Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
ede_pfau
SuperUser
SuperUser

install CA certificate to use with SSL inspection

Hi all, I am working on this for quite some time now. Maybe you can shed some light on this. As soon as I touch one of the " s" -protocols in a protection profile (imaps, pop3s etc.) FortiOS installs a SSL proxy. Now when a client contacts an external mailserver (policy internal -> wan with this protection profile) the Fortigate sees the mailserver' s certificate and hands it down to the client BUT changes the " issuer" field to " Fortigate Inc." . This triggers a warning in the user' s mail client. Technically it uses the built-in " Fortinet_CA_SSLProxy" cert. OK, I do have an official certificate. I uploaded it and tried installing it using " conf firewall ssl setting" , " set caname mycert" but that was not possible as only the built-in cert is given as selectable. When I look at the local, uploaded certs I see that only some bear the line " CA: true" . My own cert " mycert" shows " CA: false" . Did I do something wrong while importing it? How do you fix this issue with your Fortigate?
Ede Kernel panic: Aiee, killing interrupt handler!
Ede Kernel panic: Aiee, killing interrupt handler!
7 REPLIES 7
SECCON1MC
New Contributor

Ede - The way that it is supposed to be configured as I recall is to import the Fortinet_CA_SSLProxy cert into your browser. Once it is trusted by your machine you will no longer receive the error message. For larger roll-outs you should be able to use GPO to get the cert into all of the machines on the network. I am trying to dig up the documentation for this and will post it in here if I can find it.
[link=http://logMojo.com]logMojo[/link] by Security Confidence Cloud Based - Logging ● Alerting ● Reporting ● Monitoring ● Management Signup today!
[link=http://logMojo.com]logMojo[/link] by Security Confidence Cloud Based - Logging ● Alerting ● Reporting ● Monitoring ● Management Signup today!
SECCON1MC
New Contributor

Page 18 of the admin manual - Setting up certificates to avoid client warnings - Page 18
[link=http://logMojo.com]logMojo[/link] by Security Confidence Cloud Based - Logging ● Alerting ● Reporting ● Monitoring ● Management Signup today!
[link=http://logMojo.com]logMojo[/link] by Security Confidence Cloud Based - Logging ● Alerting ● Reporting ● Monitoring ● Management Signup today!
ejhardin
Contributor

You can create your own SSL CA or use the following recent article to import the Fortinet SSL Cert. http://kb.fortinet.com/kb/microsites/search.do?cmd=displayKC&docType=kc&externalId=FD32404&sliceId=1&docTypeID=DT_KCARTICLE_1_1&dialogID=6970929&stateId=0 0 6972728 [link=][/link]
ede_pfau
SuperUser
SuperUser

Thanks for your suggestions. But this is not the solution I am looking for, as our users (300-400) distrust the Fortinet CA shown in the cert warning. As the Fortigate has to encrypt the traffic between it and the client it needs a private key. We will never get these for all external mail servers which are in use. So at this point we can only use our own cert and private key, be it self-signed or root CA signed. If I could install our cert the client would still see a cert warning when contacting an external mail server. At least the client would see that it stems from the local firewall if I could use our own cert. The place to go is conf firewall ssl setting set caname <mycert> So far the theory. At this prompt I cannot select any cert other than " Fortinet_CA_SSLProxy" - all other imported certs don' t show up. What am I missing here? If the parameter is configurable I should be able to select an alternative but I can' t. Could anybody else try this on his machine, please? Or enlighten me on why I cannot do this...
Ede Kernel panic: Aiee, killing interrupt handler!
Ede Kernel panic: Aiee, killing interrupt handler!
edsouza_FTNT
Staff
Staff

You do know that the SSL proxy on the Fortigate needs to sign every server certificate with a CA certificate. Uploading just your CA certificate will not work. The Fortigate needs the private key of your CA certificate so it can sign every server certificate that it is inspecting. I do not know if you can generate a certificate request on the Fortigate, and then sign that request making it a sub-CA certificate signed by your CA certificate. Then maybe you can upload that to the FortiGate.
ede_pfau
SuperUser
SuperUser

will try that out and report back. Thanks.
Ede Kernel panic: Aiee, killing interrupt handler!
Ede Kernel panic: Aiee, killing interrupt handler!
ede_pfau
SuperUser
SuperUser

I was able to import a cert and its private key, and then to select it for the " set caname" setting. Viewing the cert, " extensions" , it says " CA:true" . Do I have to specify anything special when ordering a cert in order to get this parameter set?
Ede Kernel panic: Aiee, killing interrupt handler!
Ede Kernel panic: Aiee, killing interrupt handler!
Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors