<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA Self-signed certificates, primary and secondary in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-self-signed-certificates-primary-and-secondary/m-p/2777805#M177559</link>
    <description>&lt;P&gt;Hello.&lt;/P&gt;
&lt;P&gt;Doing some ASA upgrades, and dealing with the Java certificate requirements.&lt;/P&gt;
&lt;P&gt;We upgraded on primary/secondary pair no problem and got the self-signed certificate installed into Java. We can access the primary with no issues or warnings.&lt;/P&gt;
&lt;P&gt;However when we access the secondary, java complains that the IP address we're going to doesn't match the CN in the certificate.&lt;/P&gt;
&lt;P&gt;Looking at the ASA, there are separate self-signed certificates for the IP of the secondary as well as the primary, but obviously the secondary is presenting a certificate with the primary's IP in the CN. And I see no way to influence which cert the ASA presents to the client.&lt;/P&gt;
&lt;P&gt;I would think the easy way to deal with this would be to remove the existing self-signed certificates, generate a new one which includes two CNs, one for each IP. Now the certificate should be valid no matter which IP we're going to.&lt;/P&gt;
&lt;P&gt;This seems straightforward, but I couldn't find any documentation saying this was a standard practice, so wondered if I was missing something.&lt;/P&gt;
&lt;P&gt;Does anyone see a problem with this approach, and if so can you suggest a better way?&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 06:49:26 GMT</pubDate>
    <dc:creator>Leroy Plock</dc:creator>
    <dc:date>2019-03-12T06:49:26Z</dc:date>
    <item>
      <title>ASA Self-signed certificates, primary and secondary</title>
      <link>https://community.cisco.com/t5/network-security/asa-self-signed-certificates-primary-and-secondary/m-p/2777805#M177559</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;
&lt;P&gt;Doing some ASA upgrades, and dealing with the Java certificate requirements.&lt;/P&gt;
&lt;P&gt;We upgraded on primary/secondary pair no problem and got the self-signed certificate installed into Java. We can access the primary with no issues or warnings.&lt;/P&gt;
&lt;P&gt;However when we access the secondary, java complains that the IP address we're going to doesn't match the CN in the certificate.&lt;/P&gt;
&lt;P&gt;Looking at the ASA, there are separate self-signed certificates for the IP of the secondary as well as the primary, but obviously the secondary is presenting a certificate with the primary's IP in the CN. And I see no way to influence which cert the ASA presents to the client.&lt;/P&gt;
&lt;P&gt;I would think the easy way to deal with this would be to remove the existing self-signed certificates, generate a new one which includes two CNs, one for each IP. Now the certificate should be valid no matter which IP we're going to.&lt;/P&gt;
&lt;P&gt;This seems straightforward, but I couldn't find any documentation saying this was a standard practice, so wondered if I was missing something.&lt;/P&gt;
&lt;P&gt;Does anyone see a problem with this approach, and if so can you suggest a better way?&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:49:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-self-signed-certificates-primary-and-secondary/m-p/2777805#M177559</guid>
      <dc:creator>Leroy Plock</dc:creator>
      <dc:date>2019-03-12T06:49:26Z</dc:date>
    </item>
    <item>
      <title>You can use it the way with</title>
      <link>https://community.cisco.com/t5/network-security/asa-self-signed-certificates-primary-and-secondary/m-p/2777806#M177561</link>
      <description>&lt;P&gt;You can use it the way with both IPs in the certificate. Even better, include the internal FQDNs so that you can access them by name and not only&amp;nbsp;by IP.&lt;/P&gt;
&lt;P&gt;For maximum campatibility, include the IPs as IP-based SANs *and* as DNS-based SANs.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Nov 2015 19:12:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-self-signed-certificates-primary-and-secondary/m-p/2777806#M177561</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-11-02T19:12:55Z</dc:date>
    </item>
    <item>
      <title>Karsten,</title>
      <link>https://community.cisco.com/t5/network-security/asa-self-signed-certificates-primary-and-secondary/m-p/2777807#M177563</link>
      <description>&lt;P&gt;Karsten,&lt;/P&gt;
&lt;P&gt;Great, thanks for the swift and clear reply.&lt;/P&gt;
&lt;P&gt;Followup question: We have a number of ASA primary/secondary pairs. Being lazy, I don't want to&amp;nbsp;generate a separate certificate for each pair and import them all into Java. I'm thinking I can generate ONE certificate that includes the IPs for ALL the ASAs, import that certificate onto all the other ASAs and into Java, and I'm done. I don't see that this in any way presents a security issue, do you?&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Nov 2015 19:51:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-self-signed-certificates-primary-and-secondary/m-p/2777807#M177563</guid>
      <dc:creator>Leroy Plock</dc:creator>
      <dc:date>2015-11-02T19:51:07Z</dc:date>
    </item>
    <item>
      <title>Working that way is not that</title>
      <link>https://community.cisco.com/t5/network-security/asa-self-signed-certificates-primary-and-secondary/m-p/2777808#M177565</link>
      <description>&lt;P&gt;Working that way is not that uncommon, but still has security-implications that should be known.&lt;/P&gt;
&lt;P&gt;If one of the ASAs (or the private key) get compromized, then you can't revoke the certificate of a single system. It has to be done for all ASAs at the same and in a short time-frame.&lt;/P&gt;
&lt;P&gt;If you decide that it's an acceptable risk, then go for it.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Nov 2015 20:36:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-self-signed-certificates-primary-and-secondary/m-p/2777808#M177565</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-11-02T20:36:04Z</dc:date>
    </item>
    <item>
      <title>True, and to export/import</title>
      <link>https://community.cisco.com/t5/network-security/asa-self-signed-certificates-primary-and-secondary/m-p/2777809#M177567</link>
      <description>&lt;P&gt;True, and to export/import the cert between ASAs you have to export the private key which isn't the best practice. But this is just about protecting the ASDM client to be sure it is connecting to a trusted ASA for administration. It has no effect on anyone accessing the network and doesn't protect the ASA from rogue administrators.&lt;/P&gt;
&lt;P&gt;As you say, it's a matter of acceptable risk.&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Nov 2015 20:42:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-self-signed-certificates-primary-and-secondary/m-p/2777809#M177567</guid>
      <dc:creator>Leroy Plock</dc:creator>
      <dc:date>2015-11-02T20:42:52Z</dc:date>
    </item>
  </channel>
</rss>

