid Specifies that the X509 chain is not valid due to an invalid time value, such as a value that indicates an expired certificate.
61 NotTimeNested Deprecated. Specifies that the CA (certificate authority) certificate and the issued certificate have validity periods that are not nested. For example, the CA cert can be valid from January 1 to December 1, and the issued certificate from January 2 to December 2, which would mean the validity periods are not nested.
62 Revoked Specifies that the X509 chain is invalid due to a revoked certificate.
63 NotSignatureValid Specifies that the X509 chain is invalid due to an invalid certificate signature.
64 NotValidForUsage Specifies that the key usage is not valid.
65 UntrustedRoot Specifies that the X509 chain is invalid due to an untrusted root certificate.
66 RevocationStatusUnknown Specifies that it is not possible to determine whether the certificate has been revoked. This can be due to the certificate revocation list (CRL) being offline or unavailable.
67 Cyclic Specifies that the X509 chain could not be built.
68 InvalidExtension Specifies that the X509 chain is invalid due to an invalid extension.
69 InvalidPolicyConstraints Specifies that the X509 chain is invalid due to invalid policy constraints.
70 InvalidBasicConstraints Specifies that the X509 chain is invalid due to invalid basic constraints.
71 InvalidNameConstraints Specifies that the X509 chain is invalid due to invalid name constraints.
72 HasNotSupportedNameConstraint Specifies that the certificate does not have a supported name constraint or has a name constraint that is unsupported.
73 HasNotDefinedNameConstraint Specifies that the certificate has an undefined name constraint.
74 HasNotPermittedNameConstraint Specifies that the certificate has an impermissible name constraint.
75 HasExcludedNameConstraint Specifies that the X509 chain is invalid because a certificate has excluded a name constraint.
76 PartialChain Specifies that the X509 chain could not be built up to the root certificate.
77 CtlNotTimeValid Specifies that the certificate trust list (CTL) is not valid because of an invalid time value, such as one that indicates that the CTL has expired.
78 CtlNotSignatureValid Specifies that the certificate trust list (CTL) contains an invalid signature.
79 CtlNotValidForUsage Specifies that the certificate trust list (CTL) is not valid for this use.
80 OfflineRevocation Specifies that the online certificate revocation list (CRL) the X509 chain relies on is currently offline.
81 NoIssuanceChainPolicy Specifies that there is no certificate policy extension in the certificate. This error would occur if a group policy has specified that all certificates must have a certificate policy.
82 NoCertificateFound Specifies that the certificate is not available at the server (like if HTTP website is provided)
83 WeakAlgorithm Specifies that the certificate has not been strong signed. Typically, this indicates that the MD2 or MD5 hashing algorithms were used to create a hash of the certificate.
84 InvalidCommonName Specifies that the certificate name is not matching with that of the hostname to which it is issued.
85 NoCommonAlgorithm Specifies that the client and server cannot communicate, because they do not possess a common algorithm (like if on server TLS 1.0 is disabled for security reasons and the client didn´t speak TLS 1.1 or TLS 1.2).
86 HandshakeFailure Specifies that the SSL handshake between client and server failed (like unsupported cipher)
87 MissingSan Specifies that the Subject Alternate Name extension is missing in the certificate.
89 PinnedCertificateMismatch Specifies that the pinned certificate thumbprint did not match with the host certificate thumbprint.
90 PinnedPublicKeyMismatch Specifies that the pinned certificate public key did not match with the host certificate public key.
91 PinnedCertificateAndPublicKeyMismatch Specifies that both the pinned certificate thumbprint and the pinned public key did not match with the host certificate.