<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic https inspection on R80.30 JHF 219 - SAN error on client in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-on-R80-30-JHF-219-SAN-error-on-client/m-p/121812#M17404</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I have a problem with HTTPS inspection and SAN cert on R80.30 JHF 219.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The scenario:&lt;/P&gt;&lt;P&gt;HTTPS inspection is enabled with a self-signed cert from the gateway itself and imported unto the clients.&lt;/P&gt;&lt;P&gt;Application Control, URL filtering and IP Sec VPN is enabled.&lt;/P&gt;&lt;P&gt;HTTPS inspection policy is default.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The clients get a cert error when connecting to their company website, which is hosted at a third party hosting-partner.&lt;/P&gt;&lt;P&gt;The certificate coming from 3.party contains these details:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;CN = companyname.dk&lt;/LI&gt;&lt;LI&gt;Issuer = Let's Encrypt&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Subject Alt Names:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&amp;nbsp;DNS Name = companyname.dk&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;DNS Name = &lt;A href="http://www.companyname.dk" target="_blank" rel="noopener"&gt;www.companyname.dk&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Public Key info:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Algorithm = Elliptic Curve&lt;/LI&gt;&lt;LI&gt;Key Size = 384&lt;/LI&gt;&lt;LI&gt;etc etc etc.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;When you access the website, it redirects you to &lt;A href="https://www.companyname.dk" target="_blank" rel="noopener"&gt;https://www.companyname.dk&lt;/A&gt; and this is where it gives an error on the client when https inspection is enabled. Disabling HTTPS inspection makes it work normally.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking in the firewall log I see this:&lt;/P&gt;&lt;P&gt;HTTPS Validation: Invalid CRL Retrived&lt;/P&gt;&lt;P&gt;Resource: &lt;A href="http://www.companyname.dk" target="_blank" rel="noopener"&gt;www.companyname.dk&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Description: &lt;A href="http://www.companyname.dk" target="_blank" rel="noopener"&gt;www.companyname.dk&lt;/A&gt; Detected&lt;/P&gt;&lt;P&gt;Description: No Valid CRL. Certificate DN) 'CN=companyname.dk' Requested Server Name: &lt;A href="http://www.companyname.dk" target="_blank" rel="noopener"&gt;www.companyname.dk&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It looks to me like the firewall does not like that the FQDN that the request gets redirected to is not the one in CN.&lt;/P&gt;&lt;P&gt;Can I do something about that, generally, so HTTPS inspection takes SAN into consideration?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Something regarding this should have been fixed in our version (219), but not enough I guess: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk118392" target="_blank" rel="noopener"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk118392&lt;/A&gt; (article refers to SAN only being checked first time, should have been fixed in version 195)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 22 Jun 2021 11:10:27 GMT</pubDate>
    <dc:creator>ias_gc-dk</dc:creator>
    <dc:date>2021-06-22T11:10:27Z</dc:date>
    <item>
      <title>https inspection on R80.30 JHF 219 - SAN error on client</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-on-R80-30-JHF-219-SAN-error-on-client/m-p/121812#M17404</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I have a problem with HTTPS inspection and SAN cert on R80.30 JHF 219.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The scenario:&lt;/P&gt;&lt;P&gt;HTTPS inspection is enabled with a self-signed cert from the gateway itself and imported unto the clients.&lt;/P&gt;&lt;P&gt;Application Control, URL filtering and IP Sec VPN is enabled.&lt;/P&gt;&lt;P&gt;HTTPS inspection policy is default.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The clients get a cert error when connecting to their company website, which is hosted at a third party hosting-partner.&lt;/P&gt;&lt;P&gt;The certificate coming from 3.party contains these details:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;CN = companyname.dk&lt;/LI&gt;&lt;LI&gt;Issuer = Let's Encrypt&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Subject Alt Names:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&amp;nbsp;DNS Name = companyname.dk&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;DNS Name = &lt;A href="http://www.companyname.dk" target="_blank" rel="noopener"&gt;www.companyname.dk&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Public Key info:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Algorithm = Elliptic Curve&lt;/LI&gt;&lt;LI&gt;Key Size = 384&lt;/LI&gt;&lt;LI&gt;etc etc etc.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;When you access the website, it redirects you to &lt;A href="https://www.companyname.dk" target="_blank" rel="noopener"&gt;https://www.companyname.dk&lt;/A&gt; and this is where it gives an error on the client when https inspection is enabled. Disabling HTTPS inspection makes it work normally.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking in the firewall log I see this:&lt;/P&gt;&lt;P&gt;HTTPS Validation: Invalid CRL Retrived&lt;/P&gt;&lt;P&gt;Resource: &lt;A href="http://www.companyname.dk" target="_blank" rel="noopener"&gt;www.companyname.dk&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Description: &lt;A href="http://www.companyname.dk" target="_blank" rel="noopener"&gt;www.companyname.dk&lt;/A&gt; Detected&lt;/P&gt;&lt;P&gt;Description: No Valid CRL. Certificate DN) 'CN=companyname.dk' Requested Server Name: &lt;A href="http://www.companyname.dk" target="_blank" rel="noopener"&gt;www.companyname.dk&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It looks to me like the firewall does not like that the FQDN that the request gets redirected to is not the one in CN.&lt;/P&gt;&lt;P&gt;Can I do something about that, generally, so HTTPS inspection takes SAN into consideration?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Something regarding this should have been fixed in our version (219), but not enough I guess: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk118392" target="_blank" rel="noopener"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk118392&lt;/A&gt; (article refers to SAN only being checked first time, should have been fixed in version 195)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jun 2021 11:10:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-on-R80-30-JHF-219-SAN-error-on-client/m-p/121812#M17404</guid>
      <dc:creator>ias_gc-dk</dc:creator>
      <dc:date>2021-06-22T11:10:27Z</dc:date>
    </item>
    <item>
      <title>Re: https inspection on R80.30 JHF 219 - SAN error on client</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-on-R80-30-JHF-219-SAN-error-on-client/m-p/122058#M17451</link>
      <description>&lt;P&gt;This might be a bug and I highly recommend a TAC case.&lt;BR /&gt;You can potentially work around this by disabling CRL checking in SmartDashboard (shown here):&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2021-06-24 at 7.57.31 AM.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/12315i612154B918A8B0EE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2021-06-24 at 7.57.31 AM.png" alt="Screen Shot 2021-06-24 at 7.57.31 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jun 2021 14:58:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/https-inspection-on-R80-30-JHF-219-SAN-error-on-client/m-p/122058#M17451</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-06-24T14:58:59Z</dc:date>
    </item>
  </channel>
</rss>

