DESKTOP

Windows 7 : Configuring and Troubleshooting Internet Explorer Security - How to Troubleshoot Certificate Problems

1/4/2014 2:58:45 AM

Certificates are used for several security-related tasks in Internet Explorer:

  • Encrypting traffic The most common use for certificates in Internet Explorer. Many Web sites, especially e-commerce Web sites that accept credit card numbers, have an SSL certificate installed. This SSL certificate enables HTTPS communications, which behave similar to HTTP, but with encryption and authentication. With standard, unencrypted HTTP, if an attacker has access to the network, the attacker can read all data transferred to and from the server. With encrypted HTTPS, an attacker can capture the traffic, but it will be encrypted and cannot be decrypted without the server's private certificate.

  • Authenticating the server SSL certificates authenticate the server by allowing the client to verify that the certificate was issued by a trusted CA and that one of the names in the certificate matches the host name used to access the site. This helps to prevent man-in-the-middle attacks, whereby an attacker tricks a client computer into visiting a malicious server that impersonates the legitimate server. Web sites on the public Internet typically have SSL certificates issued by a third-party CA that is trusted by default in Internet Explorer. Intranet Web sites can use certificates issued by an internal CA as long as client computers are configured to trust the internal CA.

  • Authenticating the client Intranet Web sites can issue certificates to clients on their network and use the client certificates to authenticate internal Web sites. When using AD DS Group Policy, it is very easy to distribute client certificates throughout your enterprise.

If Internet Explorer detects a problem with a certificate, it displays the message, "There is a problem with this website's security certificate," as shown in Figure 1.

How Internet Explorer detects mismatched SSL certificates

Figure 1. How Internet Explorer detects mismatched SSL certificates

The following list describes common problems that can occur when using certificates in Internet Explorer and how to troubleshoot them.

  • The security certificate presented by this Web site was issued for a different Web site's address In this case, there are several possible causes:

    • The host name you are using to access the Web site is not the Web site's primary address. For example, you might be attempting to access the Web site by Internet Protocol (IP) address. Alternatively, you might be accessing an alternative host name, such as "constoso.com" instead of "www.contoso.com."

      Note

      SUBJECT ALTERNATIVE NAMES

      Historically, SSL certificates have specified the host name for which they are valid by using the Common Name field. For example, you might specify www.contoso.com as the Common Name for your Web site certificate. However, if a user accessed the same site using the host name www.contoso.com, the browser would return an error.

      Since about 2003, most popular browsers have supported SSL certificates with Subject Alternative Names (SANs). SANs are host names for which an SSL certificate is valid. For example, you could create an SSL certificate with a SAN list and allow users to access a single Web server using either www.contoso.com or www.contoso.com.

      You can view a certificate's SAN list by visiting the site using HTTPS and clicking the padlock icon in the address bar of Internet Explorer. Click View Certificates, and then click the Details tab. Select the Subject Alternative Name field to view every host name for which the certificate is valid.

    • The server administrator made a mistake. For example, the administrator might have mistyped the server's host name when requesting the certificate or the administrator might have installed the wrong certificate on the server.

    • The server is impersonating a server with a different host name. For example, an attacker might have set up a Web site to impersonate www.fabrikam.com. However, the attacker is using a different SSL certificate on the Web site. Earlier versions of Internet Explorer show a less intimidating error message, so many users might have bypassed the error and continued to the malicious site.

  • The certificate has expired Certificates have a limited lifespan—usually one to five years. If the certificate has expired, the server administrator should request an updated certificate and apply it to the server.

  • Internet Explorer is not configured to trust the certificate authority Anyone, including attackers, can create a CA and issue certificates. Therefore, Internet Explorer does not trust all CAs by default. Instead, Internet Explorer trusts only a handful of public CAs. If the certificate was issued by an untrusted CA and the Web site is on the public Internet, the server administrator should acquire a certificate from a trusted CA. If the Web site is on your intranet, a client administrator should configure Internet Explorer to trust the issuing CA. In AD DS domains, member computers automatically trust enterprise CAs. For more information, complete the exercises at the end of this lesson.

Other  
  •  Windows 7 : Configuring and Troubleshooting Internet Explorer Security - Adding Sites to the Trusted Sites List , Protected Mode
  •  Windows 7 : Configuring and Troubleshooting Internet Explorer Security - Internet Explorer Add-Ons (part 2) - How to Configure ActiveX Add-Ons
  •  Windows 7 : Configuring and Troubleshooting Internet Explorer Security - Internet Explorer Add-Ons (part 1)
  •  Windows Server 2008 : Using ntdsutil - Seizing an Operations Master Role
  •  Windows Server 2008 : Using ntdsutil - Performing an Authoritative Restore, Removing a Domain Controller from Active Directory
  •  Windows Server 2008 : Using ntdsutil - Moving Active Directory to a Different Drive, Defragmenting Active Directory
  •  Windows Server 2008 : Using ntdsutil - Resetting the Directory Services Restore Mode Password, Changing the Garbage Collection Logging Level
  •  Windows Server 2003 : Deploying Stub Zones - Benefits of Stub Zones, Stub Zone Updates
  •  Windows Server 2003 : Creating Zone Delegations - Delegating Zones
  •  Windows Server 2003 : Configuring Advanced DNS Server Properties (part 2)
  •  
    Top 10
    Extending LINQ to Objects : Writing a Single Element Operator (part 2) - Building the RandomElement Operator
    Extending LINQ to Objects : Writing a Single Element Operator (part 1) - Building Our Own Last Operator
    3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
    3 Tips for Maintaining Your Cell Phone Battery (part 1) - Charge Smart
    OPEL MERIVA : Making a grand entrance
    FORD MONDEO 2.0 ECOBOOST : Modern Mondeo
    BMW 650i COUPE : Sexy retooling of BMW's 6-series
    BMW 120d; M135i - Finely tuned
    PHP Tutorials : Storing Images in MySQL with PHP (part 2) - Creating the HTML, Inserting the Image into MySQL
    PHP Tutorials : Storing Images in MySQL with PHP (part 1) - Why store binary files in MySQL using PHP?
    REVIEW
    - First look: Apple Watch

    - 3 Tips for Maintaining Your Cell Phone Battery (part 1)

    - 3 Tips for Maintaining Your Cell Phone Battery (part 2)
    VIDEO TUTORIAL
    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
    Popular Tags
    Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS