The FortiGate and Palo Alto IPsec tunnel fails to establish when the certificates is signed with SHA-256 or stronger algorithm.
641
Created On 11/07/25 09:51 AM - Last Modified 01/12/26 22:49 PM
Symptom
- IPSEC tunnel is configured between FortiGate and Palo Alto Firewall.
- The tunnel fails to establish with IKEV2 phase 1 failing.
- The following logs are visible in ikemgr.log:
+0100 [PERR]: RSA_verify failed: 0:error:04091068:rsa routines:int_rsa_verify:bad signature:crypto/rsa/rsa_sign.c:228: +0100 [PERR]: Invalid SIG.
Environment
- FortiGate.
- NGFW.
- Prisma Access - Remote Networks.
- IPSec using certificates.
- PAN-OS 10.2.4
Cause
- The StrongSwan implementation used by FortiGate introduces an incompatibility with PAN-OS when utilizing certificate authentication.
- This issue is triggered by the deployment of SHA-256 certificates, which subsequently conflict with the hashing requirements of the IPsec tunnel.
Resolution
- Configure Palo Alto IKE profile with SHA1 at the first place of the authentication list.
- This can be done under GUI: Network > Network Profiles > IKE Crypto > (modify or add) > under Authentication add SHA1 as first.
- CLI output is shown below
Example-IKE-Crypto { hash [ sha1 sha256 sha384 sha512]; dh-group group20; encryption aes-256-cbc; lifetime { seconds 28800; } - Configure FortiGate IKE profile only with the desired SHA, for example, SHA512.
- Tunnel will be established with SHA512.