Hi, I have a FortiGate 50E running v6.2.4build1112 The following issue occurs with different browers (FF, Chrome, Safari) and also on different platforms (Win,OSX,iOS,Android) For the last 24h I have suddently started receiving certifiacte errors on various websites which have worked flawlessly before. I get the typical HTTPS warning in my Browser (e.g. "Your connection is not private" in Chrome) and the exact error message is "NET::ERR_CERT_AUTHORITY_INVALID". Interestingly if I look at the certificate details it shows "Fortinet Untrusted CA" as the issuer. If I access these sites via mobile data these pages work fine and also the issuer is shown as a know institution (in all cases noticed so far it's "Sectigo"). In the SSL Logs I see "blocked" actions for the respective website: Message: Server certificate blocked Reason: block-cert-invalid Type: utm Sub Type: ssl Event Type: ssl-anomalies These actions are triggered by the Standard FortiGate pre-configured SSL/SSH Inspection profile "certificate-inspection" (SSL handshake inspection.) Any ideas what could be the reason for this sudden new behavior or how I could trouble shoot? Thanks in advance for any help!
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
To repeat what was said earlier
"The problem is that those websites have an expired certificate in their chain (expired on May 30)."
Use ssllab to verify the cert on the web-server. If the cert is expired nothing you can do can get pass that issue. It does NOT matter that you have the cert of the CAs or webserver
https://www.ssllabs.com/ssltest/
If you would like to paste the name of the site we would gladly check for you.
Ken Felix
PCNSE
NSE
StrongSwan
I just registered for an account so that I could weigh in here. I'm actually not a Fortigate customer but I'm using a competing product with SSL inspection and I've been battling this same problem all day. If you're doing SSL inspection and you care about the integrity of website security the only way to correct this is to contact website owners. I've been doing this all day and successfully resolved the issue with many websites. I provide the website owners with a Qualys SSL Server Test report showing the expired certificates, explain the problem it's causing, and kindling request that they remove the expired certificates from their certificate chain. Removing the expired certificates form the chain resolves the issue and causes no detriment that I can see.
emnoc wrote:To repeat what was said earlier
"The problem is that those websites have an expired certificate in their chain (expired on May 30)."
Use ssllab to verify the cert on the web-server. If the cert is expired nothing you can do can get pass that issue. It does NOT matter that you have the cert of the CAs or webserver
https://www.ssllabs.com/ssltest/
If you would like to paste the name of the site we would gladly check for you.
Ken Felix
Thank you, I understand. Can you just explain shortly or guide me to understand what's the difference that these sites work in the main browsers if I am on my mobile data plan for example. Thanks!
Are you using proxy-based inspection mode?
How can this make sense?
support.sectigo.com = Old Cert
sectigo.com = New Cert
Kevin,
I have already informed Sectigo about support.sectigo.com, but they have replied me that there is no issue:
[...] I don’t see any issue with our certificate. Thank you anyway for your email. [...]).
My idea after that I have informed some owners of the websites with expired certificate: Fortinet should find another solution, because in my personal opinion the owners of the websites will not replace the expired certificate soon.
In fact Sectigo officially writes that it's not mandatory to replace the certificate, because the new browsers/clients are able to "exclude" the expired certificate.
I don't agree with this theory: I replace the expired certificates with valid certificates.
Best.
Alessandro
Hi.
Temporary workaround (also if I don't like it): create a new SSL/SSH Inspection profile with "Validation failed certificates" allowed.
I don't like it, but there are too many websites with this expired certificate.
Best.
Alessandro
I just registered for an account so that I could weigh in here. I'm actually not a Fortigate customer but I'm using a competing product with SSL inspection and I've been battling this same problem all day. If you're doing SSL inspection and you care about the integrity of website security the only way to correct this is to contact website owners. I've been doing this all day and successfully resolved the issue with many websites. I provide the website owners with a Qualys SSL Server Test report showing the expired certificates, explain the problem it's causing, and kindling request that they remove the expired certificates from their certificate chain. Removing the expired certificates form the chain resolves the issue and causes no detriment that I can see.
Is there a way for the firewall to make SSL inspection exceptions for some sites?
this site.. https://sistema.contpaqi.com/loginContpaqi/Login, if I open it on Firefox and check the certificate chains, all are valid.
But when we enable Fortinet SSL inspection it fails...
Its not clear to me, why fortinet is failing some sites, that check ok with firefox, chrome, edge..
alex.valenzuela wrote:Is there a way for the firewall to make SSL inspection exceptions for some sites?
There are two ways that I know of:
1 - You can create a new IPv4 Policy with SSL Inspection set to no-inspection and for destination put the site addresses you don't want inspected.
2 - I know with deep packet inspection you can add addresses to the Exempt list in its profile.
A temporary work around is to select "Allow invalid SSL certificates" under Common Options but I think if we collectively do what SomeDude101 said it will help resolve this problem quicker and properly.
The web server admin should not have to replace all certs to fix this problem. The problem is with the inspection method being performed by the Fortigate.
When these sites/service are accessed _outside_ of an environment using a Fortigate for SSL inspection, they work. The error message is coming from the Fortigate.
It takes 10 seconds of testing on a mobile phone. And, maybe 1-2 minutes using https://www.ssllabs.com/ssltest/
There are three paths to roots for each of these leaf Sectigo certs:
[ol]
We're forced to use proxy-based inspection (because flow-based disables web profile overrides). So, we will be forced to replace all of the bundled certs with leaf-only. For normal use (not behind a Fortigate), this is unnecessary because the browser will ignore the expired CA and follow the path to the valid CA.
If you have public servers/services behind a Fortigate, you can disable the SSL inspection on your outbound policy. This will make the sites accessible to the public again.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1732 | |
1106 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.