<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Inbound HTTPS inspection certificate chain in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-HTTPS-inspection-certificate-chain/m-p/123177#M17662</link>
    <description>&lt;P&gt;Hello everyone!&lt;/P&gt;&lt;P&gt;Recently stumbled upon a peculiar problem with the inbound HTTPS inspection. We host a server, inbound traffic to which is being inspected. The server can be accessed via web by regular browsers or by a mobile app designed specifically for this server application. Everything works as expected with regular browser connections. However, problem arises when the mobile app tries to connect. Strictly speaking, the problem is with the Android version of the app. Sometimes the app doesn't respond to Server's TLS Hello, other times it responds with &lt;EM&gt;"TLSv Record Layer: Alert (Level: Fatal, Description: Certificate Unknown)"&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;I did some investigating and found out that Checkpoint's Inspection mechanism sends just the web certificate of the server in Server Hello, while the server itself sends the whole certificate chain including the CA. Otherwise Checkpoint's and servers' Hello packets are nearly identical.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Checkpoint's Server Hello:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.png" style="width: 660px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/12476i9140054A84640D3B/image-size/large?v=v2&amp;amp;px=999" role="button" title="1.png" alt="1.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Original Server Hello:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2.png" style="width: 890px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/12477iF9098A0139EC1FE1/image-size/large?v=v2&amp;amp;px=999" role="button" title="2.png" alt="2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now the question is, is it possible to enable transmission of the whole certificate chain in HTTPS Inspection and, if yes, how can it be done?&lt;/P&gt;</description>
    <pubDate>Wed, 07 Jul 2021 12:34:39 GMT</pubDate>
    <dc:creator>i80r</dc:creator>
    <dc:date>2021-07-07T12:34:39Z</dc:date>
    <item>
      <title>Inbound HTTPS inspection certificate chain</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-HTTPS-inspection-certificate-chain/m-p/123177#M17662</link>
      <description>&lt;P&gt;Hello everyone!&lt;/P&gt;&lt;P&gt;Recently stumbled upon a peculiar problem with the inbound HTTPS inspection. We host a server, inbound traffic to which is being inspected. The server can be accessed via web by regular browsers or by a mobile app designed specifically for this server application. Everything works as expected with regular browser connections. However, problem arises when the mobile app tries to connect. Strictly speaking, the problem is with the Android version of the app. Sometimes the app doesn't respond to Server's TLS Hello, other times it responds with &lt;EM&gt;"TLSv Record Layer: Alert (Level: Fatal, Description: Certificate Unknown)"&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;I did some investigating and found out that Checkpoint's Inspection mechanism sends just the web certificate of the server in Server Hello, while the server itself sends the whole certificate chain including the CA. Otherwise Checkpoint's and servers' Hello packets are nearly identical.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Checkpoint's Server Hello:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.png" style="width: 660px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/12476i9140054A84640D3B/image-size/large?v=v2&amp;amp;px=999" role="button" title="1.png" alt="1.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Original Server Hello:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2.png" style="width: 890px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/12477iF9098A0139EC1FE1/image-size/large?v=v2&amp;amp;px=999" role="button" title="2.png" alt="2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now the question is, is it possible to enable transmission of the whole certificate chain in HTTPS Inspection and, if yes, how can it be done?&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jul 2021 12:34:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-HTTPS-inspection-certificate-chain/m-p/123177#M17662</guid>
      <dc:creator>i80r</dc:creator>
      <dc:date>2021-07-07T12:34:39Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS inspection certificate chain</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-HTTPS-inspection-certificate-chain/m-p/123198#M17669</link>
      <description>&lt;P&gt;When setting up inbound inspection certificate, you need to take it with the whole chain, not just intermediary CA one.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jul 2021 13:59:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-HTTPS-inspection-certificate-chain/m-p/123198#M17669</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-07-07T13:59:26Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS inspection certificate chain</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-HTTPS-inspection-certificate-chain/m-p/123246#M17676</link>
      <description>&lt;P&gt;Thank you _Val_!&lt;/P&gt;&lt;P&gt;For those, who are interested how to convert a pfx/p12 certificate to a chain here is the solution:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.computertechblog.com/create-a-pfx-file-with-a-certificate-chain/" target="_blank"&gt;https://www.computertechblog.com/create-a-pfx-file-with-a-certificate-chain/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jul 2021 05:02:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-HTTPS-inspection-certificate-chain/m-p/123246#M17676</guid>
      <dc:creator>i80r</dc:creator>
      <dc:date>2021-07-08T05:02:21Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS inspection certificate chain</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-HTTPS-inspection-certificate-chain/m-p/123248#M17677</link>
      <description>&lt;P&gt;Strictly speaking you should not include CA root certificate in a chain. It is supposed to be fetched from a local trusted store. For Windows that is&amp;nbsp;&lt;STRONG&gt;Trusted Root Certificate Authorities&lt;/STRONG&gt; store and for CheckPoint that is &lt;STRONG&gt;Trusted CAs&lt;/STRONG&gt; store.&lt;/P&gt;
&lt;P&gt;If your software *requires* CA root certificate to be included in the chain then that is kind of not correct...&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jul 2021 05:08:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-HTTPS-inspection-certificate-chain/m-p/123248#M17677</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2021-07-08T05:08:51Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS inspection certificate chain</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-HTTPS-inspection-certificate-chain/m-p/123251#M17678</link>
      <description>&lt;P&gt;The software does fetch CA from a trusted store but apparently not all of the android devices have Sectigo root certificate in it.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jul 2021 05:12:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-HTTPS-inspection-certificate-chain/m-p/123251#M17678</guid>
      <dc:creator>i80r</dc:creator>
      <dc:date>2021-07-08T05:12:45Z</dc:date>
    </item>
  </channel>
</rss>

