Troubleshooting Ironport HTTPS Certificate Issues

SSL is great, except when you’re trying to audit access or filter things, let alone simple troubleshooting. Long story short, we run a Man In The Middle style system where our proxies are the HTTPS clients and they have an SSL certificate which all of our clients trust.

This relies on the proxies trusting the certificate chain, and these chains need to be updated periodically. Here’s an example of how to fix it when it goes wrong.

certwarning

  1. Open the site in a browser, which fails with a certificate trust issue.
  2. Looks like the certificate’s trust chain is wrong
  3. What now? Two things:
    • Test it on a machine that isn’t using the SSL MITM
    • Test with the Qualys SSL test.
  4. Once you’ve established that it only happens when the Ironport is involved, we need to find the certificate chain.
    • Here’s what it looks like on Safari: certificatechain
    • Or from the Qualys site: certificatechain-qualys
  5. The certificates stored in the Ironports are shown by logging in to each WSA individually, then clicking Security services -> HTTPS Proxy -> Manage Trusted Root Certificates
  6. To verify we have the correct CA certificates, we need to compare the fingerprint to what’s in the results above. Starting with the root certificate, do the following.
    1. Find it by name in the Ironport interface
    2. Click the arrow next to the name, then right click on the “Download Certificate” link and download it.
    3. To check the fingerprint matches, open a command prompt and run “openssl x509 -fingerprint -noout -in [filename]” Where [filename] is the certificate file you downloaded before.
    4. This will show the fingerprint of the file, and you can match it up with the corresponding information above. It’ll be in hexadecimal, ignore any punctuation. If it’s correct, work up the chain until you find the one that’s wrong.
  7. Once you’ve found the missing/outdated certificate, you’ll need to find the updated one online. Google’s your friend.
  8. Download the certificate you require
  9. Install the intermediate certificate into each Ironport in your cluster individually
    • Under “Custom Trusted Root Certificates” click “Import”
    • Select the file you need to import
    • Commit the changes
    • Check that the certificate’s in the list
  10. Now try to access the site. You may need to clear your cache or reopen the browser (I’m looking at you, Internet Explorer)