<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Errors - ROOT CA authority untrusted / invalid in VM-Series in the Private Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/errors-root-ca-authority-untrusted-invalid/m-p/570244#M183</link>
    <description>&lt;P&gt;Problem is not on the firewall but clueless website administrators who don't follow standards.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;RFC states:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;“If the server is authenticated, its certificate message must provide a valid certificate chain leading to an acceptable certificate authority.”&lt;/SPAN&gt;&lt;BR /&gt;&lt;A href="https://datatracker.ietf.org/doc/html/rfc5246" rel="nofollow" target="_blank"&gt;https://datatracker.ietf.org/doc/html/rfc5246&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If website does not attach intermediate in cert chain then you can either remove those sites from being tested against trusted CA check or upload those intermediate CA certs into Palo manually.&lt;/P&gt;</description>
    <pubDate>Mon, 18 Dec 2023 16:20:54 GMT</pubDate>
    <dc:creator>Raido_Rattameister</dc:creator>
    <dc:date>2023-12-18T16:20:54Z</dc:date>
    <item>
      <title>Errors - ROOT CA authority untrusted / invalid</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/errors-root-ca-authority-untrusted-invalid/m-p/524824#M84</link>
      <description>&lt;P&gt;PA-VM Series 8,&amp;nbsp;&lt;SPAN&gt;vm-mode: Microsoft Azure&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;sw-version: 10.1.6-h6 global-protect-client-package-version: 5.2.1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Issue:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;when trying to access websites, we are getting a lot of errors saying that the ROOT CA authority is untrusted/invalid&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Error details: Received fatal alert CertificateUnknown from the client. CA Issuer URL (truncated):&lt;A href="http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA" target="_blank" rel="noopener" data-aura-rendered-by="21023:0"&gt;http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA&lt;/A&gt; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Certificate Information,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;CA- Trusted Root CA&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;status Valid&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 23:45:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/errors-root-ca-authority-untrusted-invalid/m-p/524824#M84</guid>
      <dc:creator>vij</dc:creator>
      <dc:date>2022-12-21T23:45:15Z</dc:date>
    </item>
    <item>
      <title>Re: Errors - ROOT CA authority untrusted / invalid</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/errors-root-ca-authority-untrusted-invalid/m-p/524893#M85</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;The error states this has come from the client and means that the client does not trust the issue URL. Palo has pulled out the originating CA Cert for you but the issue is most likely you are doing decryption and the client does not trust your decryption cert. This is either because:&lt;/P&gt;
&lt;P&gt;1) it does not have the decryption cert chain installed and/or trusted&lt;/P&gt;
&lt;P&gt;2) the browser is not using the machine trust store (e.g. firefox) and maintains its own trust store that will need the cert chain adding&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We also see this when the traffic is from inside an application that does not use the machine trust store, or is doing cert pinning but you state your issue is with browsing so probably not that.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Shannon&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2022 21:23:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/errors-root-ca-authority-untrusted-invalid/m-p/524893#M85</guid>
      <dc:creator>SARowe_NZ</dc:creator>
      <dc:date>2022-12-22T21:23:20Z</dc:date>
    </item>
    <item>
      <title>Re: Errors - ROOT CA authority untrusted / invalid</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/errors-root-ca-authority-untrusted-invalid/m-p/524895#M86</link>
      <description>&lt;P&gt;I will try&amp;nbsp; &amp;amp; let me know.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2022 21:27:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/errors-root-ca-authority-untrusted-invalid/m-p/524895#M86</guid>
      <dc:creator>vij</dc:creator>
      <dc:date>2022-12-22T21:27:38Z</dc:date>
    </item>
    <item>
      <title>Re: Errors - ROOT CA authority untrusted / invalid</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/errors-root-ca-authority-untrusted-invalid/m-p/524898#M87</link>
      <description>&lt;P&gt;As a test, or if you completely trust this particular website, you could also exclude it from decryption; but I always prefer to resolve it properly and allow the firewall to decrypt and inspect the traffic for threats instead of just excluding decryption and blinding trusting it.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2022 21:31:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/errors-root-ca-authority-untrusted-invalid/m-p/524898#M87</guid>
      <dc:creator>SARowe_NZ</dc:creator>
      <dc:date>2022-12-22T21:31:23Z</dc:date>
    </item>
    <item>
      <title>Re: Errors - ROOT CA authority untrusted / invalid</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/errors-root-ca-authority-untrusted-invalid/m-p/563910#M166</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyone get the solution for this issue. we are getting the same issue&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Received fatal alert CertificateUnknown from client. CA Issuer URL (truncated)&lt;SPAN&gt;:&lt;A href="http://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20ECC%252" target="_blank"&gt;http://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20ECC%2&lt;/A&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;We are looking for the permanent fix as solution given in below article is the workaround for which lot of manual task need to do.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/decryption/troubleshoot-and-monitor-decryption/decryption-logs/repair-incomplete-certificate-chains" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/decryption/troubleshoot-and-monitor-decryption/decryption-logs/repair-incomplete-certificate-chains&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Nov 2023 15:44:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/errors-root-ca-authority-untrusted-invalid/m-p/563910#M166</guid>
      <dc:creator>VirupakshaRajapur</dc:creator>
      <dc:date>2023-11-01T15:44:37Z</dc:date>
    </item>
    <item>
      <title>Re: Errors - ROOT CA authority untrusted / invalid</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/errors-root-ca-authority-untrusted-invalid/m-p/563920#M167</link>
      <description>&lt;P&gt;Can you give one example URL where you get CA cert error?&lt;/P&gt;
&lt;P&gt;This usually happens if website don't include intermediate cert in the chain.&lt;/P&gt;
&lt;P&gt;Windows download intermediate certificates automatically but Linux (and Palo) does not.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Unfortunately vast amount of website admins have no idea how certificates work and what they should include...&lt;/P&gt;</description>
      <pubDate>Wed, 01 Nov 2023 16:58:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/errors-root-ca-authority-untrusted-invalid/m-p/563920#M167</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-11-01T16:58:27Z</dc:date>
    </item>
    <item>
      <title>Re: Errors - ROOT CA authority untrusted / invalid</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/errors-root-ca-authority-untrusted-invalid/m-p/564068#M168</link>
      <description>&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-Cyber-Elite lia-component-message-view-widget-author-username"&gt;&lt;A id="link_31" class="lia-link-navigation lia-page-link lia-user-name-link" href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603" target="_self" aria-label="View Profile of Raido_Rattameister"&gt;&lt;SPAN class="login-bold"&gt;Hi, Raido_Rattameister&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Below are the some URLs for which we are getting the decryption issue.&lt;/P&gt;
&lt;P&gt;As per the workaround&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/decryption/troubleshoot-and-monitor-decryption/decryption-logs/repair-incomplete-certificate-chains" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/decryption/troubleshoot-and-monitor-decryption/decryption-logs/repair-incomplete-certificate-chains&lt;/A&gt;&amp;nbsp;it's not very practical to add intermediate certificate in firewall for each and every URL and it's time consuming as well. Not sure if there is any alternate fix for this issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt" target="_blank"&gt;http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://crt.e2m02.amazontrust.com/e2m02.cer" target="_blank"&gt;http://crt.e2m02.amazontrust.com/e2m02.cer&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://cacerts.digicert.com/DigiCertGlobalG2TLSRSASHA2562020CA1" target="_blank"&gt;http://cacerts.digicert.com/DigiCertGlobalG2TLSRSASHA2562020CA1&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA" target="_blank"&gt;http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://www.microsoft.com/pki/mscorp/Microsoft%20RSA%20TLS%20CA%" target="_blank"&gt;http://www.microsoft.com/pki/mscorp/Microsoft%20RSA%20TLS%20CA%&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20ECC%2" target="_blank"&gt;http://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20ECC%2&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20TLS%2" target="_blank"&gt;http://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20TLS%2&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt" target="_blank"&gt;http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt" target="_blank"&gt;http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://cacerts.geotrust.com/GeoTrustTLSRSACAG1.crt" target="_blank"&gt;http://cacerts.geotrust.com/GeoTrustTLSRSACAG1.crt&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://cacerts.thawte.com/ThawteRSACA2018.crt" target="_blank"&gt;http://cacerts.thawte.com/ThawteRSACA2018.crt&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://pki.goog/repo/certs/gts1c3.der" target="_blank"&gt;http://pki.goog/repo/certs/gts1c3.der&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://r3.i.lencr.org/" target="_blank"&gt;http://r3.i.lencr.org/&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://zerossl.crt.sectigo.com/ZeroSSLECCDomainSecureSiteCA.crt" target="_blank"&gt;http://zerossl.crt.sectigo.com/ZeroSSLECCDomainSecureSiteCA.crt&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="lia-message-author-rank lia-component-author-rank lia-component-message-view-widget-author-rank"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Thu, 02 Nov 2023 10:31:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/errors-root-ca-authority-untrusted-invalid/m-p/564068#M168</guid>
      <dc:creator>VirupakshaRajapur</dc:creator>
      <dc:date>2023-11-02T10:31:10Z</dc:date>
    </item>
    <item>
      <title>Re: Errors - ROOT CA authority untrusted / invalid</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/errors-root-ca-authority-untrusted-invalid/m-p/570236#M182</link>
      <description>&lt;P&gt;Hi ,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any solution for that problem&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2023 13:32:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/errors-root-ca-authority-untrusted-invalid/m-p/570236#M182</guid>
      <dc:creator>asmaaelkandoussi</dc:creator>
      <dc:date>2023-12-18T13:32:14Z</dc:date>
    </item>
    <item>
      <title>Re: Errors - ROOT CA authority untrusted / invalid</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/errors-root-ca-authority-untrusted-invalid/m-p/570244#M183</link>
      <description>&lt;P&gt;Problem is not on the firewall but clueless website administrators who don't follow standards.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;RFC states:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;“If the server is authenticated, its certificate message must provide a valid certificate chain leading to an acceptable certificate authority.”&lt;/SPAN&gt;&lt;BR /&gt;&lt;A href="https://datatracker.ietf.org/doc/html/rfc5246" rel="nofollow" target="_blank"&gt;https://datatracker.ietf.org/doc/html/rfc5246&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If website does not attach intermediate in cert chain then you can either remove those sites from being tested against trusted CA check or upload those intermediate CA certs into Palo manually.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2023 16:20:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/errors-root-ca-authority-untrusted-invalid/m-p/570244#M183</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-12-18T16:20:54Z</dc:date>
    </item>
  </channel>
</rss>

