10-14-2017 04:21 AM - edited 03-08-2019 07:41 PM
Hi All,
So we have had Ironport (now Cisco WSA) for a good 5 years now, all virtual running 9.1 and all working fine except:
we have around 5,000 ipads on the infrastructure, they are all on a specific wireless flex connect vlan, when they hit the core PBR sets the next hop for port 80 or 443 traffic to the P1 ip of a specific WSA thus achieving transparent proxy for them pesky Ipads.
Enter IOS 11, for some reason in the above setup IOS 11 detects https inspection as a man in the middle attack (which yes it does), certs are from an MS enterprise PKI with the root cert on the WSA and on the Ipads and the subordinate on the WSA serving as it has since the world decided to use HTTPs inspection.
This has only started happening since IOS 11, what is also strange is if you explicitly point to the WSA its fine but when the PBR is used so its transparent it keeps producing this error on the Ipad.
I was going to log a TAC case but thought i would ask you guys first.
Thanks
Ben
11-12-2017 04:40 PM
Hi Ben, i am having the same issue and was about to log a TAC. Did you have any success?
thanks
David
11-25-2017 12:07 PM
Hi David,
No luck yet, I ended up logging a TAC case not long after the post. Its still on going at the moment, I get the odd engineer webex in every now and again as it gets passed around to make sure I have implemented the cert correctly and it goes quiet.
I did hear Cisco were talking to Apple on it but no positive movement yet unfortunately.
We are looking to require an expansion of proxy services soon for a lot more users and I will be using this experience to decide how this looks for us moving forward.
11-26-2017 02:48 PM
Hi Ben
I also logged a TAC case and they came back with an article saying how its been since IOS 7. I havent tried the process yet as i dont think its the cause as its only started since iOS 11.
When accessing mail.google.com using iPhone/iPad running on IOS version 7 and above, the mobile device is unable to display the page and getting certificate error or not trusted, while iPhone/iPad running on IOS 6 and below, the access to mail.google.com is working as normal.
This issue occurs when access to mail.google.com is being decrypt in the Decryption Policy of Cisco Web Security Appliance.
On iPhone or iPad running on IOS version 7 and above is now inherit a list of preloaded HSTS(HTTP Strict Transport Security) and does not provide user with the option to ignore it, please see below link for more information regarding HSTS:
This behaviour has been seen to apply to multiple browsers in IOS 7, browsers that have been tested on IOS 7 are Chrome, Firefox, Safari and Mercury
From the behaviour changes in IOS 7 and above, it appear to be clashing with the behaviour of Cisco Web Security Appliance has in regards handling HTTPS traffics, which Cisco Web Security Appliance decryption will removes all intermediate certificates and assumes the position of RootCA therefore the verification step will fails.
From the below link, advise the source for google full list and issuer white list:
http://src.chromium.org/viewvc/chrome/trunk/src/net/http/transport_security_state_static.json
And browsers who use this list will verify gmail.com has one of the following issuers in the certificate chain:
"VeriSignClass3",
"VeriSignClass3_G3",
"Google1024",
"Google2048",
"GoogleBackup1024",
"GoogleBackup2048",
"GoogleG2",
"EquifaxSecureCA",
"GeoTrustGlobal"
Workaround:
- Download the root sign certificate from the Cisco WSA and emailed as attachment then open the email and attachment from iPhone/iPad, therefore it will force the device to install the certificate as trusted certificate in the local store of the appliance and create a profile for it.
Or
Hosted the .pem file(WSA's root signed certificate) as downloaded from the WSA GUI on a web server and then visit the web server via Safari on the iPad/iPhone. It will then receive the option to install the certificate, similar as the above.
This workaround however will not work with Chrome as internet browser due to the root certificate store in iOS is not accessible by third-party apps, even certs that are pushed or installed on the device
An End User Digital Certificate that contains a public and private key (usually in the form of a .p12 or .pfx file) can be installed onto the iPhone or iPad. With the release of iOS 5 and above. Below are the steps in order to install a digital certificate onto an iPhone or iPad.
Convert a .pem Certificate File to .p12 or .pfx steps:
openssl x509 -in cert.pem.cer -out cert.p12
openssl x509 -in cert.pem.cer -out cert.pfx
From iPad and iPhone.
From iPad and iPhone (same display screen on both devices)
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide