<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS Inspection and macOS 10.15 (Catalina) in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-and-macOS-10-15-Catalina/m-p/75557#M11853</link>
    <description>&lt;P&gt;Do you know if the fix is going to be provided to the SMB line of appliances, namely the 700 and 1400 series?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
    <pubDate>Tue, 18 Feb 2020 07:07:54 GMT</pubDate>
    <dc:creator>Andrew_Kim</dc:creator>
    <dc:date>2020-02-18T07:07:54Z</dc:date>
    <item>
      <title>HTTPS Inspection and macOS 10.15 (Catalina)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-and-macOS-10-15-Catalina/m-p/70608#M11852</link>
      <description>&lt;P&gt;Apple has changed the requirements regarding HTTPS server certificates in its products – Mainly &lt;A href="https://support.apple.com/en-us/HT210176" target="_blank"&gt;Catalina 10.15 and iOS 13&lt;/A&gt;.&lt;BR /&gt;SHA1 signed certificates are no longer considered secure and servers using them will be blocked.&lt;BR /&gt;The default CA certificate we generate for HTTPS Inspection is SHA1 signed.&lt;BR /&gt;This means end users with a default HTTPS Inspection CA certificate using macOS 10.15 endpoints will encounter an untrusted certificate error message.&lt;BR /&gt;More details (and a solution) can be found in &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk163932&amp;amp;partition=General&amp;amp;product=HTTPS" target="_blank"&gt;sk163932&lt;/A&gt;.&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In R80.40, the default HTTPS Inspection CA certificate will be SHA256 signed.&lt;BR /&gt;This change will also be integrated into upcoming Jumbo Hotfixes for other R80.x releases.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2019 20:55:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-and-macOS-10-15-Catalina/m-p/70608#M11852</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-12-16T20:55:55Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection and macOS 10.15 (Catalina)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-and-macOS-10-15-Catalina/m-p/75557#M11853</link>
      <description>&lt;P&gt;Do you know if the fix is going to be provided to the SMB line of appliances, namely the 700 and 1400 series?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 18 Feb 2020 07:07:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-and-macOS-10-15-Catalina/m-p/75557#M11853</guid>
      <dc:creator>Andrew_Kim</dc:creator>
      <dc:date>2020-02-18T07:07:54Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection and macOS 10.15 (Catalina)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-and-macOS-10-15-Catalina/m-p/75605#M11854</link>
      <description>Not aware of any specific plans.&lt;BR /&gt;That said, you can ask via TAC if the relevant fix can be ported to the SMB appliances.&lt;BR /&gt;Note you can always generate a new CA key using a procedure similar to this sk (though not directly on the SMB appliance): &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk115894" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk115894&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 18 Feb 2020 18:22:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-and-macOS-10-15-Catalina/m-p/75605#M11854</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-02-18T18:22:50Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection and macOS 10.15 (Catalina)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-and-macOS-10-15-Catalina/m-p/75606#M11855</link>
      <description>&lt;P&gt;Thanks for the response. &amp;nbsp;I'll need to reach out to TAC to see what, if anything, can be done. &amp;nbsp;I also did try the fix in the SK using an R80.30 firewall but that didn't appear to change the behavior at all on the SMB device.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Feb 2020 18:25:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-and-macOS-10-15-Catalina/m-p/75606#M11855</guid>
      <dc:creator>Andrew_Kim</dc:creator>
      <dc:date>2020-02-18T18:25:36Z</dc:date>
    </item>
  </channel>
</rss>

