Sophos Firewall OS v19 was released just a few months ago in April, and has already been adopted by a huge number of partners and customers who have upgraded to take advantage of the many Xstream SD-WAN and VPN enhancements.
This latest update, v19 MR1, brings a number of additional enhancements and fixes to what is already one of our best firewall updates ever:
As covered in the recent community blog post, SFOS v19 MR1 introduces a support requirement for firmware upgrades which will come into effect for customers without a valid support subscription after they've used an initial free upgrade allocation.
To summarize:
Full Details and FAQs
The release of v19 MR1 follows our regular firmware release process so you can download it now from MySophos or wait until it appears in your console over the next few weeks.
Sophos Firewall OS v19 MR1 is a fully supported upgrade from v19 GA, all previous versions of v18.5 including the latest v18.5 MR4 and v18 MR3 and later. Please refer to the Upgrade information tab in the release notes for more details.
updated few minutes before... had issues with TLS inspection and cert validation when "untrusted issuer" and "invalid for other reason" activated in the ssl block profiles. Especially Let's Encrypt sites were blocked.
Restored to 19GA. No time to follow-up....
This has been resolved on the two customers reported. For reference:Issue:
Some website that are signed by Lets Encrypt have a validation failures after upgrading to 19.0 (GA or MR1).
Cause:
The customer has uploaded a Lets Encrypt CA to WebAdmin that is no longer valid.
Lets Encrypt used cross signing to two certificates both called ISRG Root X1. One of them is a Root CA and the other is an Intermediate CA that is in turn signed by DST Root CA X3, which expired Sept 2021. Some customers may have uploaded the Intermediate CA, however it is no longer valid. If it was working in 18.5 that means the order in which CAs were loaded was the valid CA was loaded before the invalid CA and sites were validated successfully.
In 19.0 (both GA and MR1) we changed the order in which CAs are loaded. For some customers that means the no-longer-valid CA is loaded first, which causes the error.
Customers may have uploaded Lets Encrypt CAs to support internal servers or WAF, for example Synology NAS.
Resolution:
WebAdmin > Certificates > Certificate Authorities
In the column headers, filter by type Uploaded
Delete any Uploaded certificates that are Subject:
/C=US/O=Internet Security Research Group/CN=ISRG Root X1
Retest:
Retest any reason that you had for uploading the Lets Encrypt CA.For example if you are using Lets Encrypt for WAF, retest your WAF. You may need to delete and re-upload your server certificate so that the new correct chain is supplied.