@JayGolf wrote:
Hi @L.Yalezo ,
Currently, there is no code-level resolution for automatically updating this list outside of major PAN-OS releases nor is there a "feature request" for this. You can manually import it as a trusted root CA to ensure that your firewall trusts the new Sectigo root certs.
There is a FR for this, (which is NSFR-I-21203)...At least I'm told there was and that my company was added to the FR. I'll look for it and share it here. That said this is something that Palo know about for years and something I've been complaining about to palo for the past 5+ years. It's so bad that a whole repo process was setup to solve this issue Palo has ignored.
https://github.com/PaloAltoNetworks/pan-chainguard
There is partial good news. In 12.1.2 Palo is trying to solve the missing intermediate cert issue as PAN-OS will attempt to dynamically download missing intermediate certificates (No current solve for roots, other than the code upgrade.)
Automatic Retrieval of Intermediate Certificates Using AIA
"We introduced a mechanism to fetch intermediate certificates via the AIA extension. This mechanism can be toggled on/off by a new Decryption Profile setting: “Automatically Fetch Intermediate Certificates” As part of decryption, when we encounter a server certificate with an incomplete chain, and the AIA CA Issuers extension is present (RFC5280), we will attempt to download an Intermediate CA certificate from the specified URL. If successful, we cache the intermediate certificate for up to 1 week and use it to validate future traffic." *Caveats: The first session will show untrusted until the intermediate certificate(s) have been fetched*
Note:
This feature must be enabled on a Decryption Profile (“Automatically Fetch Intermediate Certificates”) The intermediate certificate cache itself is only present on firewalls (not Panorama or SCM) Panorama and SCM can only enable/disable the feature
https://docs.paloaltonetworks.com/ngfw/release-notes/12-1/features-introduced-in-pan-os/decryption-features
... View more