<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: App &amp;amp; URL Filtering - OSCP Responder Failure in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/App-amp-URL-Filtering-OSCP-Responder-Failure/m-p/272419#M103784</link>
    <description>&lt;P&gt;1. A domain based HTTPs bypass has already been implemented prior to any probing based rules.&lt;/P&gt;&lt;P&gt;2. the OSCP server is reachable but it is returning a 401 unauthorized error code.&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. they are using private certs, I have added the full chain to the trusted CAs list.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am going to be getting a TAC case opened for it&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 03 Mar 2026 19:23:35 GMT</pubDate>
    <dc:creator>Austin35</dc:creator>
    <dc:date>2026-03-03T19:23:35Z</dc:date>
    <item>
      <title>App &amp; URL Filtering - OSCP Responder Failure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/App-amp-URL-Filtering-OSCP-Responder-Failure/m-p/272252#M103726</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;We recently enabled HTTPs encryption, with an implied bypass except a few hosts for testing.&lt;/P&gt;&lt;P&gt;HTTPs inspection is also completely in fail-open mode.&amp;nbsp;&lt;/P&gt;&lt;P&gt;One of our servers that is using an API out to an internet endpoint has been having issues, first it was related to https inspection probing but adding a domain based exception prior to probing rules has fixed that issue. But recently we have been seeing intermittent errors with it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Only thing I see in logs is an app/url Detect for an unreachable OSCP server. Exact Error message below&lt;/P&gt;&lt;P&gt;OCSP responder returned an 'unauthorized' status reply. Refer to sk159872 for more details.&lt;BR /&gt;Certificate DN: '...........' Requested Server Name: ............ See sk159872&lt;/P&gt;&lt;P&gt;I tried adding the entire cert chain to the trusted CA list to no avail.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I more than likely will be getting a tac case opened for this but was wondering if anyone knew of any quick options here.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2026 17:48:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/App-amp-URL-Filtering-OSCP-Responder-Failure/m-p/272252#M103726</guid>
      <dc:creator>Austin35</dc:creator>
      <dc:date>2026-03-02T17:48:26Z</dc:date>
    </item>
    <item>
      <title>Re: App &amp; URL Filtering - OSCP Responder Failure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/App-amp-URL-Filtering-OSCP-Responder-Failure/m-p/272353#M103753</link>
      <description>&lt;P&gt;Here are some testing point I can think of,&lt;/P&gt;
&lt;P&gt;1. Bypass https inspection for this specific API flow and check&lt;/P&gt;
&lt;P&gt;2. Use ping and curl command from CLI to test connectivity with OCSP server domain name&lt;/P&gt;
&lt;P&gt;3. Make sure checkpoint's trusted CA list is up to date. Generally, it is automatic update but good to verify&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2026 11:40:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/App-amp-URL-Filtering-OSCP-Responder-Failure/m-p/272353#M103753</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2026-03-03T11:40:37Z</dc:date>
    </item>
    <item>
      <title>Re: App &amp; URL Filtering - OSCP Responder Failure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/App-amp-URL-Filtering-OSCP-Responder-Failure/m-p/272416#M103778</link>
      <description>&lt;P&gt;Assuming this is an R82/R82.10 gateway, the following might also apply:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk184766" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk184766&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2026 19:12:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/App-amp-URL-Filtering-OSCP-Responder-Failure/m-p/272416#M103778</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-03-03T19:12:40Z</dc:date>
    </item>
    <item>
      <title>Re: App &amp; URL Filtering - OSCP Responder Failure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/App-amp-URL-Filtering-OSCP-Responder-Failure/m-p/272418#M103783</link>
      <description>&lt;P&gt;My bad I always forget to mention that. Yes we are running R82. This has been happening for roughly a month now and the CRL validation impacted or MAB certificates but the work around has already been applied there.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2026 19:19:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/App-amp-URL-Filtering-OSCP-Responder-Failure/m-p/272418#M103783</guid>
      <dc:creator>Austin35</dc:creator>
      <dc:date>2026-03-03T19:19:44Z</dc:date>
    </item>
    <item>
      <title>Re: App &amp; URL Filtering - OSCP Responder Failure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/App-amp-URL-Filtering-OSCP-Responder-Failure/m-p/272419#M103784</link>
      <description>&lt;P&gt;1. A domain based HTTPs bypass has already been implemented prior to any probing based rules.&lt;/P&gt;&lt;P&gt;2. the OSCP server is reachable but it is returning a 401 unauthorized error code.&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. they are using private certs, I have added the full chain to the trusted CAs list.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am going to be getting a TAC case opened for it&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2026 19:23:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/App-amp-URL-Filtering-OSCP-Responder-Failure/m-p/272419#M103784</guid>
      <dc:creator>Austin35</dc:creator>
      <dc:date>2026-03-03T19:23:35Z</dc:date>
    </item>
  </channel>
</rss>

