Network Security
Troubleshoot Pinned Certificates
Table of Contents
Expand All
|
Collapse All
Network Security Docs
-
- Security Policy
-
- Security Profile Groups
- Security Profile: AI Security
- Security Profile: WildFire® Analysis
- Security Profile: Antivirus
- Security Profile: Vulnerability Protection
- Security Profile: Anti-Spyware
- Security Profile: DNS Security
- Security Profile: DoS Protection Profile
- Security Profile: File Blocking
- Security Profile: URL Filtering
- Security Profile: Data Filtering
- Security Profile: Zone Protection
-
- Policy Object: Address Groups
- Policy Object: Regions
- Policy Object: Traffic Objects
- Policy Object: Applications
- Policy Object: Application Groups
- Policy Object: Application Filter
- Policy Object: Services
- Policy Object: Auto-Tag Actions
- Policy Object: Devices
-
- Uses for External Dynamic Lists in Policy
- Formatting Guidelines for an External Dynamic List
- Built-in External Dynamic Lists
- Configure Your Environment to Access an External Dynamic List
- Configure your Environment to Access an External Dynamic List from the EDL Hosting Service
- Retrieve an External Dynamic List from the Web Server
- View External Dynamic List Entries
- Enforce Policy on an External Dynamic List
- Find External Dynamic Lists That Failed Authentication
- Disable Authentication for an External Dynamic List
- Policy Object: HIP Objects
- Policy Object: Schedules
- Policy Object: Quarantine Device Lists
- Policy Object: Dynamic User Groups
- Policy Object: Custom Objects
- Policy Object: Log Forwarding
- Policy Object: Authentication
- Policy Object: Decryption Profile
- Policy Object: Packet Broker Profile
-
-
-
- The Quantum Computing Threat
- How RFC 8784 Resists Quantum Computing Threats
- How RFC 9242 and RFC 9370 Resist Quantum Computing Threats
- Support for Post-Quantum Features
- Post-Quantum Migration Planning and Preparation
- Best Practices for Resisting Post-Quantum Attacks
- Learn More About Post-Quantum Security
-
-
-
- Investigate Reasons for Decryption Failure
- Identify Weak Protocols and Cipher Suites
- Troubleshoot Version Errors
- Troubleshoot Unsupported Cipher Suites
- Identify Untrusted CA Certificates
- Repair Incomplete Certificate Chains
- Troubleshoot Pinned Certificates
- Troubleshoot Expired Certificates
- Troubleshoot Revoked Certificates
Troubleshoot Pinned Certificates
Find sites that have pinned certificates so you can decide whether to allow the
traffic by excluding it from decryption.
Where Can I Use This? | What Do I Need? |
---|---|
|
No separate license required for decryption when using NGFWs or
Prisma Access.
Note: The features and capabilities available to you in
Strata Cloud Manager depend on your active license(s).
|
Certificate pinning forces the client application to validate the server’s
certificate against a known copy to ensure that certificate really comes from the
server. The intent of pinned certificates is to protect against man-in-the-middle (MITM) attacks where a device between
the client and the server replaces the server certificate with another certificate.
Although this prevents malicious actors from intercepting and manipulating connections, it also
prevents forward proxy decryption
because the NGFW creates an impersonation certificate instead of the server
certificate to present to the client. Instead of one session that connects the
client and server directly, forward proxy creates two sessions, one between the
client and the NGFW and another between the NGFW and the server. This establishes
trust with the client so that the NGFW can decrypt and inspect the traffic.
However, when a certificate is pinned, the NGFW cannot decrypt the traffic because the client
does not accept the NGFW’s impersonation certificate—the client only accepts the
certificate that is pinned to the application.
Troubleshoot Pinned Certificates (Strata Cloud Manager)
- Filter Decryption logs to find pinned certificates.
- Select Incidents and Alerts Log Viewer and select Firewall/Decryption.
- Use the query Error Message LIKE ‘Unknown CA’.
The application generates a TLS error code (Alert) when it fails to verify the server’s certificate. Different applications may use different error codes to indicate a pinned certificate. The most common error indicators for pinned certificates are UnknownCA and BadCertificate. After running the Error Message LIKE ‘Unknown CA’ query, run the query Error Message LIKE ‘Unknown CA’ ‘Bad Certificate’ to catch more pinned certificate errors.You can use Wireshark or other packet analyzers to double-check the error. Look for the client breaking the connection immediately after the TLS handshake to confirm that it is a pinned certificate issue. - Decide what to do about pinned certificates.If you don’t need access for business purposes, you can let the NGFW continue to block access. If you need access, then you can exclude the server from decryption by adding it to the SSL Decryption Exclusion List. The NGFW bypasses decryption for sites on the SSL Decryption Exclusion List. The NGFW cannot inspect the traffic, but the traffic is allowed.
Troubleshoot Pinned Certificates (PAN-OS)
- Filter the Decryption log (MonitorLogsDecryption) to find pinned certificates using the query (error contains ‘UnknownCA’).The application generates a TLS error code (Alert) when it fails to verify the server’s certificate. Different applications may use different error codes to indicate a pinned certificate. The most common error indicators for pinned certificates are UnknownCA and BadCertificate. After running the (error contains ‘UnknownCA’) query, run the query (error contains ‘BadCertificate’) to catch more pinned certificate errors.You can use Wireshark or other packet analyzers to double-check the error. Look for the client breaking the connection immediately after the TLS handshake to confirm that it is a pinned certificate issue.
- Decide what to do about pinned certificates.If you don’t need access for business purposes, you can let the NGFW continue to block access. If you need access, you can exclude the server from decryption by adding it to the SSL Decryption Exclusion List (DeviceCertificate ManagementSSL Decryption Exclusion.The NGFW bypasses decryption for sites on the SSL Decryption Exclusion List. The NGFW cannot inspect the traffic, but the traffic is allowed.