Sites blocked due to expired Root Certificate Authority on May 30, 2020
Last Modified: 2023-12-11 13:50:34 Etc/GMT
Affected Products
Languages:
This article is available in the following languages:
Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.
As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."
Trellix announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence.
Trellix Advanced Research Center analyzes threat data on ransomware, nation-states, sectors, vectors, LotL, MITRE ATT&CK techniques, and emails.
After December 1, 2024, please log in to the Thrive Portal for support, knowledge articles, tools, and downloads. For information about using the Thrive Portal, view the Trellix Thrive Portal User Guide.
Sites blocked due to expired Root Certificate Authority on May 30, 2020
Technical Articles ID:
KB92953
Last Modified: 2023-12-11 13:50:34 Etc/GMT Environment
Skyhigh Web Gateway (SWG)
SummarySecure web traffic (TLS) uses a certificate hierarchy to establish secure lines of communication. By design, SWG has a feature that blocks websites that use expired server certificates or websites that don't have a trusted certificate path.
When a root certificate authority (CA) expires, it causes multiple websites to use a certificate chain that's no longer valid. This broken chain causes SWG to take a block action and present users with an SWG block page. Problem
When a user tries to access sites that use the expired CA in their certificate chain, the following message or a similar error is displayed: The certificate verification failed in rule 'Block Expired Server (7 Day Tolerance) and Expired CA Certificates'. Solution
This behavior isn't a Trellix issue. This behavior is expected because the target website includes trust chains that include an expired certificate authority. To resolve the root cause, the owner of the affected websites must update their certificate chains to remove expired CAs. Workaround
Mitigation has been created within the Trellix Subscribed list "Known CAs" version 373. This mitigation allows SWG to find alternative valid trust chains even if the server is still sending this expired certificate chain.
Affected ProductsLanguages:This article is available in the following languages: |
|