Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
I find it strange that Fortinet does not have a built-in public certificate that should be used for this. Surely, if it says it can scan for viruses/etc on the fly, it should provide the facility out of the box!
It's not possible to buy such public intermediate CA certificate! This would totally break SSL encryption. You'd be able to fake every SSL Website/Service worldwide.
Public intermediate CA certificates will be limited to specific domains, to which you are allowed to deploy certificates for. This is not what you need for deep ssl inspection.
With a private CA, you can do anything you want. Like creating your own SSL certificates for www.ubs.com, www.paypal.com, etc.
This is exactly what the Fortigate is doing when deep ssl inspection is enabled. It's decrypting the SSL connection, and creating a new encrypted connection with its own CA certificate. It will generate a new connection, because it does not have the private key for the website or the CA it's intercepting (in my example Verisign & online.citi.com). So a 'deep inspected' SSL connection to online.citi.com is divided in two seperate connections.
online.citi.com <--1--> fortigate <--2--> internal computer
1: public trusted certificate. Signed by VeriSign Class 3 Public Primary CA
2: privately trusted ceritificate. Signed by YourFortigate
There is no easy way around here. If you want to open and inspect SSL connections, you have to create your own CA Certificate and deploy it or use the one which is already on the Fortigate and deploy that one.
If there is not enough knowledge to setup an own PKI, I suggest you deploy the CA certificate already on the Fortigate.
Btw. this is not a Fortigate/Fortinet limitation, this is just how SSL interception works.
Also note.. you thoroughly need to this before enabling it globaly. Because it will most likely not work with some services/application you are using right now.
Hi,
I deploy really often the Deep-inspection solution. You don't need to buy a CA certificate. There is someway to archieve the goal:
- Have a CA Certificate in your Active Directory.
or
- Build you own CA certificate and deploy it in the GPO in the Trusted Root Certificate. That's is my prefered!
SSLVPN and CA are used in two different purposes. The CA certificate is used to decrypt and then re-encrypt the traffic to the destination computer. That's the reason computers have to trust this CA as a known trusted CA.1
To create a CA certificate, I'm using XCA, it works really fine: https://sourceforge.net/projects/xca/
Have a nice day.
Philippe
Hello everyone,
We are doing A/V on our FortiWiFi60E running FortiGateOS 6.0. Already purchased a SSL cert from a public CA authority. However, have problem uploading it into the Certificate DB into Forti60E. The CA authority send a wildcard cert for our company along with an Intermediate CA cert. The wildcard cert loads into Forti60E Certificate DB in the Certificate top sections, while the Intermediate CA certs loads into the External CA section. However, when selecting in the policy for SSL deep inspection, only the Local CA cert Forti_CA_SSL shows in the drop down list! which is the default builtin Fortinet cert. How can we select from External CA section for the SSL deep inspection cert??? Any help would be appropriated.
PS We do have a local CA running, but this would require uploading local CA cert into every device, which is not desired.
Create a browsing rule for yourself only, and enable the deep inspection and select the VPN cert and see if you get errors.... but if they recomend a CA cert then it might still cause issues seeing you say it's a "standard" cert.
CA cert will not cause issues with your VPN cert as you will not be asigning the CA cert to the VPN config...
We rolled out the Fortigate cert (what a mission that is) so we are using that for now, but will probably also go the CA route at some point as installing the fortigate cert on devices is becoming a mission
Wait
Do what was said b4 build your own CA and you still need to have that certifcate installed and trusted on the client. So no matter what you do, you ( private SelfSign or whatever ) the clients will need the certificate trusted.
The other option ( please don't do this ) is to remove certificate validation from the client, You could do this but now any site would be valid since no validation has taken place
That would be the iequal of curl -k for example.
The engineer assigned to our case, told us that we need to install the Fortigate certificate on all our workstations, which is not really possible. too many devices (windows, IOS, MAc and Android) and too many browsers
You have a CA certificate on the fortigate now, export that one if you don't want to craft a new one. When support tells you these things they should explain and process.
http://socpuppet.blogspot.com/2016/10/a-quick-and-sure-to-know-if-ssl.html
and FWIW, no commercial CA will blindly give you a CA intermediate certificate under normal means. Going to godaddy for example and buying a certificate is a "web server" certificate not a CA cert. So keep that in mind.
Ken
PCNSE
NSE
StrongSwan
So if I understanding A/V SSL deep inspection correctly, cannot be done unless is a local CA root authority certificate? public CA authorities such as Godaddy, only give intermediate CA cert, which does not contain the private key, hence no good for A/V SSL deep inspection?? Yes or No?
Thanks
Hi there,
If you want to "see" the content of outgoing https traffic then installing CA into clients is mandatory whatever the CA is yours or from FGT. This is because FGT now needs to do the deep-inspection with certificate re-sign. If you only need to check the Url then certificate-inspection can meet.
Thanks.
Hi MAK,
If you want to use your CA to do the certificate re-sign rather than the build-in one , you have to upload both the CA and key. This is because FGT will use the 'key' + CA info to re-sign the certificates coming from outside world. And yes, the public CA authorities usually won't give you the key of intermediate CA cert because if you have that key on hand, then you can sign other certificates with it as well, which means you become a sub CA authority.
Thanks everyone
Still confused on what we can do or not!
As mentioned in the original post, we cannot deploy the certificates to clients, as we have too many device types, and many not on AD/GPO.
I find it strange that Fortinet does not have a built-in public certificate that should be used for this. Surely, if it says it can scan for viruses/etc on the fly, it should provide the facility out of the box!
It sounds it is technically difficult to implement this.
Kurtly_ftnt, you seem to have managed to get it going without deployment to each devices. Sorry my knowledge about 'certificate' is not that great. Can you please elaborate on the steps to upload the CA and Key?
Anybody has been able to get AV scanning for HTTPS traffic without deploying certificate to each devices and browsers?
Thanks
I find it strange that Fortinet does not have a built-in public certificate that should be used for this. Surely, if it says it can scan for viruses/etc on the fly, it should provide the facility out of the box!
They ( FTNT ) has SelfSign Certificate CA type not public known. if they did what you are asking they would have to pay big bucks to join WEBCAB to have their CAcert trusted by all of those devices "you need the cert on", since you don't want to distribute the cert. FTNT is not in the business as a CA.
It sounds it is technically difficult to implement this.
No. it's really not that hard ;) Your understanding of the process is not clear. You injecting a MiTM is not something done easily if you want it to work. You don't wake up and deploy a HTTPS MiTM device and think it's going to work much like a US SPACE Program doesn't place a rocket engine on a pair of wings and think it will fly to mars ;)
You do have one more option that could be explored, and which requires NO cert and only will work for HTTP/HTTPS/FTP but has other gotchas
If your goal is to inspect HTTPS/HTTP , defined the fortigate as explicit proxy and then you can do all that you want with out deploying certs across devices. You will still need to publish the proxy to the clients which is the gotcha ( WPAD or PAC )
PCNSE
NSE
StrongSwan
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1662 | |
1077 | |
752 | |
443 | |
220 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.