- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
03-08-2017 08:21 AM
Hello,
We are planning to perform SSL Decryption for overall Web Traffic (we are a public organization of around 5000 users).
We have started several tests by implementing SSL Decryption Best practice like not decrypting "Financial Services" and "Health" categories.
However we are facing common issues with browsers that often states that connexion is not secured. This appears in various manners depending of the browser in use.
Here are some screenshots :
Internet Explorer
WebSite https://www.manor.ch/fr/
WebSite SSL https://www.migros.ch/fr.html
Firefox
WebSite https://www.manor.ch/fr/
WebSite SSL https://www.migros.ch/fr.html
As you can see, a user would think that the connexion is unsecure when SSL traffic is decrypted, thus we can't go ahead and deploy SSL decryption like this.
The certificate used for forward decryption has been signed by our internal CA, and thus is trusted by all the browsers.
How could we prevent this issue to happen ?
Regards,
Laurent
03-08-2017 08:57 AM
without seeing the certificate details, I can point out that there is an inherent issue with SSL decryption in that what you are doing technically is performing a Man-in-the-Middle attack, replacing the site's real certificate with one being supplied by the firewall.
The first question is did you supply a certificate with resigning capabilities to the Palo Alto firewall for SSL decryption or are you using a self-signed certificate?
In either case, the clients need to be able to trust the self-signed cert or the cert's provider as a trusted root CA to avoid errors. What's happening is the PA is regenerating a new cert to present to the end user's browsers which claims to be from the website, but the browser needs to be able to trust the entire chain of the cert so that someone else without authority didn't create a false certificate on behalf of the server.
I'm not sure if that's making sense, but if there is a warning that there is a problem with the site's certificate, that is why. also there are varying levels of SSL certificates, the most trusted will change the address bar to green (depending on the browser). there isn't much you can do about that.
03-08-2017 09:15 AM - edited 03-08-2017 10:24 AM
Looks good on the labssl:
https://www.ssllabs.com/ssltest/analyze.html?d=migros.ch
https://www.ssllabs.com/ssltest/analyze.html?d=www.manor.ch
As initially, l thought it is chain cert issue where IE and Chrome can deal with it and still show you a "green" padlock where Firefox will complain. Let's ask our friend @Gertjan-HFG.
@bradk14 as OP said cert is trusted by internal users.
03-08-2017 10:00 AM - edited 03-08-2017 10:01 AM
admittedly I didn't scroll all the way down that far to see the trusted CA, so I apologize.
in any case, again, it's hard to see what the cert errors being presented are just by the screenshots provided. there should always be a padlock for sure. the green bars/URL are because it's an EV cert, which PA is not generating, so that's why the green bar goes away. other icons indicate partial encryption, which is often because the page refers to non-https resources.
03-08-2017 10:12 AM
Hello,
In my testing I also saw invalid certificates until I gave the PAN a subordinate certificate so it can generate a cert on the fly. Once this was done, by my interal cert server, everything seem to be OK. IE and Chrome use the windows cert store so those should be OK. Firefox uses its own and that cert has to be imported into each firefox cert store.
Regards,
03-08-2017 11:49 AM - edited 03-08-2017 11:50 AM
Looks like your missing the "generated PA root CA" on your workstation(s).
This is why you need that:
Ensuring the Proper Certificate Authority on the Firewall and Exporting the CA to Clients
Loading or generating a CA certificate on the Palo Alto Networks firewall is needed, because a Certificate Authority (CA) is required to decrypt traffic properly by generating SSL certificates on the fly. Either create a self-signed CA on the firewall or import a subordinate CA from your own PKI infrastructure. Select Forward Trust Certificate and Forward Untrust Certificate on one or more certificates to enable the firewall to decrypt traffic. Because SSL Certificate providers like Entrust, Verisign, Digicert, and GoDaddy do not sell CAs, they are not supported in SSL Decryption.
To Generate a Self-Signed Certificate:
If a self-signed CA is used, the public CA Certificate must be exported from the firewall, then installed as a Trusted Root CA on each machine’s browser to avoid Untrusted Certificate error messages inside your browser
03-08-2017 12:47 PM - edited 03-08-2017 12:53 PM
--edit--
My comment presupposes that since you're a public company with a rather large user base you're using an internal CA. /edit
If your clients have the Root CA which is being used to generate your decryption certificate you should be fine as long as you've followed these steps:
Be sure to pay close attention to this step:
Import the Signed Certificate
On a recent CSR endeavors I did the cert that was given back to me after it was signed was renamed and wasn't working properly. Once I renamed the cert to the originally generated name the cert chained together.
Your cert chain should look something like this more than likely
03-09-2017 03:16 AM - edited 03-09-2017 03:18 AM
Hello,
Many thanks for your help so far.
First of all, as I said in my initial post, we are not using a self-signed certificate :
"The certificate used for forward decryption has been signed by our internal CA, and thus is trusted by all the browsers."
Here is a screenshot of the certificate for a website that is not working properly :
Sorry it's in french...
LSNRCA01 is ou internal CA
I have generated the CSR with "Certificate Authority" checkbox enabled.
Then, for several websites, like www.google.com it's working fine (no issue with the certificate when ssl decryption is in use) :
Regards,
Laurent
03-09-2017 04:00 AM
OK, you don't get a green bar, because with PA decryption can not send a EV certificate.
Is you use firefox you have to import the internal CA because firefox uses its own certificate store
03-09-2017 06:30 AM
If your computers are in a Windows domain you can easily use Group Policy to push your cert out too all your machines and put it in the trusted root. Like some other have mentioned this will take care of Chrome, IE, & Edge, but not Firefox as they have their own cert store and don't use the one built into Windows.
04-11-2017 01:15 AM
All of the required certificates are in the appropriate certificate store.
Without talking abouot Firefox, my main concern is dealing with IE since this is our corporate browser.
I still can't deploy SSL decryption, because the visual aspect of the browser bar is significaly different when the SSL decryption is enabled. As you can see from my first post above, with IE it's likely there is no secured session established despite the fact that SSL decyption is enabled...
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!