This application is a continuation-in-part of U.S. Ser. No. 09/244,154, entitled “NETWORK TRAFFIC INTERCEPTING METHOD AND SYSTEM,” filed on Feb. 3, 1999, and issued as U.S. Pat. No. 6,763,467, on Jul. 13, 2004, by Peter V. Radatti and David J. Harding, which disclosure is incorporated herein by reference;
and is related to co-pending application Ser. No. 09/800314, entitled “APPARATUS AND METHODS FOR INTERCEPTING, EXAMINING AND CONTROLLING CODE, DATA AND FILES AND THEIR TRANSFER,” filed on same date herewith, by Peter V. Radatti and Timothy R. Eliseo, which disclosure is incorporated herein by reference.
The present invention relates to apparatus and methods for intercepting, examining and controlling code, data and files and their transfer. More particularly, the present invention relates to apparatus and methods for intercepting, examining and controlling code, data and files and their transfer through secure connections.
The rise of the Internet and networking technologies has resulted in the widespread transfer of code, data and files between computers. Transfer through the Internet and networking may be secured in a number of ways. Secure Sockets Layer (SSL) and Secure Multi-Purpose Internet Mail Extension (S/MIME) are two of the primary methods used to secure transfers. Both SSL and S/MIME use encryption to secure transfers. The transferred code, data and/or files (“code”) are encrypted by the sender and decrypted by the receiver.
Secure transfers are, of course, rendered secure in order to make the code impenetrable to other applications and third parties. For example, encrypted code cannot be reviewed by a virus scanning application. The virus scanner cannot interpret the code and so cannot review the code for the presence of viruses. Accordingly, it would be desirable to provide an ability to review encrypted code.
Accordingly, it is an object of the present invention to provide apparatus and methods for intercepting, examining and controlling code and its transfer through secure connections in an efficient and effective manner transparently or almost transparently to the end-user, with little or no operational effort required by the user.
It is yet another object of the present invention to provide apparatus and methods that simply and effectively intercept, control, and/or examine incoming and outgoing secure code in an efficient and effective manner transparently or almost transparently to the end-user, with little or no operational effort required by the user.
The present invention comprises apparatus and methods for intercepting, examining, and controlling code transferred through a connection. The present invention may operate on a single computer system or multiple systems depending on the operating system and other variables. The present invention may, in various embodiments, process, that is, intercept, examine, and/or control any or all code streams in a computer or network. Intercepting, examining and/or controlling code includes but is not limited to monitoring, blocking, logging, quarantining, discarding or transferring code. Although the present invention can be implemented on various platforms, the preferred embodiments are used in Unix® and various Windows® environments, such as NT, 2000, 95, 98 and Me.
The preferred embodiments monitor transfers from a system using a protocol parser which may be placed on the client system, the server system, or other intermediate system or component. In the especially preferred Unix® embodiments, the protocol parser is a Unix® STREAMS module and driver activated when an application opens a STREAMS device of the proper type. In the especially preferred Windows® NT embodiments, the protocol parser is a WinNT driver activated when an application opens a communications channel. When the parser intercepts a request from a client or server for an SSL transfer the parser creates a new SSL server that communicates with the original client and a new SSL client that communicates with the original server. The SSL server and SSL client may then intercept any and all communications that occur between the original SSL client and original SSL server.
The especially preferred embodiments insert a proscribed code scanner between the protocol server and protocol client. This proscribed code scanner may be an antivirus scanner, pattern scanner, and/or content scanner or other types and provides the ability to review the content of the SSL encrypted communications.
The preferred embodiments will also intercept and review S/MIME messages. The S/MIME messages will be intercepted by the protocol parser and sent to a S/MIME decryptor. The decrypted messages can then be scanned by a proscribed code scanner, which may be an antivirus scanner, pattern scanner, and/or content scanner or other types. The proscribed code scanner will then review the code and signal whether the S/MIME message may be released from interception.
The preferred embodiments processes altered code. Altered code is defined herein as code altered by encryption or a communication protocol after being generated by an application or program for transmission to a complementary encryption or communication protocol. For example, both SSL and S/MIME alter code by securing code through encrypting and decrypting code on both the server and client ends of the communication. SSL is a protocol layer encryption used in TCP connections and implemented between the HTTP layer and the TCP layer. Code is encrypted as it passes through the SSL protocol layer. S/MIME secures code by encrypting mail messages and their attachments through a mail application.
The preferred embodiments process, that is, intercept, examine, and/or control any or all code streams transferred through any number of connections in a computer or network. Intercepting, examining and/or controlling code includes but is not limited to monitoring, blocking, logging, quarantining, discarding or transferring code.
In order to intercept the altered code, the embodiments are used in a “man in the middle” implementation.
Certain preferred embodiments are installed on a STREAMS enabled Sun Solaris Unix® platform. It should be specifically understood that embodiments can be implemented in other Unix® and Unix®—like platforms, including but not limited to Linux® and its variants, as well as other operating system platforms including but not limited to Microsoft Windows® NT, Windows® 2000, Windows® 95, 98 and Me, IBM OS/390, MacOS, VxWorks® and others.
In the preferred Unix® embodiments, when a Web browser or other application opens a STREAMS device, a STREAMS module tpicept will be inserted in the stream. As shown in
Turning to
The proscribed code scanner analyzes the code according to its configuration settings. These settings can take numerous forms, including scanning for specific proscribed code or code segments, calculating hash codes of the code or code segment and then scanning a database of proscribed hash codes, etc. If the code is acceptable, the proscribed code scanner will indicate to the protocol SSL client that the code is acceptable and can pass through the system. The protocol SSL client in turn will re-encrypt the code, and return the code to the communications stack through the tpicept module. In turn, the code is sent to the network SSL server. In this case, the process will have been virtually transparent, that is, the interception process will have minimal impact on the performance of the computer and networking connections.
If the code is not acceptable, the proscribed code scanner will indicate the code is not acceptable. In the especially preferred embodiments, that indication will be sent directly to the user and/or the application. In other embodiments, the indicator may result in access to the code being denied; in extracting the proscribed code from the remainder; in quarantining and saving or transferring the proscribed code for analysis or deleted; the proscribed code could be modified; the proscribed code could be sent to an administrator or security department or firm; etc.
The tpicept STREAMS module begins the interception when tpicept detects a connection to a specific port, such as a port commonly used for HTTPS, or a specific signal such as the STARTTLS command in the SMTP protocol. tpicept opens a channel to a protocol SSL server instance in order to send code to the protocol SSL server. tpicept will also open a protocol SSL client instance. The protocol SSL server and the protocol SSL client will continue with the usual SSL negotiations, including the choice of encryption keys, thus placing themselves in the position of the SSL server that the user client application expects to communicate with and the SSL client that the SSL network expects to communicate with.
In the preferred embodiments, implementing a single SSL connection as shown in
The user's certificate database—necessary for a SSL connection—usually is managed through the user client application. In some embodiments, this database cannot be modified directly. (However, it may be possible in other embodiments to modify this database directly.) In some embodiments, automatic verification of site specific certificates may occur, however, certificates from certificate authorities may not be accepted. If a certificate from an untrusted site is received, an notification component of the embodiment may notify the user and/or administrator of the untrusted certificate and requesting confirmation. If the user and/or administrator indicates that the certificate should be stored, then the notification component will store the certificate in its own global certificate database. Alternatively, the user or administrator could then import this certificate into the Web browser or other application database. If a certificate authority provides an unknown certificate, the certificate could be added to the Web browser or other application database through manners known in the art.
The proscribed code scanner will indicate that the messages are either acceptable, that is, not contain proscribed code, or unacceptable, that is contain proscribed code. If the indication is that the messages are acceptable, the queue releases the message to the S/MIME encryptor which re-encrypts the message and return it to the intercept module for reinsertion into the stack. If the indication is that the message is unacceptable, any of a number of actions may be taken including notifications of the user, administrator, sender, receiver, as well as blocking or the message, copying of the message to a storage area, logging of the message, etc.
The proscribed code scanner analyzes the code according to its configuration settings. These settings can take numerous forms, including scanning for specific proscribed code or code segments, calculating hash codes of the code or code segment and then scanning a database of proscribed hash codes, etc. The process will have been virtually transparent, that is, the interception process will have minimal impact on the performance of the computer and networking connections.
In order for the S/MIME decryptor component to decrypt the mail, the private key of the sender or recipient of the mail must be located and used. If the key is not found, the mail is stored or quarantined in this embodiment and the user or administrator will be notified to supply the key or its location. When the embodiment stores or quarantines received mail in this embodiment, the sender or originator will have no direct indication that this has occurred. Therefore, the storage or quarantine area is preferably checked manually. Other embodiments may notify the user, through methods known in the art, that intercepted mail is waiting in the received storage area.
Other preferred embodiments are written for the Windows® NT platform. In the especially preferred NT embodiment, installation of this embodiment begins with installing csiservice.exe in an appropriate directory or directories, e.g., WinNT\System32, as well as csitcpip.sys, an NT driver, in an appropriate directory or directories (usually, WinNT\System32\drivers). csiservice.exe provides the driver to the system when called. The protocol scanner and the proscribed code scanner are also installed at this time in appropriate directories, e.g., WinNT\System32.
After rebooting, csiservice.exe calls the driver, which in turn, will call the protocol scanner when a Web browser or other application opens a secure connection, for example a HTTPS connection. The interception settings and processes, which may be set in any of a number of ways, are as described above with regard to the UNIX® preferred embodiments.
The preferred embodiments may be used on a single machine, with a connection to another machine or system, network or the Internet. Preferred embodiments may also be used on a separate machine or system inserted in a communications channel, including but not limited to another computer, proxy server, firewall, router and the like. Moreover, using the man in the middle technology of the present invention means that any of a number of interception embodiments may be constructed in accordance with the present invention, including interception of encryption and other communication protocols known and unknown in the art. Certain embodiments may as well combine interception processes, e.g. combining both SSL and S/MIME interception processes in one embodiment, or other combinations of encryption or other communication protocols.
It should also be noted that the man in the middle technology of the present invention is not limited to use of a protocol parser, such as a Unix® intercept module, WinNT driver or other interception means. For example, embodiments implemented on a local mail system replace the local delivery agent (typically /bin/mail in a Unix® platform) with S/MIME decryptor/encryptor components which in turn will have the code scanned by a proscribed code scanner as described above.
Other embodiments can be ported to other Unix® and Unix®—like platforms, including but not limited to Linux® and its variants, as well as other operating system platforms including but not limited to Microsoft Windows® NT, Windows® 2000, Windows® 95, 98 and Me, IBM OS/390, MacOS, VxWorks® and others.
The above description and the views and material depicted by the figures are for purposes of illustration only and are not intended to be, and should not be construed as, limitations on the invention.
Moreover, certain modifications or alternatives may suggest themselves to those skilled in the art upon reading of this specification, all of which are intended to be within the spirit and scope of the present invention as defined in the attached claims.
Number | Name | Date | Kind |
---|---|---|---|
5070528 | Hawe et al. | Dec 1991 | A |
5126728 | Hall | Jun 1992 | A |
5278901 | Shieh et al. | Jan 1994 | A |
5319776 | Hile et al. | Jun 1994 | A |
5414833 | Hershey et al. | May 1995 | A |
5481735 | Mortensen et al. | Jan 1996 | A |
5511163 | Lerche et al. | Apr 1996 | A |
5550984 | Gelb | Aug 1996 | A |
5586266 | Hershey et al. | Dec 1996 | A |
5623600 | Ji et al. | Apr 1997 | A |
5682428 | Johnson | Oct 1997 | A |
5761424 | Adams et al. | Jun 1998 | A |
5802178 | Holden et al. | Sep 1998 | A |
5832208 | Chen et al. | Nov 1998 | A |
5832228 | Holden et al. | Nov 1998 | A |
5889943 | Ji et al. | Mar 1999 | A |
5916305 | Sikdar et al. | Jun 1999 | A |
5931917 | Nguyen et al. | Aug 1999 | A |
5983348 | Ji | Nov 1999 | A |
5987610 | Franczek et al. | Nov 1999 | A |
6009525 | Horstmann | Dec 1999 | A |
6067410 | Nachenberg | May 2000 | A |
6088803 | Tso et al. | Jul 2000 | A |
6178505 | Schneider et al. | Jan 2001 | B1 |
6334189 | Granger et al. | Dec 2001 | B1 |
6356951 | Gentry, Jr. | Mar 2002 | B1 |
6357008 | Nachenberg | Mar 2002 | B1 |
6389534 | Elgamal et al. | May 2002 | B1 |
6393568 | Ranger et al. | May 2002 | B1 |
6421733 | Tso et al. | Jul 2002 | B1 |
6549937 | Auerbach et al. | Apr 2003 | B1 |
6577920 | Hypponen et al. | Jun 2003 | B1 |
6697950 | Ko | Feb 2004 | B1 |
6721424 | Radatti | Apr 2004 | B1 |
6851057 | Nachenberg | Feb 2005 | B1 |
20020004819 | Agassy et al. | Jan 2002 | A1 |
20020007453 | Nemovicher | Jan 2002 | A1 |
20020073323 | Myles | Jun 2002 | A1 |
20030131061 | Newton et al. | Jul 2003 | A1 |
Number | Date | Country | |
---|---|---|---|
20020129237 A1 | Sep 2002 | US |