This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Web proxy reporting false certificate issues

This started this morning (5/30).

Example site

https://www.dslreports.com/

 

I'm not sure what has expired as the cert is good through the end of June.  Both utm and client pc date is accurate.  Thoughts?

 

Edit:  Here's the lines from the proxy log.

 

2020:05:30-12:11:31 utm httpproxy[6727]: id="0002" severity="info" sys="SecureWeb" sub="http" name="web request blocked" action="block" method="CONNECT" srcip="10.10.5.100" dstip="64.91.255.98" user="" group="" ad_domain="" statuscode="502" cached="0" profile="REF_DefaultHTTPProfile (Default Web Filter Profile)" filteraction="REF_DefaultHTTPCFFAction (Default content filter action)" size="3883" request="0xd32d5800" url="https://www.dslreports.com/" referer="" error="Failed to verify server certificate" authtime="0" dnstime="2" aptptime="66" cattime="71" avscantime="0" fullreqtime="242853" device="0" auth="0" ua="" exceptions="patience" category="165" reputation="neutral" categoryname="Technical/Business Forums" country="United States"
2020:05:30-12:11:32 utm httpproxy[6727]: id="0002" severity="info" sys="SecureWeb" sub="http" name="web request blocked" action="block" method="CONNECT" srcip="10.10.5.100" dstip="64.91.255.98" user="" group="" ad_domain="" statuscode="502" cached="0" profile="REF_DefaultHTTPProfile (Default Web Filter Profile)" filteraction="REF_DefaultHTTPCFFAction (Default content filter action)" size="3883" request="0xd4979c00" url="https://www.dslreports.com/" referer="" error="Failed to verify server certificate" authtime="0" dnstime="3" aptptime="67" cattime="68" avscantime="0" fullreqtime="243232" device="0" auth="0" ua="" exceptions="patience" category="165" reputation="neutral" categoryname="Technical/Business Forums" country="United States"

 

 

Edit2:

https://support.sectigo.com/articles/Knowledge/Sectigo-AddTrust-External-CA-Root-Expiring-May-30-2020

Looks like this is not a utm issue but rather poorly implemented certs?

 

Edit3:  Maybe this is a utm issue as it's not following the cert chain properly?



This thread was automatically locked due to age.
  • I have seen this several times today and wonder if it is related to UTM 9.703-3 which I updated to last night (from 9.702-1). If I turn off web filtering and allow the browser to examine the cert it is accepted, and manually looking shows that it is within its valid date range.

    --Larry

  • I don't think it's related to the update.  I'm sure it's related to the way utm handles cross signed certs.  Read the link in my OP above.

     

    So far i've exempted the few sites with issue from ssl trust checking.

  • Its since a comodo cert expired on 30th May - all the sites with issues use comodo certs.  It's how utm is dealing with this.  We raised a support call yesterday  which is still being investigated

  • Hi folks,

    the answer in the XG forums was to delete the outdated certificates from the UTM.

    Ian

    XG115W - v20.0.2 MR-2 - Home

    XG on VM 8 - v21 GA

    If a post solves your question please use the 'Verify Answer' button.

  • Hi,

     

    Can you provide how to do that on Sophos UTM. I am getting tired of bypassing for each site.

  • Hi,

    I am sorry my UTM knowledge s very rusty and I do not have a working UTM at the moment.

    You will need to hope BAlfson come along and looks at your request.

    Ian

    XG115W - v20.0.2 MR-2 - Home

    XG on VM 8 - v21 GA

    If a post solves your question please use the 'Verify Answer' button.

  • Login to UTM via SSH as loginuser. Then su to root.

    cd /etc/ssl/certs

    mkdir ../badcerts

    sophos01:/etc/ssl/certs # ls -l | grep AddTrust_E
    lrwxrwxrwx 1 root root 26 Jan 21 01:31 157753a5.0 -> AddTrust_External_Root.pem
    lrwxrwxrwx 1 root root 26 Jan 21 01:31 3c58f906.0 -> AddTrust_External_Root.pem
    -rw-r--r-- 1 root root 1574 Jan 21 01:31 AddTrust_External_Root.pem
    sophos01:/etc/ssl/certs # mv 157753a5.0 3c58f906.0 AddTrust_External_Root.pem ../badcerts

     

    sophos01:/etc/ssl/certs # /var/mdw/scripts/httpproxy restart
    :: Restarting httpproxy
    :: Stopping httpproxy done
    :: Starting httpproxy done
    sophos01:/etc/ssl/certs #

  • i am not very familiar with terminal. Probably it cant be done in webadmin?

     

    didnt helped:

     

    sophos01:/etc/ssl/certs # mkdir ../badcerts
    sophos01:/etc/ssl/certs # ls -l | grep AddTrust_E
    lrwxrwxrwx 1 root root 26 Jan 21 07:31 157753a5.0 -> AddTrust_External_Root.pem
    lrwxrwxrwx 1 root root 26 Jan 21 07:31 3c58f906.0 -> AddTrust_External_Root.pem
    -rw-r--r-- 1 root root 1574 Jan 21 07:31 AddTrust_External_Root.pem
    sophos01:/etc/ssl/certs # mv 157753a5.0 3c58f906.0 AddTrust_External_Root.pem ../badcerts
    sophos01:/etc/ssl/certs # /var/mdw/scripts/httpproxy restart
    :: Restarting httpproxy
    :: Stopping httpproxy done
    :: Starting httpproxy done

     

  • This is an issue we are also experiencing.

    UTM 9.702-1 with Web Filtering in Standard/Decrypt and Scan Mode.

  • I just tried VladRud's solution of moving the AddTrust_External_Root cert and its links to the /etc/ssl/badcerts directory. Rather than just restarting the httpproxy daemon, I rebooted. Initially thought that this solved the problem, but then I realized that I had tested with a site I had already added an exception to... (insert sounds associated with a public admission of stupidity). I have verified that the AddTrust_External_Root cert did not magically reappear in the /etc/ssl/certs directory after the reboot. After removing the exception and retesting, this does not solve the problem with the expired cert.

    --Larry