Hi,
I'm in the process of fixing a badly broken HTTPS Inspection configuration.
Not sure what's been done to this management server before, it's been handled by a bunch of admins over time.
Also, it was migrated to Smart-1 Cloud just before I took over, not sure how smooth that process went.
Gateways are clustered 3600s running R81.20.
After fixing many misconfigurations, the main remaining issue is a messed up Trusted CAs repository (old SmartDashboard > HTTPS Inspection > Trusted CAs).
Half of the root CAs are disabled ("removed"), and as a consequence, many websites that go through HTTPS Inspection are considered as untrusted.
While Automatic Updates are enabled, the most recent CA certificates I could see in the list were already a few years old, which I initially though was the issue.
I did not manage to trigger an automatic update, so I ended up manually updating the certificate list from the zip archive (sk64521).
This did add and remove dozens of CAs from the list, but still did not fix the untrusted websites issue.
I checked a few websites and saw that their corresponding root CAs were indeed still missing from the list of trusted CAs.
Then I realized they actually were in the repository, just not in the active/enabled list, and could be added with the Add button.
Clicking "Add" reveals hundreds of "known but disabled" certificates, which is clearly not obvious at first glance.
So yeah, I can add back each missing/disabled root CA, but can only do so one at a time, it takes 12 seconds per certificate, and there's 240 of them (best UI ever guys...)
Did anyone ever encounter such an issue with the Trusted CAs repository?
Do you happen to know a magic undocumented command that would reset the repository to a sane state? (Also, it needs to work on Smart-1 Cloud.)
Anyway I could fix this without spending hours of my life dumb clicking in the (not so) SmartConsole?
Also, I've just setup a lab mgmt, and with the last update, there's 367 CAs there, vs. 444 in my customer's Smart-1 Cloud.
I'm somewhat concerned that old or maybe revoked CAs might still be lying around, which would not be good.
Thoughts ?