Resolving Plugin 51192

You can resolve plugin 51192 via the following Tenable applications:

Notes

Updating Tenable Security Center plugins to initiate a plugin push to the Tenable Nessus scanners only works if the plugin feed downloaded by Tenable Security Center is newer than the plugin set on the Tenable Nessus scanners. If Tenable has not yet released a newer plugin feed, wait for the next plugin feed to be available before updating.

The custom_CA.inc file is overwritten every time it is uploaded. When adding additional CA certificates, start with a copy of the existing custom_CA.inc and append the new certificate. If there are multiple certificates in the file, it should look like this:

-----BEGIN CERTIFICATE-----
Lorem ipsum dolor sit amet
consectetuer adipiscing elit
Phasellus hendrerit Pellentesque
aliquet nibh nec urna.
-----END CERTIFICATE----
-----BEGIN CERTIFICATE-----
Lorem ipsum dolor sit amet
consectetuer adipiscing elit
Phasellus hendrerit Pellentesque
aliquet nibh nec urna.
-----END CERTIFICATE----

Troubleshooting

If the above instructions do not work, check the following items:

Custom_CA.inc Format

The CA certificate should be in PEM (Base64) format. To verify, open it in a text editor. The certificate should be between -----BEGIN CERTIFICATE----- and -----END CERTIFICATE-----. If you do not see these lines, the file is in the wrong format. Change the file to PEM (Base64) format either through a conversion or through a fresh export.

Plugin Output

Other issues can be, for example, that the service is missing intermediate certificate(s), the service has a self-signed or default certificate (if not self-signed with the server name, it may be issued by a vendor name like "Nessus Certification Authority") and not a certificate signed by their custom CA, the certificate is expired, etc. Look at the detailed plugin output of 51192 to see exactly why the certificate is untrusted. If updating custom_CA.inc can fix the error, the output indicates that the certificate at the top of the certificate chain is unrecognized. The certificate it shows is either issued by the custom CA (matching the name *exactly*) or the actual custom CA self-signed certificate.