<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL decryption presenting untrusted certificate for certain site in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-presenting-untrusted-certificate-for-certain-site/m-p/93555#M43881</link>
    <description>&lt;P&gt;Palo Alto have certificate store and in that store we keep root CA certs. The Root CA of the website that you are visiting is not there in the store that's why you are getting that untrusted &amp;nbsp;cert. If you google for the root ca usertrust RSA certification authority you will find people are complaining about the cert.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mRemoteNG_2016-07-03_01-07-55.png" style="width: 549px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/4611i1D22870DE21366FF/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="mRemoteNG_2016-07-03_01-07-55.png" alt="mRemoteNG_2016-07-03_01-07-55.png" /&gt;&lt;/span&gt;﻿&lt;/P&gt;</description>
    <pubDate>Sun, 03 Jul 2016 08:17:08 GMT</pubDate>
    <dc:creator>pankaku</dc:creator>
    <dc:date>2016-07-03T08:17:08Z</dc:date>
    <item>
      <title>SSL decryption presenting untrusted certificate for certain site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-presenting-untrusted-certificate-for-certain-site/m-p/93475#M43878</link>
      <description>&lt;P&gt;Can somebody explain why the PA is presenting the untrusted certificate when browsing to&amp;nbsp;&lt;A href="https://community.mcafee.com" target="_blank"&gt;https://community.mcafee.com&lt;/A&gt; ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So far all of the other HTTPS sites that I've tested have worked perfectly. &amp;nbsp;This is on 7.1.3.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I opened a ticket with PAN and the tech said it's because the PAN doesn't trust some of the CA's used by that site's certificate, but I'm confused why the browsers trust it then?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Jul 2016 18:01:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-presenting-untrusted-certificate-for-certain-site/m-p/93475#M43878</guid>
      <dc:creator>Jsitter</dc:creator>
      <dc:date>2016-07-01T18:01:07Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption presenting untrusted certificate for certain site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-presenting-untrusted-certificate-for-certain-site/m-p/93555#M43881</link>
      <description>&lt;P&gt;Palo Alto have certificate store and in that store we keep root CA certs. The Root CA of the website that you are visiting is not there in the store that's why you are getting that untrusted &amp;nbsp;cert. If you google for the root ca usertrust RSA certification authority you will find people are complaining about the cert.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mRemoteNG_2016-07-03_01-07-55.png" style="width: 549px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/4611i1D22870DE21366FF/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="mRemoteNG_2016-07-03_01-07-55.png" alt="mRemoteNG_2016-07-03_01-07-55.png" /&gt;&lt;/span&gt;﻿&lt;/P&gt;</description>
      <pubDate>Sun, 03 Jul 2016 08:17:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-presenting-untrusted-certificate-for-certain-site/m-p/93555#M43881</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2016-07-03T08:17:08Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption presenting untrusted certificate for certain site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-presenting-untrusted-certificate-for-certain-site/m-p/232483#M66679</link>
      <description>&lt;P&gt;Sorry for bringing up an old post, but this came up in my search and I just wanted to add to the explanation here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can test the SSL certificate for any site here:&amp;nbsp; &lt;A href="https://www.ssllabs.com/ssltest/analyze.html" target="_self"&gt;https://www.ssllabs.com/ssltest/analyze.html&lt;/A&gt;.&amp;nbsp; If the Certification Paths indicates that one of the certificates required an "extra download", then that is an indication that the remote site did not properly include all certificates in the chain in their SSL Handshake.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example, I was having problems with &lt;A href="https://www.cisco-global-returns.com" target="_self"&gt;https://www.cisco-global-returns.com&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the Certification Paths section, we can see that the server did not provide the full certificate chain as it should (Sent by server).&amp;nbsp; You can see that the certificate USERTrust RSA Certification Authority was not sent by the server, so the testing site had to download the certificate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Snag_5029ba8.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/16793iC22A468A0D5E260D/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Snag_5029ba8.png" alt="Snag_5029ba8.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;While this is technically a problem with the configuration at the remote site, users will be frustrated that the site works properly when browsed from networks not under Palo Alto SSL Decryption.&amp;nbsp; To work around this problem, you can import the missing Intermediate certificate into your firewall.&amp;nbsp; Note however, that you will now take responsibility for ensuring that the certificate you just imported has not been revoked, so use your best judgement here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Directions for importing an Intermediate Cert:&amp;nbsp; &lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/How-to-Import-the-Intermediate-CA-on-the-Firewall/ta-p/52196" target="_self"&gt;https://live.paloaltonetworks.com/t5/Management-Articles/How-to-Import-the-Intermediate-CA-on-the-Firewall/ta-p/52196&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Sep 2018 16:26:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-presenting-untrusted-certificate-for-certain-site/m-p/232483#M66679</guid>
      <dc:creator>svintinner</dc:creator>
      <dc:date>2018-09-26T16:26:27Z</dc:date>
    </item>
  </channel>
</rss>

