<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: WSA Issue:  Error - Certificate signature verification failed. in Web Security</title>
    <link>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3874444#M8575</link>
    <description>A server cert from GoDaddy WILL NOT WORK for this, wild card or not.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;You can still load the GoDaddy Root certs which should have come with this cert into your WSA...&lt;BR /&gt;&lt;BR /&gt;You'll then get the same "can't use a server cert" error...&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;The WSA generates a "spoofed" cert for each website you visit, so the cert it uses has to be a signing cert. Public CAs won't sell you a signing cert for web sites...&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Mon, 17 Jun 2019 17:03:06 GMT</pubDate>
    <dc:creator>Ken Stieers</dc:creator>
    <dc:date>2019-06-17T17:03:06Z</dc:date>
    <item>
      <title>WSA Issue:  Error - Certificate signature verification failed.</title>
      <link>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3874120#M8567</link>
      <description>&lt;P&gt;Hi Guys&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i am getting following error while uploading signed certificate on WSA for HTTPS proxy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Error - Certificate signature verification failed. For the certificate 'XXXdomain.com&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;WSA S190&lt;/P&gt;&lt;P&gt;AsyncOS&amp;nbsp; 11.7.0-407&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is there any solution for this issue&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2019 10:38:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3874120#M8567</guid>
      <dc:creator>hashimwajid1</dc:creator>
      <dc:date>2019-06-17T10:38:32Z</dc:date>
    </item>
    <item>
      <title>Re: WSA Issue:  Error - Certificate signature verification failed.</title>
      <link>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3874165#M8568</link>
      <description>What kind of cert is it? Where did you get it?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 17 Jun 2019 11:29:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3874165#M8568</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2019-06-17T11:29:06Z</dc:date>
    </item>
    <item>
      <title>Re: WSA Issue:  Error - Certificate signature verification failed.</title>
      <link>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3874231#M8569</link>
      <description>Hi Ken&lt;BR /&gt;&lt;BR /&gt;i generated Self signed certificate on WSA and then downloaded the CSR and send it to CA and then they signed it and send me back but when i tried to upload back on WSA then its giving this error.&lt;BR /&gt;</description>
      <pubDate>Mon, 17 Jun 2019 12:43:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3874231#M8569</guid>
      <dc:creator>hashimwajid1</dc:creator>
      <dc:date>2019-06-17T12:43:51Z</dc:date>
    </item>
    <item>
      <title>Re: WSA Issue:  Error - Certificate signature verification failed.</title>
      <link>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3874271#M8571</link>
      <description>So if you sent to to a public CA. This wont work.... they are going to sell you a server cert, not a signing cert.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;If you used a private CA (eg you run it) you just need to load the intermediate and root cert as well.&lt;BR /&gt;</description>
      <pubDate>Mon, 17 Jun 2019 13:24:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3874271#M8571</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2019-06-17T13:24:06Z</dc:date>
    </item>
    <item>
      <title>Re: WSA Issue:  Error - Certificate signature verification failed.</title>
      <link>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3874310#M8573</link>
      <description>&lt;P&gt;Just a clarification:&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you did this from your own CA, you just have to load your root onto the device under Network/Certificate Management, click the button near the bottom “Managed Trusted Root Certificates…” and import yours to the “Custom Trusted Root Certificates” list.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2019 14:02:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3874310#M8573</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2019-06-17T14:02:28Z</dc:date>
    </item>
    <item>
      <title>Re: WSA Issue:  Error - Certificate signature verification failed.</title>
      <link>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3874346#M8574</link>
      <description>Hi ken,&lt;BR /&gt;&lt;BR /&gt;Its public CA Godaddy.&lt;BR /&gt;last time when we used wildcard certificate then wsa gave error that we are using server certificate so it did not accepted but this time we generated csr from wsa and got signed from public CA. But this time its not giving server certificate error but instead its very different error.&lt;BR /&gt;&lt;BR /&gt;Ia there any way that i can find that the certificate we received is server certificate and not the root certificate ?&lt;BR /&gt;&lt;BR /&gt;When we used wildcard then wsa told we are using a server certificate but this time error is diferrent.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 17 Jun 2019 14:39:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3874346#M8574</guid>
      <dc:creator>hashimwajid1</dc:creator>
      <dc:date>2019-06-17T14:39:06Z</dc:date>
    </item>
    <item>
      <title>Re: WSA Issue:  Error - Certificate signature verification failed.</title>
      <link>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3874444#M8575</link>
      <description>A server cert from GoDaddy WILL NOT WORK for this, wild card or not.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;You can still load the GoDaddy Root certs which should have come with this cert into your WSA...&lt;BR /&gt;&lt;BR /&gt;You'll then get the same "can't use a server cert" error...&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;The WSA generates a "spoofed" cert for each website you visit, so the cert it uses has to be a signing cert. Public CAs won't sell you a signing cert for web sites...&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 17 Jun 2019 17:03:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3874444#M8575</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2019-06-17T17:03:06Z</dc:date>
    </item>
    <item>
      <title>Re: WSA Issue:  Error - Certificate signature verification failed.</title>
      <link>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3874531#M8576</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Please see below for article on what certificate that WSA needed for HTTPS:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/117792-technote-wsa-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/117792-technote-wsa-00.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can also check the certificate whether it is server certificate or root certificate using the openssl command:&lt;/P&gt;
&lt;P&gt;To identify the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="lia-search-match-lithium"&gt;certificate&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;whether it is a Root&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="lia-search-match-lithium"&gt;certificate&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="lia-search-match-lithium"&gt;Certificate&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Authority (CA), you can use openssl command to check the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="lia-search-match-lithium"&gt;certificate&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;file.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The openssl command to check this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;openssl x509 -text -in &amp;lt;&lt;SPAN class="lia-search-match-lithium"&gt;certificate&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;file&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Below is an example of the output from openssl command for&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Root&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="lia-search-match-lithium"&gt;certificate&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(CA)&lt;/STRONG&gt;:&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="lia-search-match-lithium"&gt;Certificate&lt;/SPAN&gt;:&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Data&amp;amp;colon;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Version: 3 (0x2)&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Serial Number:&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; xx&lt;/SPAN&gt;:xx:xx:xx:xx:xx:xx:xx&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Signature Algorithm: sha256WithRSAEncryption&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Issuer: C=AU, O=cisco, OU=cisco, CN=cisco&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Validity&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Not Before: Jun 18 03:29:30 2015 GMT&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Not After : Jun 18 03:29:30 2016 GMT&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Subject: C=AU, O=cisco, OU=cisco, CN=cisco&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Subject Public Key Info:&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Public Key Algorithm: rsaEncryption&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;RSA Public Key: (2048 bit)&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Modulus (2048 bit):&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;xx&lt;SPAN&gt;:xx:xx:xx:xx:xx:xx:xx&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&lt;SPAN&gt;xx:xx:xx:xx:xx:xx:xx:xx&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;xx&lt;/SPAN&gt;&lt;SPAN&gt;:xx:xx:xx:xx:xx:xx:xx&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Exponent: 65537 (0x10001)&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;X509v3 extensions:&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;X509v3 Subject Key Identifier:&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;xx&lt;SPAN&gt;:xx:xx:xx:xx:xx:xx:xx&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;X509v3 Authority Key Identifier:&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;keyid:&lt;SPAN class="Apple-converted-space"&gt;xx&lt;/SPAN&gt;&lt;SPAN&gt;:xx:xx:xx:xx:xx:xx:xx&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;DirName:/C=AU/O=cisco/OU=cisco/CN=cisco&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;serial:&lt;SPAN class="Apple-converted-space"&gt;xx&lt;/SPAN&gt;&lt;SPAN&gt;:xx:xx:xx:xx:xx:xx:xx&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;STRONG&gt;X509v3 Basic Constraints:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;CA:TRUE&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Signature Algorithm: sha256WithRSAEncryption&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; xx&lt;SPAN&gt;:xx:xx:xx:xx:xx:xx:xx&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&lt;SPAN&gt;xx:xx:xx:xx:xx:xx:xx:xx&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;xx&lt;/SPAN&gt;&lt;SPAN&gt;:xx:xx:xx:xx:xx:xx:xx&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;-----BEGIN&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="lia-search-match-lithium"&gt;CERTIFICATE&lt;/SPAN&gt;-----&lt;/P&gt;
&lt;P class="p1"&gt;xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN&gt;xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN&gt;xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;-----END&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="lia-search-match-lithium"&gt;CERTIFICATE&lt;/SPAN&gt;-----&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;From the above output, to identify that the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="lia-search-match-lithium"&gt;certificate&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is a Root&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="lia-search-match-lithium"&gt;certificate&lt;/SPAN&gt;, look for "&lt;STRONG&gt;Basic Constraints&lt;/STRONG&gt;" and make sure that the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;CA:True&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for a Root&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="lia-search-match-lithium"&gt;certificate&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;Below is an example of the output from openssl command for&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Server&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="lia-search-match-lithium"&gt;certificate&lt;/SPAN&gt;&lt;/STRONG&gt;:&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="lia-search-match-lithium"&gt;Certificate&lt;/SPAN&gt;:&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Data&amp;amp;colon;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Version: 3 (0x2)&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Serial Number: 1 (0x1)&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Signature Algorithm: sha1WithRSAEncryption&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Issuer: C=US, ST=California, L=San Bruno, O=Cisco IronPort Systems, Inc., CN=Cisco IronPort Appliance Demo&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="lia-search-match-lithium"&gt;Certificate&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Validity&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Not Before: Mar 16 23:58:17 2012 GMT&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Not After : Mar 17 23:58:17 2022 GMT&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Subject: C=US, ST=California, L=San Bruno, O=Cisco IronPort Systems, Inc., CN=Cisco IronPort Appliance Demo&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="lia-search-match-lithium"&gt;Certificate&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Subject Public Key Info:&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Public Key Algorithm: rsaEncryption&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;RSA Public Key: (1024 bit)&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Modulus (1024 bit):&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;xx&lt;SPAN&gt;:xx:xx:xx:xx:xx:xx:xx&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&lt;SPAN&gt;xx:xx:xx:xx:xx:xx:xx:xx&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;xx&lt;/SPAN&gt;&lt;SPAN&gt;:xx:xx:xx:xx:xx:xx:xx&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Exponent: 65537 (0x10001)&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;X509v3 extensions:&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;STRONG&gt;X509v3 Basic Constraints:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;CA:FALSE&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Netscape Comment:&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;OpenSSL Generated&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="lia-search-match-lithium"&gt;Certificate&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;X509v3 Subject Key Identifier:&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;xx&lt;SPAN&gt;:xx:xx:xx:xx:xx:xx:xx&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;X509v3 Authority Key Identifier:&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;DirName:/C=US/ST=California/L=San Bruno/O=Cisco IronPort Systems, Inc./CN=Cisco IronPort Appliance Demo&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="lia-search-match-lithium"&gt;Certificate&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;serial:&lt;SPAN class="Apple-converted-space"&gt;xx&lt;/SPAN&gt;&lt;SPAN&gt;:xx:xx:xx:xx:xx:xx:xx&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;Signature Algorithm: sha1WithRSAEncryption&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;xx&lt;SPAN&gt;:xx:xx:xx:xx:xx:xx:xx&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&lt;SPAN&gt;xx:xx:xx:xx:xx:xx:xx:xx&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="Apple-converted-space"&gt;xx&lt;/SPAN&gt;&lt;SPAN&gt;:xx:xx:xx:xx:xx:xx:xx&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;-----BEGIN&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="lia-search-match-lithium"&gt;CERTIFICATE&lt;/SPAN&gt;-----&lt;/P&gt;
&lt;P class="p1"&gt;xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN&gt;xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN&gt;xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;-----END&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="lia-search-match-lithium"&gt;CERTIFICATE&lt;/SPAN&gt;-----&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2019 19:43:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3874531#M8576</guid>
      <dc:creator>Handy Putra</dc:creator>
      <dc:date>2019-06-17T19:43:30Z</dc:date>
    </item>
    <item>
      <title>Re: WSA Issue:  Error - Certificate signature verification failed.</title>
      <link>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3874550#M8577</link>
      <description>Hi Handy,&lt;BR /&gt;&lt;BR /&gt;we dont have any internal root CA and we want https decryption for all domain and Guest Users.&lt;BR /&gt;&lt;BR /&gt;i know by using Group Policy we can push WSA self signed certificate to Domain Users but we cannot do it for Guest Users.&lt;BR /&gt;&lt;BR /&gt;is there any way that we can achieve Guest Users/non domain Users https Decryption via WSA ? any solution for it ?&lt;BR /&gt;</description>
      <pubDate>Mon, 17 Jun 2019 20:17:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3874550#M8577</guid>
      <dc:creator>hashimwajid1</dc:creator>
      <dc:date>2019-06-17T20:17:21Z</dc:date>
    </item>
    <item>
      <title>Re: WSA Issue:  Error - Certificate signature verification failed.</title>
      <link>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3874577#M8578</link>
      <description>Not one that anyone likes...&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I sat down at Cisco Live last week with a Technical Marketing Engineer, a product manager, and a development manager, and this topic came up.&lt;BR /&gt;&lt;BR /&gt;You have to make the root cert available to be downloaded somehow... I pitched making it available via the WSA, sort of like PAC hosting, with a link in an End User Notification or Acknowledgement message.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Ken&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 17 Jun 2019 20:56:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3874577#M8578</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2019-06-17T20:56:06Z</dc:date>
    </item>
    <item>
      <title>Re: WSA Issue:  Error - Certificate signature verification failed.</title>
      <link>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3874596#M8579</link>
      <description>Hi ken,&lt;BR /&gt;&lt;BR /&gt;This are good suggestions, do u think should i open tac case with cisco for this.&lt;BR /&gt;Its customer requirment and we have to fulfil this.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 17 Jun 2019 21:35:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3874596#M8579</guid>
      <dc:creator>hashimwajid1</dc:creator>
      <dc:date>2019-06-17T21:35:06Z</dc:date>
    </item>
    <item>
      <title>Re: WSA Issue:  Error - Certificate signature verification failed.</title>
      <link>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3876517#M8580</link>
      <description>&lt;P&gt;Hi Ken,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is there any way we can do this for Guest same like PAC file via DHCP/GP ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so guest should download it when they connect automatically or there browser download it automatically before proceeding.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2019 06:57:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3876517#M8580</guid>
      <dc:creator>hashimwajid1</dc:creator>
      <dc:date>2019-06-20T06:57:32Z</dc:date>
    </item>
    <item>
      <title>Re: WSA Issue:  Error - Certificate signature verification failed.</title>
      <link>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3876649#M8581</link>
      <description>At the moment, I dont think there is a way to do it automatically, unless guests join your MDM.&lt;BR /&gt;&lt;BR /&gt;Download/install via dhcp or something similar is probably too dangerous.&lt;BR /&gt;&lt;BR /&gt;But a link on a guest portal may make sense...&lt;BR /&gt;</description>
      <pubDate>Thu, 20 Jun 2019 10:40:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-issue-error-certificate-signature-verification-failed/m-p/3876649#M8581</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2019-06-20T10:40:31Z</dc:date>
    </item>
  </channel>
</rss>

