<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL decryption - Forward UNtrust certificate presented in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-forward-untrust-certificate-presented/m-p/14554#M10684</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It seems that (at least PANOS 5.0.0) have the root cert named "Go Daddy Class 2 Certification Author" but not the intermediate cert which issued the cert for the above site named "Go Daddy Secure Certification Authority".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess when you import the intermediate cert you need to have the root cert in the same pem file for it to be successful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately I always forgets if its root first and then intermediate or the other way around. I mean if the pem file should have this structure (or the other way around):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---PUBLIC CERT (root)---&lt;/P&gt;&lt;P&gt;text&lt;/P&gt;&lt;P&gt;---END PUBLIC CERT---&lt;/P&gt;&lt;P&gt;---PUBLIC CERT (intermediate)---&lt;/P&gt;&lt;P&gt;text&lt;/P&gt;&lt;P&gt;---END PUBLIC CERT---&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 05 Dec 2012 22:31:09 GMT</pubDate>
    <dc:creator>mikand</dc:creator>
    <dc:date>2012-12-05T22:31:09Z</dc:date>
    <item>
      <title>SSL decryption - Forward UNtrust certificate presented</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-forward-untrust-certificate-presented/m-p/14552#M10682</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We experienced a problem with a specific SSL encrypted site: &lt;A href="https://panakeia.infoman.de/" title="https://panakeia.infoman.de/"&gt;https://panakeia.infoman.de/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The original certificate is issued to "*.infoman.de" and was issued by Go Daddy (--&amp;gt; &lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11.818181991577148px; background-color: #ffffff;"&gt;InfomanCert_Original.png&lt;/SPAN&gt;). It seems to be perfectly valid but still our PA-2050 thinks different and presents our internal clients a SSL certificate issued by our "Forward Untrust" CA certificate (--&amp;gt; &lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11.818181991577148px; background-color: #ffffff;"&gt;InfomanCert_Untrusted.png&lt;/SPAN&gt;).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone know how we can troubleshoot this issue? The logs doesn't reveal much information...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Oliver&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Dec 2012 16:57:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-forward-untrust-certificate-presented/m-p/14552#M10682</guid>
      <dc:creator>oschuler</dc:creator>
      <dc:date>2012-12-05T16:57:53Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption - Forward UNtrust certificate presented</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-forward-untrust-certificate-presented/m-p/14553#M10683</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Addendum:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We already tried to import the Go Daddy Root CA but still got the same certificate error. Also it seems not to be related to Go Daddy certificates. If we open &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://www.godaddy.com/"&gt;https://www.godaddy.com&lt;/A&gt;&lt;SPAN&gt; (which has exactly the same chain-of-trust as the Infoman certificate), the firewall decrypts perfectly right and presents the browser the correct "Forward Trust" certificate. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" class="jiveBorder" style="border: 1px solid #000000; width: 100%;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TH style="text-align: center; background-color: #6690bc; color: #ffffff; padding: 2px;" valign="middle"&gt;&lt;STRONG&gt;Original Certificate&lt;/STRONG&gt;&lt;/TH&gt;&lt;TH style="text-align: center; background-color: #6690bc; color: #ffffff; padding: 2px;" valign="middle"&gt;&lt;STRONG&gt;PA created "Forward Trust" Certificate&lt;/STRONG&gt;&lt;/TH&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 2px; text-align: center;"&gt;&lt;IMG __jive_id="4868" alt="GoDaddy_Original.png" class="jive-image-thumbnail jive-image jiveImage" src="https://live.paloaltonetworks.com/legacyfs/online/4868_GoDaddy_Original.png" width="450" /&gt;&lt;/TD&gt;&lt;TD style="padding: 2px; text-align: center;"&gt;&lt;IMG __jive_id="4869" alt="GoDaddy_Trusted.png" class="jive-image-thumbnail jive-image jiveImage" src="https://live.paloaltonetworks.com/legacyfs/online/4869_GoDaddy_Trusted.png" width="450" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Dec 2012 17:04:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-forward-untrust-certificate-presented/m-p/14553#M10683</guid>
      <dc:creator>oschuler</dc:creator>
      <dc:date>2012-12-05T17:04:06Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption - Forward UNtrust certificate presented</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-forward-untrust-certificate-presented/m-p/14554#M10684</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It seems that (at least PANOS 5.0.0) have the root cert named "Go Daddy Class 2 Certification Author" but not the intermediate cert which issued the cert for the above site named "Go Daddy Secure Certification Authority".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess when you import the intermediate cert you need to have the root cert in the same pem file for it to be successful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately I always forgets if its root first and then intermediate or the other way around. I mean if the pem file should have this structure (or the other way around):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---PUBLIC CERT (root)---&lt;/P&gt;&lt;P&gt;text&lt;/P&gt;&lt;P&gt;---END PUBLIC CERT---&lt;/P&gt;&lt;P&gt;---PUBLIC CERT (intermediate)---&lt;/P&gt;&lt;P&gt;text&lt;/P&gt;&lt;P&gt;---END PUBLIC CERT---&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Dec 2012 22:31:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-forward-untrust-certificate-presented/m-p/14554#M10684</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-12-05T22:31:09Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption - Forward UNtrust certificate presented</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-forward-untrust-certificate-presented/m-p/14555#M10685</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN&gt;I will try that tomorrow, thank you. But if that works I can still not explain myself why SSL decryption works for &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://www.godaddy.com"&gt;https://www.godaddy.com&lt;/A&gt;&lt;SPAN&gt; but not for &lt;/SPAN&gt;&lt;A href="https://panakeia.infoman.de/" style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; text-decoration: underline; color: #316989; background-color: #ffffff;" title="https://panakeia.infoman.de/"&gt;https://panakeia.infoman.de.&lt;/A&gt; They both have the same Root and also the same Intermediate certificate in the chain...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Dec 2012 23:00:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-forward-untrust-certificate-presented/m-p/14555#M10685</guid>
      <dc:creator>oschuler</dc:creator>
      <dc:date>2012-12-05T23:00:32Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption - Forward UNtrust certificate presented</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-forward-untrust-certificate-presented/m-p/14556#M10686</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Uhm yeah...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could it be that PA have some bug where "whatever.example.com" wont match a wildcard cert issued for "*.example.com" since "whatever" != "*" ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only differences I could pick up between the two certs (since both intermediate and root cert was the same):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[*.infoman.de]&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://crl.godaddy.com/gds1-28.crl"&gt;http://crl.godaddy.com/gds1-28.crl&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.16.840.1.114413.1.7.23.1:&lt;/P&gt;&lt;P&gt;&amp;nbsp; Certification Practice Statement pointer:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://certs.godaddy.com/repository/"&gt;https://certs.godaddy.com/repository/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DNS Name: *.infoman.de&lt;/P&gt;&lt;P&gt;DNS Name: infoman.de&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[www.godaddy.com]&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://crl.godaddy.com/gds3-61.crl"&gt;http://crl.godaddy.com/gds3-61.crl&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.16.840.1.114413.1.7.23.3:&lt;/P&gt;&lt;P&gt;Extended Validation (EV) SSL Server Certificate&lt;/P&gt;&lt;P&gt;&amp;nbsp; Certification Practice Statement pointer:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://certificates.godaddy.com/repository/"&gt;http://certificates.godaddy.com/repository/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DNS Name: www.godaddy.com&lt;/P&gt;&lt;P&gt;DNS Name: godaddy.com&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Dec 2012 23:19:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-forward-untrust-certificate-presented/m-p/14556#M10686</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-12-05T23:19:27Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption - Forward UNtrust certificate presented</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-forward-untrust-certificate-presented/m-p/14557#M10687</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Exactly. I thought of such a problem as well and tested another site (&lt;A href="https://www.owasp.org/" title="https://www.owasp.org/"&gt;OWASP&lt;/A&gt;) with a wildcard certificate which also works perfectly well &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; It is issued also by the same two Go Daddy CAs like the other two examples. That leads me to the only conclusion that the culprit must be somewhere inside the PA. For an unknown reason the PA thinks the original certificate presented by the Infoman server is invalid and issues a "Forward Untrust" certificate...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe time to open a bug report?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2012 06:41:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-forward-untrust-certificate-presented/m-p/14557#M10687</guid>
      <dc:creator>oschuler</dc:creator>
      <dc:date>2012-12-06T06:41:59Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption - Forward UNtrust certificate presented</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-forward-untrust-certificate-presented/m-p/14558#M10688</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="text-align: left; color: #575757; text-indent: 0px;"&gt;Another example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: left; color: #575757; text-indent: 0px;"&gt;&lt;A class="jive-link-external-small" href="https://www.tradepayablesservices.com/"&gt;https://www.tradepayablesservices.com&lt;/A&gt;&lt;/P&gt;&lt;P style="text-align: left; color: #575757; text-indent: 0px;"&gt;&lt;/P&gt;&lt;TABLE border="1" class="jiveBorder" style="border: 1px solid rgb(0, 0, 0); width: 100%;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TH style="text-align: center; background-color: #6690bc; color: #ffffff; padding: 2px;" valign="middle"&gt;&lt;STRONG&gt;Original Certificate&lt;/STRONG&gt;&lt;/TH&gt;&lt;TH style="text-align: center; background-color: #6690bc; color: #ffffff; padding: 2px;" valign="middle"&gt;&lt;STRONG&gt;PA created "Forward UNTRUST Certificae"&lt;/STRONG&gt;&lt;/TH&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 2px; text-align: center;"&gt;&lt;IMG alt="GE_original_valid_cert.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/4890_GE_original_valid_cert.png" width="450" /&gt;&lt;/TD&gt;&lt;TD style="padding: 2px; text-align: center;"&gt;&lt;IMG alt="GE_invalid_cert.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/4891_GE_invalid_cert.png" width="450" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Dec 2012 11:34:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-forward-untrust-certificate-presented/m-p/14558#M10688</guid>
      <dc:creator>oschuler</dc:creator>
      <dc:date>2012-12-10T11:34:20Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption - Forward UNtrust certificate presented</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-forward-untrust-certificate-presented/m-p/14559#M10689</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We opened a ticket. The PA engineer replied with the following explanation:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The two mentioned websites don't deliver the complete certificate chain with their SSL negotiation. This can be verified with the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 60px;"&gt;&lt;SPAN lang="EN-US" style="font-size: 10pt; font-family: 'courier new', courier;"&gt;openssl s_client -connect &amp;lt;URL&amp;gt;:443 -showcerts &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="font-size: 10.0pt; font-family: 'Calibri','sans-serif';"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="font-size: 10.0pt; font-family: 'Calibri','sans-serif';"&gt;A possible workaround is to import the intermediate certificate and mark it as "Trusted Root CA" on the firewall. &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2012 19:02:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-forward-untrust-certificate-presented/m-p/14559#M10689</guid>
      <dc:creator>oschuler</dc:creator>
      <dc:date>2012-12-11T19:02:51Z</dc:date>
    </item>
  </channel>
</rss>

