<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Categorize HTTPS Website and TLSv1.3 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Website-and-TLSv1-3/m-p/59144#M12517</link>
    <description>&lt;P&gt;Hello Folks,&lt;/P&gt;&lt;P&gt;I am working with a client who has an issue blocking a specific adult categorized website. Security gateway is running R77.30 and management is on R80.10.&lt;/P&gt;&lt;P&gt;While the initial problem was because of an old app db due to which the website used to return as un-categorized. This was fixed, however we started to see that the website was still accessible over HTTPS. Categorize HTTPS websites is enabled (no inspection).&amp;nbsp;&lt;/P&gt;&lt;P&gt;Most of the known adult websites over HTTP or HTTPS is being blocked except this one (letmerjerk.com). When I ran tests on ssllabs, I did see multiple certificates returning (possible SNI too), but from the capture ran on a test setup and client's environment I saw that the server was returning the CN/DN matching the URL (no SNI). Further to this, while using additional TLS filters on Wireshark saw that the website is negotiating over TLSv1.3.&lt;/P&gt;&lt;P&gt;To confirm the behavior, I tried accessing the website using Internet explorer with TLSv1.2 and 1.1 disabled. Firewall blocked it successfully, while when I use Chrome (from version 63 is built to support TLSv1.3) website opens.&lt;/P&gt;&lt;P&gt;I understand HTTPS inspection is the answer, but we are talking about multiple client offices + multiple firewalls which invites additional work. TAC has been involved, but they don't seem be answering my question on this limitation, but its just a pure reply recommending Inspection to be enabled.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anybody knows if this has been documented/discussed before?&lt;/P&gt;</description>
    <pubDate>Mon, 29 Jul 2019 10:49:20 GMT</pubDate>
    <dc:creator>Udupi_krishna</dc:creator>
    <dc:date>2019-07-29T10:49:20Z</dc:date>
    <item>
      <title>Categorize HTTPS Website and TLSv1.3</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Website-and-TLSv1-3/m-p/59144#M12517</link>
      <description>&lt;P&gt;Hello Folks,&lt;/P&gt;&lt;P&gt;I am working with a client who has an issue blocking a specific adult categorized website. Security gateway is running R77.30 and management is on R80.10.&lt;/P&gt;&lt;P&gt;While the initial problem was because of an old app db due to which the website used to return as un-categorized. This was fixed, however we started to see that the website was still accessible over HTTPS. Categorize HTTPS websites is enabled (no inspection).&amp;nbsp;&lt;/P&gt;&lt;P&gt;Most of the known adult websites over HTTP or HTTPS is being blocked except this one (letmerjerk.com). When I ran tests on ssllabs, I did see multiple certificates returning (possible SNI too), but from the capture ran on a test setup and client's environment I saw that the server was returning the CN/DN matching the URL (no SNI). Further to this, while using additional TLS filters on Wireshark saw that the website is negotiating over TLSv1.3.&lt;/P&gt;&lt;P&gt;To confirm the behavior, I tried accessing the website using Internet explorer with TLSv1.2 and 1.1 disabled. Firewall blocked it successfully, while when I use Chrome (from version 63 is built to support TLSv1.3) website opens.&lt;/P&gt;&lt;P&gt;I understand HTTPS inspection is the answer, but we are talking about multiple client offices + multiple firewalls which invites additional work. TAC has been involved, but they don't seem be answering my question on this limitation, but its just a pure reply recommending Inspection to be enabled.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anybody knows if this has been documented/discussed before?&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 10:49:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Website-and-TLSv1-3/m-p/59144#M12517</guid>
      <dc:creator>Udupi_krishna</dc:creator>
      <dc:date>2019-07-29T10:49:20Z</dc:date>
    </item>
    <item>
      <title>Re: Categorize HTTPS Website and TLSv1.3</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Website-and-TLSv1-3/m-p/59148#M12518</link>
      <description>&lt;P&gt;HI&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/26431"&gt;@Udupi_krishna&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you face an issue with only one URL (&lt;SPAN&gt;letmerjerk.com) then meanwhile you can make IP base rule to block this site.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Its resolved two IP&amp;nbsp;&lt;A href="https://mxtoolbox.com/SuperTool.aspx?action=a%3aletmerjerk.com&amp;amp;run=toolpage#" target="_blank"&gt;200.63.47.3&lt;/A&gt;&amp;nbsp;and&amp;nbsp;89.35.39.50.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/25509"&gt;@Chinmaya_Naik&lt;/a&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 11:42:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Website-and-TLSv1-3/m-p/59148#M12518</guid>
      <dc:creator>Chinmaya_Naik</dc:creator>
      <dc:date>2019-07-29T11:42:46Z</dc:date>
    </item>
    <item>
      <title>Re: Categorize HTTPS Website and TLSv1.3</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Website-and-TLSv1-3/m-p/59213#M12519</link>
      <description>&lt;P&gt;I guess there was a typo in the URL, its letmejerk.com. While there are like 4 different IP addresses it resolves to, I wouldn't like to block it based on IP address.&lt;/P&gt;&lt;P&gt;Wrote this discussion post to further dig into the limitation I observed and wanted to understand if Checkpoint indeed confirms this behavior.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 05:16:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Website-and-TLSv1-3/m-p/59213#M12519</guid>
      <dc:creator>Udupi_krishna</dc:creator>
      <dc:date>2019-07-30T05:16:55Z</dc:date>
    </item>
    <item>
      <title>Re: Categorize HTTPS Website and TLSv1.3</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Website-and-TLSv1-3/m-p/59223#M12520</link>
      <description>&lt;P&gt;TLS 1.3 is designed to prevent insight, which makes security more difficult.&lt;/P&gt;&lt;P&gt;R80.30 has new SNI features that will make HTTPS Categorization better, but I don't think it supports TLSv1.3 yet.&lt;/P&gt;&lt;P&gt;We discussed this briefly during last CPX, and I think Check Point said they where working on something, but I'm not sure how it will work or when it will be available.&lt;/P&gt;&lt;P&gt;A quick and good summary of how it works can be found in the YouTube clip here: &lt;A href="https://community.checkpoint.com/t5/Access-Control-Products/HTTPS-Inspection-and-website-categorization-improvements/m-p/55828" target="_blank"&gt;https://community.checkpoint.com/t5/Access-Control-Products/HTTPS-Inspection-and-website-categorization-improvements/m-p/55828&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 10:32:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Website-and-TLSv1-3/m-p/59223#M12520</guid>
      <dc:creator>Sigbjorn</dc:creator>
      <dc:date>2019-07-30T10:32:06Z</dc:date>
    </item>
    <item>
      <title>Re: Categorize HTTPS Website and TLSv1.3</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Website-and-TLSv1-3/m-p/134520#M20164</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;After I enabled, categorize https websites on my internet facing gateway, some of the government specific websites stopped working and rest of the internet sites worked well. Any idea what would went wrong?&lt;/P&gt;&lt;P&gt;I havent seen any drops in smart console during the issue reported time.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 16:06:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Website-and-TLSv1-3/m-p/134520#M20164</guid>
      <dc:creator>Nandhakumar</dc:creator>
      <dc:date>2021-11-19T16:06:12Z</dc:date>
    </item>
  </channel>
</rss>

