Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
fireon
New Contributor III

Microsoft Update Secure Server CA 2.1 not trusted in Fortgate or Webbrowser

Hello all, 

 

Affected: FortiOS 6 to 7.2.4. Webbrowser, Devices, everything that is not Windows.

If you have Certificate Inspection, deep inspection enabled, Windowsupdates are not possibel anymore. To only way is to import the CA in the Fortigate. But the question arises, why was this CA not integrated into any Windows devices?

 

Example: https://sls.update.microsoft.com

 

i noticed that the Microsoft Update Secure Server CA 2_1 certificate is not trusted by Fortigate.

But not only that. This certificate is not trusted at all. From no device, no website, no tool. Only Microsoft Windows itself has this CA on board. How can that be? 

 

Screenshot_20240120_011427.png

https://www.ssllabs.com/ssltest/analyze.html?d=sls.update.microsoft.com&s=52.165.165.26&hideResults=...

 

openssl s_client -connect sls.update.microsoft.com:443
CONNECTED(00000003)
depth=1 C = US, ST = Washington, L = Redmond, O = Microsoft Corporation, CN = Microsoft Update Secure Server CA 2.1
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 C = US, ST = WA, L = Redmond, O = Microsoft, OU = DSP, CN = sls.update.microsoft.com
verify return:1
---
Certificate chain
 0 s:C = US, ST = WA, L = Redmond, O = Microsoft, OU = DSP, CN = sls.update.microsoft.com
   i:C = US, ST = Washington, L = Redmond, O = Microsoft Corporation, CN = Microsoft Update Secure Server CA 2.1
   a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
   v:NotBefore: Apr 27 19:46:13 2023 GMT; NotAfter: Apr 27 19:46:13 2024 GMT
 1 s:C = US, ST = Washington, L = Redmond, O = Microsoft Corporation, CN = Microsoft Update Secure Server CA 2.1
   i:C = US, ST = Washington, L = Redmond, O = Microsoft Corporation, CN = Microsoft Root Certificate Authority 2011
   a:PKEY: rsaEncryption, 4096 (bit); sigalg: RSA-SHA256
   v:NotBefore: Jun 21 17:33:35 2012 GMT; NotAfter: Jun 21 17:43:35 2027 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----
MIIGQjCCBCqgAwIBAgITMwAAAddhBWmNlzCE0QAAAAAB1zANBgkqhkiG9w0BAQsF
ADCBhDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEuMCwGA1UE
AxMlTWljcm9zb2Z0IFVwZGF0ZSBTZWN1cmUgU2VydmVyIENBIDIuMTAeFw0yMzA0
MjcxOTQ2MTNaFw0yNDA0MjcxOTQ2MTNaMHExCzAJBgNVBAYTAlVTMQswCQYDVQQI
EwJXQTEQMA4GA1UEBxMHUmVkbW9uZDESMBAGA1UEChMJTWljcm9zb2Z0MQwwCgYD
VQQLEwNEU1AxITAfBgNVBAMTGHNscy51cGRhdGUubWljcm9zb2Z0LmNvbTCCASIw
DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMlEb/FONdbWgXAgHslWDMAChdLu
I3uShHerlz62/N8Qfl2W70+WOWWCI+BNhMglsAK7jc3Z2qpTQDqseQcgEARJgqRC
dNlDcYMWMKvoKlPV7mg/dak+tEAZWk6a1+Cfusnr8biPZmg82S/C0iLc7K6P4vUh
BW3L3j07LhJNCn+8dR2gl7ByvLWrjXhZTIDW8HSG79eu07LLgHJaHBD23+AZx+mz
hbcwbADyb1FyH9HzqFcohcHkBfOiDBR1ApZonnpzWPi86xTRMY2tFoWHwZvonhW8
6BP7lH2CsMs2GRilPkvS/Db1emWqP3EH6GOXBodQ73VtYheD/DnDrJjtuR0CAwEA
AaOCAb0wggG5MA4GA1UdDwEB/wQEAwIE8DATBgNVHSUEDDAKBggrBgEFBQcDATAM
BgNVHRMBAf8EAjAAMGMGA1UdEQRcMFqCGHNscy51cGRhdGUubWljcm9zb2Z0LmNv
bYIaKi5zbHMudXBkYXRlLm1pY3Jvc29mdC5jb22CIiouYmFja2VuZC5zbHMudXBk
YXRlLm1pY3Jvc29mdC5jb20wHQYDVR0OBBYEFGMmywn+t07ay1ufyzVVJ7ILs2Ai
MB8GA1UdIwQYMBaAFNLyPYR0hhtQhapd5aUHmvBH0y5pMGgGA1UdHwRhMF8wXaBb
oFmGV2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29m
dCUyMFVwZGF0ZSUyMFNlY3VyZSUyMFNlcnZlciUyMENBJTIwMi4xLmNybDB1Bggr
BgEFBQcBAQRpMGcwZQYIKwYBBQUHMAKGWWh0dHA6Ly93d3cubWljcm9zb2Z0LmNv
bS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVXBkYXRlJTIwU2VjdXJlJTIwU2Vy
dmVyJTIwQ0ElMjAyLjEuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQABgfB0eBm4rpT5
lyXOVF7ZhP/j/dAc9KEBkHQnjYgMEdn8CWrya1WDceqJOQ/eK2lMSZ7+6V3k15OY
tcNgqUMMDfeSxTqR7lhEJU9WUryt6Sd+EO7L/CQdn6PSajX7VWmHvUqio6HQ7g82
QgGRPKKNM+kaqS4BkRITp2d54NPGckVlaJVgnqm3laH359kvXJzXOEX9+d1T/HVi
giGxsS+lXn7PYZpIpHbMNd7q176OLWs0SYejgiLDjaUescOP0JD9/W5UhmvCXt5U
8bDV+YV1eGJDon2koEjPSOMZ70G+6zFRXeWoF0To7TTP9v2VOZ9UIaDG+LLOkXoj
Tu6cMazxndCCcXdSsw5LwB9GanW21bB7d122jm3Hts80ehvgEEB7fvsqGp0MkWIW
qdAKPzn4/B4W7TcAFiixHHNNyehCaaFFVa6+lpTG0h/y6NfUQokZFg21uUmYhcqb
9aN92epeFJBQDRy0cwSGvMiyDbgpF1lvnH+kpmPv0r8aVqpx+lov0aSuvKEa8tq3
uc9s4+6OhlKSqz4Lxdb6nB26fdxGlZC27Qt9WePRVxPXs/lDT9yaF3IJ+EflZuj2
ZREeJnDrcGBR+oO3H8s+pntS3rC1OCOGgIEt+psTOpHYEBXeXhQ/kYolGZtfDUNx
VjpougozgYMK/6EqAO7O3PUwaNU5bw==
-----END CERTIFICATE-----
subject=C = US, ST = WA, L = Redmond, O = Microsoft, OU = DSP, CN = sls.update.microsoft.com
issuer=C = US, ST = Washington, L = Redmond, O = Microsoft Corporation, CN = Microsoft Update Secure Server CA 2.1
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: ECDH, secp384r1, 384 bits
---
SSL handshake has read 4055 bytes and written 805 bytes
Verification error: unable to get local issuer certificate
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Server public key is 2048 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 20 (unable to get local issuer certificate)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: 7CE448A3D9D152CF2BEE6A4AD13E97556DC2B36D7FA9748559A11CA4BD30A3A3
    Session-ID-ctx: 
    Resumption PSK: 71298C1346409F32C3E5E2A1302A0EBAFE29887FBA7F66E38AA0BF6AEAF2CA4D68CF835B361095EBBCFECFF10697E374
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 36000 (seconds)
    TLS session ticket:
    0000 - c9 35 00 00 e4 4c 44 cd-ca 81 e7 59 0b 6c da 76   .5...LD....Y.l.v
    0010 - bb d7 c8 4c 79 ab 62 32-a3 30 7e a8 41 c4 90 3d   ...Ly.b2.0~.A..=

    Start Time: 1705709761
    Timeout   : 7200 (sec)
    Verify return code: 20 (unable to get local issuer certificate)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK

 

Also in Microsoft Edge on Linux, this CA is not there. You can think about it... strange.

 

Screenshot_20240117_232203.png

 

CA Attached:

Spoiler
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Always on /dev/zvol
Always on /dev/zvol
1 Solution
ebilcari
Staff
Staff

This looks like a Microsoft choice, the root CA (Microsoft Root Certificate Authority 2011) they chose for this service is not publicly trusted and is only present on the trusted root CA on windows and also the intermediate certificate (Microsoft Update Secure Server CA 2.1) is missing.
Surprisingly Mozilla has this complete trust chain under Authorities, on other systems it has to be manually imported.

- Emirjon
If you have found a solution, please like and accept it to make it easily accessible for others.

View solution in original post

5 REPLIES 5
Anthony_E
Community Manager
Community Manager

Hello,


Thank you for using the Community Forum. I will seek to get you an answer or help. We will reply to this thread with an update as soon as possible.


Thanks,

Anthony-Fortinet Community Team.
ebilcari
Staff
Staff

This looks like a Microsoft choice, the root CA (Microsoft Root Certificate Authority 2011) they chose for this service is not publicly trusted and is only present on the trusted root CA on windows and also the intermediate certificate (Microsoft Update Secure Server CA 2.1) is missing.
Surprisingly Mozilla has this complete trust chain under Authorities, on other systems it has to be manually imported.

- Emirjon
If you have found a solution, please like and accept it to make it easily accessible for others.
fireon
New Contributor III

So does this mean that as soon as you use Certificate Inspection or deep inspection on the Fortigate, the Microsoft certificate MUST be imported into the Fortigate, right?

Always on /dev/zvol
Always on /dev/zvol
ebilcari

Yes correct, usually it will be treated as a normal private CA and should be blocked

inspecte.PNG

only this two Microsoft certs seems loaded by default (at least on my FGT):

roots.PNG

- Emirjon
If you have found a solution, please like and accept it to make it easily accessible for others.
fireon
New Contributor III

Well, then it's exactly the same as I was able to understand here. I don't agree at all with Microsoft's behaviour in this case. :thinking_face::squinting_face_with_tongue::eyes:

Always on /dev/zvol
Always on /dev/zvol
Labels
Top Kudoed Authors