<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic new CA Sectigo(formerly Comodo) not trusted in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/new-ca-sectigo-formerly-comodo-not-trusted/m-p/301356#M78662</link>
    <description>&lt;P&gt;Hello.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;We are having a minor issues on one of our customer firewalls performing decryption.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;it seems certain sites. that have a certificate issued by sectigo.&amp;nbsp;&lt;BR /&gt;chain&lt;/P&gt;&lt;P&gt;root: Sectigo&lt;/P&gt;&lt;P&gt;intermediate: Sectigo RSA Domain Validation Secure Server CA&lt;/P&gt;&lt;P&gt;site certificate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe the root cause of this is the fact that this CA used to be called Comodo( for which there are default trusted certificates in the palo) has been renamed to Sectigo. and I believe new certificates are issued under the new name.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;This got me wondering: how does palo alto determine the Trusted CA list, how often is it updated and how is this new list pushed to the palo alto( as there is no way to force an update I assume it is only updated when upgrading ot a later hotfix or version?)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I'm testing if this is indeed the root cause however I suspect it is.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;users having the issue with the site receive a page stating:&amp;nbsp;&lt;/P&gt;&lt;P&gt;issuer: Sectigo RSA Domain Validation Secure Server CA&lt;/P&gt;&lt;P&gt;status: untrusted&lt;/P&gt;&lt;P&gt;reason: &amp;lt;blanc&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and as a best practice we have the option to block untrusted certificates of course.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 29 Nov 2019 09:19:17 GMT</pubDate>
    <dc:creator>TommieVanHove</dc:creator>
    <dc:date>2019-11-29T09:19:17Z</dc:date>
    <item>
      <title>new CA Sectigo(formerly Comodo) not trusted</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-ca-sectigo-formerly-comodo-not-trusted/m-p/301356#M78662</link>
      <description>&lt;P&gt;Hello.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;We are having a minor issues on one of our customer firewalls performing decryption.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;it seems certain sites. that have a certificate issued by sectigo.&amp;nbsp;&lt;BR /&gt;chain&lt;/P&gt;&lt;P&gt;root: Sectigo&lt;/P&gt;&lt;P&gt;intermediate: Sectigo RSA Domain Validation Secure Server CA&lt;/P&gt;&lt;P&gt;site certificate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe the root cause of this is the fact that this CA used to be called Comodo( for which there are default trusted certificates in the palo) has been renamed to Sectigo. and I believe new certificates are issued under the new name.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;This got me wondering: how does palo alto determine the Trusted CA list, how often is it updated and how is this new list pushed to the palo alto( as there is no way to force an update I assume it is only updated when upgrading ot a later hotfix or version?)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I'm testing if this is indeed the root cause however I suspect it is.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;users having the issue with the site receive a page stating:&amp;nbsp;&lt;/P&gt;&lt;P&gt;issuer: Sectigo RSA Domain Validation Secure Server CA&lt;/P&gt;&lt;P&gt;status: untrusted&lt;/P&gt;&lt;P&gt;reason: &amp;lt;blanc&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and as a best practice we have the option to block untrusted certificates of course.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2019 09:19:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-ca-sectigo-formerly-comodo-not-trusted/m-p/301356#M78662</guid>
      <dc:creator>TommieVanHove</dc:creator>
      <dc:date>2019-11-29T09:19:17Z</dc:date>
    </item>
    <item>
      <title>Re: new CA Sectigo(formerly Comodo) not trusted</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-ca-sectigo-formerly-comodo-not-trusted/m-p/301403#M78665</link>
      <description>&lt;P&gt;hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for a temp fix, I've disabled affected sites using a no-decrypt policy, but we are also experiencing the same issue.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2019 15:30:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-ca-sectigo-formerly-comodo-not-trusted/m-p/301403#M78665</guid>
      <dc:creator>WadeV</dc:creator>
      <dc:date>2019-11-29T15:30:19Z</dc:date>
    </item>
    <item>
      <title>Re: new CA Sectigo(formerly Comodo) not trusted</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-ca-sectigo-formerly-comodo-not-trusted/m-p/301414#M78669</link>
      <description>&lt;P&gt;uploading them and defining them as trusted root ca(checkbox) also works.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;however it's a bit ugly as that certificate is not placed under default trusted root ca. but just under the regular certificates.&lt;BR /&gt;&lt;BR /&gt;I just checked on a device running latest patch of 8.1(8.1.11) sectigo is also not known as trusted on that device.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2019 16:02:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-ca-sectigo-formerly-comodo-not-trusted/m-p/301414#M78669</guid>
      <dc:creator>TommieVanHove</dc:creator>
      <dc:date>2019-11-29T16:02:20Z</dc:date>
    </item>
  </channel>
</rss>

