Firewall failing to connect to User-ID Agent (UIA) when using a Custom Certificate on UIA
5934
Created On 08/01/23 03:40 AM - Last Modified 06/13/25 22:40 PM
Symptom
- The distributord.log (less mp-log distributord.log) show the UIA's server certificate verification failed:
-0700 [distributord] Received certificate with issuer = '/C=US/ST=CA/O=Example Corp/CN=Example Intermediate CA'
-0700 [distributord] Received certificate with subject = '/C=US/ST=California/L=Los Angeles/O=Example Corp/CN=uia.example.local'
-0700 [distributord] Loading custom trust certs:GS-CTBC-R1 to store
-0700 Error: pan_distributor_agent_verify_cert_cb(pan_distributor_agent.c:1843): pan_user_id_perform_cn_validations failed
-0700 [distributord] Returning FAILURE from pan_user_id_uia_verify_cert_cb
-0700 Error: pan_dcom_ssl_connect(pan_dcom_ssl.c:412): conn User-ID BR29HQ: SSL_connect return -1
-0700 Error: pan_dcom_ssl_connect(pan_dcom_ssl.c:413): SSL :error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
- Firewall packet captures show the firewall (172.20.3.13) sent a Fatal Alert with Unsupported Certificate:
11 0.010686 2023-07-03 14:36:52.141124 172.20.3.13 172.20.3.12 TLSv1.2 Alert (Level: Fatal, Description: Unsupported Certificate) 73 0.010686000 080a4914382d2b4f0bf0 1226061869 726600688
Environment
- Palo Alto Firewalls
- Supported PAN-OS
- User-ID Agent (UIA)
Cause
- The host field of User-ID Agent configuration on the Firewall is using IP address whereas the Server certificate on the User-ID Agent is using FQDN.
- This can be verified by checking the configuration on the firewall and distributord logs.
[distributord] Received certificate with subject = ‘/C=US/ST=California/L=Los Angeles/O=Example Corp/CN=uia.example.local’
- In this example, the Firewall is configured with IP Address of 172.20.3.12, but the User-ID Agent is sending FQDN of uia.example.local
- For the Firewall to connect to UIA agent successfully, both have to be configured with similar values (either IP address or FQDN),
Resolution
Configure the User-ID Agent host field to match the Common Name (CN) or the Subject Alternative Name (SAN) in the certificate.
- If the IP Address is configured as a hostname on the firewall, ensure the Server Certificate on the User-ID Agent has that IP Address in the CN or SAN field
- If the FQDN is configured as a hostname on the firewall, ensure the Server Certificate on the User-ID Agent has that FQDN in the CN or SAN field
Additional Information
- When a custom server certificate is used in the User-ID Agent, the firewall should be configured with the Certificate Profile under User Identification > Connection Security configuration
- The Certificate Profile should have the CA chain that issued the custom certificate
NOTES:
- If the server certificate only has CN, that will be used to validate the certificate
- If the server certificate has SAN extension, that will be preferred over CN to validate the certificate as per RFC 2818