- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
03-15-2023 06:44 AM
Our firewalls cannot send to hooks.slack.com since they refreshed their cert yesterday (3/14/2023).
I suspect a problem with the way their chain is signing X1 root CA but until they fix it, is there a way to allow the log forwarding service to ignore the invalid cert and send anyway? I see a kb article about doing this for decryption profiles, but not sure if it applies here.
Also is there any debugging that can be done on the palo to get more specific detail about what its problem is with the cert?
Thanks in advance for anyone who can advise.
03-15-2023 08:00 AM
I'm advised by Slack and the LetsEncrypt folks that the "long chain" certificate format being used is valid, so I guess I need a way to tell the firewall that this is okay.
We're running PanOS 9.1.x -- possible this is addressed in a later OS update?
03-15-2023 01:02 PM
We're running 10.1.8-h2 but having the same issue.
03-15-2023 01:19 PM
Well there go my hopes for an upgrade solution.
Testing against any LE long-chain server (e.g., letsencrypt.org slack.com nba.com) results in failure. Testing against any LE short-chain (e.g., la-sso.bounce51.com) or non-LE (e.g., gmail.com) results in successful validation.
So it does appear to be tied to how Palo's Log Forwarding HTTPS process interprets that long-chain LetsEncrypt cert with the expired X3 root.
Do you have a PaloAlto support case open? We should reference each other so they know this is not us, it's them.
03-16-2023 06:42 AM
Hello everyone,
We're running 10.0.8-h4 but having the same issue for 3 days. We follow some logs with push notification from Slack.
If you find the solution to the problem, can you share it here?
I hope this issue will be resolved as soon as possible.
03-16-2023 07:16 AM
@onercan and @scottymuse Can you provide your PaloAlto suport case #numbers? I'd like to make sure they are aware this is a PAN-OS issue, not any of our specific configurations.
03-16-2023 07:16 AM
Can you both provide your PaloAlto suport case #numbers? I'd like to make sure they are aware this is a PAN-OS issue, not any of our specific configurations.
03-16-2023 01:13 PM
I just created case 02499701
03-17-2023 10:03 AM
No solution yet @onercan -- can you share your PaloAlto support case number? It will help lend weight when we can make clear that this is not an individual config problem, but rather a PanOS problem.
03-20-2023 09:51 AM
We can't open to case for 10.0.8-h4 End of Support.
Did palo alto engineers respond to the case? @scottymuse
03-20-2023 10:04 AM
We know it's not inherent to the PanOS version, as I'm runing 9.1 and @scottymuse is running 10.1.
Are your firewalls just not under support at all? As long as they are, even on the end-of-support OS, you should be able to raise a case and it would help put pressure on Palo to acknowledge and address it.
Also press the issue with Slack -- it's their change that broke things.
03-20-2023 10:14 AM
Here is the latest response I received:
Greetings!
As you mentioned earlier there is a workaround going on related to this issue.
It is related to a feature request.
I have checked the case associated with Rlarose and the case was closed.
Kindly Let me know if you have any concerns regarding this issue I will be happy to assist you.
Have a great day!
I'm not exactly happy with that reply. The workaround I mentioned to TAC was we stopped using it temporarily while it is broken and modified our workflow. I guess properly reading certs is a feature request now?
03-20-2023 10:19 AM
My case has not been closed -- they're referring to the case about 2 weeks prior when slack also jiggled the handle on their cert (maybe a dry-run?) which caused me some trouble.
My open, active, unresovled case number you can reference is 02496793
03-20-2023 10:28 AM
Yeah, I figured there was some confusion (to put it mildly) on that reply regarding your case. I've replied asking for a time frame I could expect this feature request to be fulfilled.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!