HCHTech
Well-Known Member
- Reaction score
- 4,400
- Location
- Pittsburgh, PA - USA
I hate this topic, I have spent I don't know how many hours fighting with my own shop's setup, as well as various clients' setups. But I digress....
So, this new client is using Trustwave for their PCI scans. They do NOT have a domain, there are 5 computers in a workgroup. They have a single internet-connected cc terminal. I have it on it's own VLAN. They do have a static IP.
They have a Sonicwall TZ300 which has the latest firmware. They were getting failed scans originally because a third-party SSL cert couldn't be detected. Makes sense - there was only the built-in self-signed certificates on the Sonicwall. Also, when I open the management interface over the web, I get the standard warning from Chrome - "This site is not secure."
So:
Unfortunately, a new PCI scan is still failing because "12.345.678.90 SSL Certificate is Not Trusted (external scan)" and "12.345.678.90 SSL Certificate is Self-Signed". Obviously the IP address I've shown isn't the real one, but the address in the actual failure message is correct, and does match the IP I put in for the alternate subject name in the CSR.
BTW, the certificate I purchased from namecheap wasn't their cheapest one, but the next one up - I think it was $18/yr - still dirt cheap compared to what I have seen in the past from other vendors.
Also, namecheap uses Comodo as their CA, and I DO see the Comodo intermediate certificate in the Sonicwall as well as the one I imported.
Normally, I've seen these scans fail for other reasons (usually the firewall doing it's job by blocking what it sees as unwanted traffic), but this one is clearly getting in, it's just not detecting the certificate.
Anyone see what I might have done wrong?
So, this new client is using Trustwave for their PCI scans. They do NOT have a domain, there are 5 computers in a workgroup. They have a single internet-connected cc terminal. I have it on it's own VLAN. They do have a static IP.
They have a Sonicwall TZ300 which has the latest firmware. They were getting failed scans originally because a third-party SSL cert couldn't be detected. Makes sense - there was only the built-in self-signed certificates on the Sonicwall. Also, when I open the management interface over the web, I get the standard warning from Chrome - "This site is not secure."
So:
- I created a new A record in their DNS: sonicwall.companyname.com pointing to their static IP
- I purchased an SSL cert from their webhost, namecheap.com (ugh). The CSR used sonicwall.companyname.com as the common name, and I entered their static IP as an alternative subject name (not sure if this helps, hinders, or is irrelevant). The server platform chosen was Apache (clearly required per several Sonicwall kb articles).
- The zip file received from namecheap contained a .crt file, a .p7b file and a "bundle" file. I chose to import the .crt version (not sure if this was a mistake)
- I then bound the certificate to the management interface, saved the configuration file and rebooted the device
Unfortunately, a new PCI scan is still failing because "12.345.678.90 SSL Certificate is Not Trusted (external scan)" and "12.345.678.90 SSL Certificate is Self-Signed". Obviously the IP address I've shown isn't the real one, but the address in the actual failure message is correct, and does match the IP I put in for the alternate subject name in the CSR.
BTW, the certificate I purchased from namecheap wasn't their cheapest one, but the next one up - I think it was $18/yr - still dirt cheap compared to what I have seen in the past from other vendors.
Also, namecheap uses Comodo as their CA, and I DO see the Comodo intermediate certificate in the Sonicwall as well as the one I imported.
Normally, I've seen these scans fail for other reasons (usually the firewall doing it's job by blocking what it sees as unwanted traffic), but this one is clearly getting in, it's just not detecting the certificate.
Anyone see what I might have done wrong?
Last edited: