<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issues using Elliptic Curve DSA certificates with GlobalProtect agent in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/issues-using-elliptic-curve-dsa-certificates-with-globalprotect/m-p/443240#M1927</link>
    <description>&lt;P&gt;Oh, thought I had included the OS version, but guess that was a different topic.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PanOS 9.1.9 on all firewalls (portal and gateways).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The EC certificates work for Windows, MacOS, iOS, and Android GlobalProtect agents.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;They fail for Linux GlobalProtect agents.&amp;nbsp; Tried with GP 5.1.x, 5.2.x, and 5.3.x (multiple versions of each, including the latest version of each).&lt;/P&gt;</description>
    <pubDate>Mon, 25 Oct 2021 17:44:50 GMT</pubDate>
    <dc:creator>fjwcash</dc:creator>
    <dc:date>2021-10-25T17:44:50Z</dc:date>
    <item>
      <title>Issues using Elliptic Curve DSA certificates with GlobalProtect agent</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/issues-using-elliptic-curve-dsa-certificates-with-globalprotect/m-p/439753#M1863</link>
      <description>&lt;P&gt;Anyone else come across this?&amp;nbsp; Anyone using ECDSA certs for their GlobalProtect Portal or Gateways?&amp;nbsp; Have you tried non-Windows/MacOS clients?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Configuring GlobalProtect Gateways to use ECDSA certs instead of RSA certs breaks everything except Windows, MacOS, and mobile agents.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As the SSL cert industry seems to be heading toward deprecating RSA certs in the 5-ish years, I thought I'd get a jump on things and test it out on our GP setup.&amp;nbsp; Added ECDSA certs to one Gateway, tested it with Windows and Android clients, and everything was good.&amp;nbsp; Ran it for a few weeks, and pushed it out to a second Gateway.&amp;nbsp; Tested that one with Windows, MacOS, and iOS client, and everything was good.&amp;nbsp; Pushed it out to all our Gateways except one, and no issues reported.&amp;nbsp; That was in July 2021.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One of the clients is a Grandstream VoIP phone running an old version of Android that we use for work-from-home staff.&amp;nbsp; As it's Android-based, we can use the built-in VPN client to connect to GlobalProtect via X-Auth.&amp;nbsp; Worked great until school started again in September.&amp;nbsp; The staff member could not keep the phone online for an hour, let alone a full workday.&amp;nbsp; Calls were choppy, calls were dropped, phone locked up, all kinds of issues.&amp;nbsp; Switched the GlobalProtect Gateway back to using RSA certs ... and all the issues went away.&amp;nbsp; (Didn't fix this one until this week, so there's no support ticket in for this one.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Added a new user to one of the Gateways using ECDSA certs.&amp;nbsp; That user has an Ubuntu laptop.&amp;nbsp; Tried GP 5.2.x and 5.3.x (multiple versions of each).&amp;nbsp; Would not connect to the Gateway (Portal auth worked), would just hang the agent or give error messages about authenticating the server.&amp;nbsp; And you could not sign out of the agent, that option was missing from the client UI!&amp;nbsp; Had to force uninstall/install in order to change usernames in the agent, in order to test a connection to a different gateway.&amp;nbsp; Switched the GlobalProtect Gateway back to using RSA certs ... and all the issues went away.&amp;nbsp; (We have support tickets in for these two issues.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We've now removed all traces of ECDSA certs from our GlobalProtect infrastructure.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Oct 2021 18:41:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/issues-using-elliptic-curve-dsa-certificates-with-globalprotect/m-p/439753#M1863</guid>
      <dc:creator>fjwcash</dc:creator>
      <dc:date>2021-10-08T18:41:26Z</dc:date>
    </item>
    <item>
      <title>Re: Issues using Elliptic Curve DSA certificates with GlobalProtect agent</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/issues-using-elliptic-curve-dsa-certificates-with-globalprotect/m-p/441404#M1892</link>
      <description>&lt;P&gt;What is the PanOS version of the gateways ? Please see:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/compatibility-matrix/supported-cipher-suites.html" target="_blank"&gt;https://docs.paloaltonetworks.com/compatibility-matrix/supported-cipher-suites.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 17 Oct 2021 13:39:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/issues-using-elliptic-curve-dsa-certificates-with-globalprotect/m-p/441404#M1892</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2021-10-17T13:39:17Z</dc:date>
    </item>
    <item>
      <title>Re: Issues using Elliptic Curve DSA certificates with GlobalProtect agent</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/issues-using-elliptic-curve-dsa-certificates-with-globalprotect/m-p/443240#M1927</link>
      <description>&lt;P&gt;Oh, thought I had included the OS version, but guess that was a different topic.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PanOS 9.1.9 on all firewalls (portal and gateways).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The EC certificates work for Windows, MacOS, iOS, and Android GlobalProtect agents.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;They fail for Linux GlobalProtect agents.&amp;nbsp; Tried with GP 5.1.x, 5.2.x, and 5.3.x (multiple versions of each, including the latest version of each).&lt;/P&gt;</description>
      <pubDate>Mon, 25 Oct 2021 17:44:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/issues-using-elliptic-curve-dsa-certificates-with-globalprotect/m-p/443240#M1927</guid>
      <dc:creator>fjwcash</dc:creator>
      <dc:date>2021-10-25T17:44:50Z</dc:date>
    </item>
    <item>
      <title>Re: Issues using Elliptic Curve DSA certificates with GlobalProtect agent</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/issues-using-elliptic-curve-dsa-certificates-with-globalprotect/m-p/444840#M2089</link>
      <description>&lt;P&gt;You may need to provide the PanGPS logs that may show something usefull as you are having interesting issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also please clarify if you mean you changed to ECDSA certficates on the Gateways and not the for ssl certificate client based authentication?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also this is interesting as I do not see linux so maybe it is not supported yet but the TAC support should say and add Linux in the below link as this should have been done.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/globalprotect/9-1/globalprotect-admin/globalprotect-cryptography/globalprotect-cryptography-references/tls-cipher-suites-supported-by-globalprotect-apps.html" target="_blank"&gt;https://docs.paloaltonetworks.com/globalprotect/9-1/globalprotect-admin/globalprotect-cryptography/globalprotect-cryptography-references/tls-cipher-suites-supported-by-globalprotect-apps.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Nov 2021 18:42:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/issues-using-elliptic-curve-dsa-certificates-with-globalprotect/m-p/444840#M2089</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2021-11-01T18:42:37Z</dc:date>
    </item>
    <item>
      <title>Re: Issues using Elliptic Curve DSA certificates with GlobalProtect agent</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/issues-using-elliptic-curve-dsa-certificates-with-globalprotect/m-p/452452#M2216</link>
      <description>&lt;P&gt;We don't have the logs anymore as we've removed all ECDSA certificates from our GP setup.&amp;nbsp; The certs don't even exist anymore.&amp;nbsp; We don't use device certs, these were the certificates used in the gateway configuration.&amp;nbsp; This was simply changing the self-signed CA root certificate and the certificates used for the gateways (signed by the root CA) to ECDSA.&amp;nbsp; The portal uses our domain's wildcard cert.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With the ECDSA certificate enabled on the gateway, Windows and MacOS, Android and iOS GP clients were able to connect to the gateway without issues.&amp;nbsp; Linux clients, regardless of GP client version, would connect to the portal, authenticate the user, connect to the gateway, then error out with something along the lines of "can't authenticate server" when it went to establish the SSL connection to the gateway.&amp;nbsp; The really interesting part was that manually loading &lt;A href="https://gateway.address/whatever-the-pre-flight" target="_blank"&gt;https://gateway.address/whatever-the-pre-flight-URL-is&lt;/A&gt;&amp;nbsp;in a web browser on the same Linux station worked.&amp;nbsp; It was just the GP connection that failed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nothing in the gateway configuration on the firewall changed, except which certificate was in use (RSA or ECDSA).&amp;nbsp; We flipped it back to RSA, and Linux clients could connect without issue.&amp;nbsp; Flipped it back to ECDSA, Linux clients would not connect.&amp;nbsp; We even configured 1 gateway with RSA certs and another gateway with ECDSA certs, and would either get a working connection or a failed connection based on which username we logged in with (the username determines which gateway is used).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tried with GP 5.1.x, 5.2.x, and 5.3.x and the results were the same.&amp;nbsp; Linux clients could not authenticate the gateway and would not establish a connection if the gateway used ECDSA certificates.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We've since moved back to RSA certificates for everything on our firewalls, and won't be looking into ECDSA anytime in the future.&amp;nbsp; We have more Linux stations than Windows in our workplace, so we need to make sure the Linux stations connect to GlobalProtect.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Dec 2021 22:00:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/issues-using-elliptic-curve-dsa-certificates-with-globalprotect/m-p/452452#M2216</guid>
      <dc:creator>fjwcash</dc:creator>
      <dc:date>2021-12-09T22:00:29Z</dc:date>
    </item>
  </channel>
</rss>

