<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Decryption - replacing Forward Trust Certificate not working for IOS devices in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-replacing-forward-trust-certificate-not-working/m-p/548561#M112001</link>
    <description>&lt;P&gt;Problem was related (in my case) to the encryption length of the sub CA. For IOS and Linux devices the subCA must have a minimum length of 3072 Bit (CA/Browser Forum should have decided that starting from 1/06/2021 )&lt;/P&gt;</description>
    <pubDate>Fri, 07 Jul 2023 13:15:39 GMT</pubDate>
    <dc:creator>christian_pacher</dc:creator>
    <dc:date>2023-07-07T13:15:39Z</dc:date>
    <item>
      <title>SSL Decryption - replacing Forward Trust Certificate not working for IOS devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-replacing-forward-trust-certificate-not-working/m-p/459996#M102022</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Forward Trust certificate on a PA-820 firewall pair was expiring, so we issued a new SubCA certificate from the Windows ADCS root CA server and updated it on the firewall. The certificate was imported with a 2048bit key and there is a password on the key. Since switching over to the new certificate for forward trust (SSL Decryption), IOS devices are no longer able to browse to the internet when an SSL Decryption policy is applied, where Windows devices are able to without issue. The IOS devices show an error “This connection is not private”.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have verified the certificate trust chain is valid and correct on other devices, and I have verified that the root CA is trusted on the IOS devices. Switching back to the old certificate fixes the issue, however this certificate has now expired.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have also tried re-issuing the SubCA certificate several times with various changes without any success. The Decryption profile supports tls 1.0 -1.2, however I also tried enabling 1.3 and this made no difference. (this has been reverted now).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the decryption log on the firewall I see the following errors “Received fatal alert CertificateUnknown from client. CA Issuer URL…&amp;gt;”&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I have tried Chrome and Safari.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I have tried IOS 14 and 15 (latest).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;All websites are affected&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Used the same certificate template as the previous SubCA cert&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Restarted management server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone have any idea what may be causing this issue and what steps we can take to diagnose and resolve the issue?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jan 2022 01:41:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-replacing-forward-trust-certificate-not-working/m-p/459996#M102022</guid>
      <dc:creator>Ben-Price</dc:creator>
      <dc:date>2022-01-21T01:41:03Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption - replacing Forward Trust Certificate not working for IOS devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-replacing-forward-trust-certificate-not-working/m-p/460012#M102024</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/181759"&gt;@Ben-Price&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Do the iOS devices have the new SubCA added as a trusted certificate within their certificate store or the required root/intermediate certificates for this SubCA cert to be trusted? Right off the bat I would really look at the certificates your forcing on iOS through I would assume your MDM solution.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jan 2022 03:44:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-replacing-forward-trust-certificate-not-working/m-p/460012#M102024</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2022-01-21T03:44:14Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption - replacing Forward Trust Certificate not working for IOS devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-replacing-forward-trust-certificate-not-working/m-p/460018#M102026</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;Yes, the required root CA is trusted on the iOS devices. It is the same Root CA that issued the last SubCA cert. Tried installing the SubCA cert on the iOS device and trusting that but still the same issue.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jan 2022 03:56:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-replacing-forward-trust-certificate-not-working/m-p/460018#M102026</guid>
      <dc:creator>Ben-Price</dc:creator>
      <dc:date>2022-01-21T03:56:50Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption - replacing Forward Trust Certificate not working for IOS devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-replacing-forward-trust-certificate-not-working/m-p/514064#M106729</link>
      <description>&lt;P&gt;Did you ever get this resolved. Running into very similar issue with mac/ios.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Sep 2022 15:33:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-replacing-forward-trust-certificate-not-working/m-p/514064#M106729</guid>
      <dc:creator>Jake_Aguinaga</dc:creator>
      <dc:date>2022-09-06T15:33:09Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption - replacing Forward Trust Certificate not working for IOS devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-replacing-forward-trust-certificate-not-working/m-p/514798#M106843</link>
      <description>&lt;P&gt;It looks like in PANOS 10.2 you have to create the forward trust CA on the firewall, and not from another CA. Could be the same issue with other OS versions as well.&lt;/P&gt;
&lt;P&gt;Recreating the trust CA on the firewall fixed my problem in 10.2&lt;/P&gt;</description>
      <pubDate>Wed, 14 Sep 2022 07:53:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-replacing-forward-trust-certificate-not-working/m-p/514798#M106843</guid>
      <dc:creator>jorgensovik</dc:creator>
      <dc:date>2022-09-14T07:53:35Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption - replacing Forward Trust Certificate not working for IOS devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-replacing-forward-trust-certificate-not-working/m-p/548561#M112001</link>
      <description>&lt;P&gt;Problem was related (in my case) to the encryption length of the sub CA. For IOS and Linux devices the subCA must have a minimum length of 3072 Bit (CA/Browser Forum should have decided that starting from 1/06/2021 )&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jul 2023 13:15:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-replacing-forward-trust-certificate-not-working/m-p/548561#M112001</guid>
      <dc:creator>christian_pacher</dc:creator>
      <dc:date>2023-07-07T13:15:39Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption - replacing Forward Trust Certificate not working for IOS devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-replacing-forward-trust-certificate-not-working/m-p/548949#M112042</link>
      <description>&lt;P&gt;The fix has been in place for a while but it's worth posting this in case people run into this issue. There was an issue that impacted MAC devices, was fixed in 10.2.3+ and 10.1.8+&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000sZJuCAM" target="_blank"&gt;With Decryption enabled, macOS Monterey and above are having ce... - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 15:52:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-replacing-forward-trust-certificate-not-working/m-p/548949#M112042</guid>
      <dc:creator>rmfalconer</dc:creator>
      <dc:date>2023-07-11T15:52:37Z</dc:date>
    </item>
  </channel>
</rss>

