<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Simplifying the OpenSSL CNF file for semi-automated certificate renewal. in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Simplifying-the-OpenSSL-CNF-file-for-semi-automated-certificate/m-p/140326#M21530</link>
    <description>&lt;P&gt;As I am sure you are all aware there are a number of posts asking about creating a new certificate to use with Checkpoint but this is a little different.&lt;/P&gt;&lt;P&gt;I am trying to streamline the process of certificate renewal on our systems a little and to do this I am fashioning pre-configured CNF files with scripts that generate the CSR, submit them to the CA, and then possibly pump the resultant CER and KEY files back into the gateways.&lt;/P&gt;&lt;P&gt;In doing this I have been looking at the default CNF file used in the official guide and its full of a LOT of fluff that is only there for the local CA when generating self signed certificates, and is entirely pointless otherwise.&lt;/P&gt;&lt;P&gt;By way of comparison, a CNF file I created for another device we use was a total of 23 lines long, as compared to the checkpoint default one that's almost 400.&amp;nbsp; And the resultant certificates appear identical.&lt;/P&gt;&lt;P&gt;Does anyone know what lines are critical for certificates to be used for the GAIA web portal, Proxy, and HTTPS inspection?&lt;/P&gt;&lt;P&gt;This is the short CNF file I used for my other device&lt;/P&gt;&lt;PRE&gt;[ req ]&lt;BR /&gt;distinguished_name = req_distinguished_name&lt;BR /&gt;req_extensions = v3_req&lt;BR /&gt;encrypt_key = no&lt;BR /&gt;prompt = no&lt;BR /&gt;string_mask = nombstr&lt;BR /&gt;&lt;BR /&gt;[ v3_req ]&lt;BR /&gt;basicConstraints = CA:false&lt;BR /&gt;keyUsage = nonRepudiation, digitalSignature, keyEncipherment&lt;BR /&gt;subjectAltName = @alt_names&lt;BR /&gt;&lt;BR /&gt;[ alt_names ]&lt;BR /&gt;DNS.1 = device.domain.net&lt;BR /&gt;IP.1 = 10.10.10.10&lt;BR /&gt;&lt;BR /&gt;[ req_distinguished_name ]&lt;BR /&gt;commonName = device.domain.net&lt;BR /&gt;0.organizationName = company&lt;BR /&gt;organizationalUnitName = IT&lt;BR /&gt;countryName = country&lt;BR /&gt;stateOrProvinceName = state&lt;BR /&gt;localityName = city&lt;/PRE&gt;&lt;P&gt;As far as i can see the only additional lines possibly needed from the Checkpoint CNF file would be this section:&lt;/P&gt;&lt;PRE&gt;[ proxy_cert_ext ]&lt;BR /&gt;basicConstraints=CA:FALSE&lt;BR /&gt;nsComment = "OpenSSL Generated Certificate"&lt;BR /&gt;subjectKeyIdentifier=hash&lt;BR /&gt;authorityKeyIdentifier=keyid,issuer&lt;BR /&gt;proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo&lt;/PRE&gt;&lt;P&gt;But I don't see how its actually referenced in the CNF file as "proxy_cert_ext" isn't mentioned anywhere else and it doesn't appear to make any visible difference to the cert itself.&lt;/P&gt;&lt;P&gt;Everything else seems redundant, optional, or purely for configuring the CA which we don't need.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone see a problem with using a simplified CNF like the one above?&lt;/P&gt;&lt;P&gt;I know I can try it and its unlikely to break anything permanently and I can always put the old cert back, but some confidence that this is the right move would be good.&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 03 Feb 2022 01:15:59 GMT</pubDate>
    <dc:creator>Adrian_Bawn</dc:creator>
    <dc:date>2022-02-03T01:15:59Z</dc:date>
    <item>
      <title>Simplifying the OpenSSL CNF file for semi-automated certificate renewal.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Simplifying-the-OpenSSL-CNF-file-for-semi-automated-certificate/m-p/140326#M21530</link>
      <description>&lt;P&gt;As I am sure you are all aware there are a number of posts asking about creating a new certificate to use with Checkpoint but this is a little different.&lt;/P&gt;&lt;P&gt;I am trying to streamline the process of certificate renewal on our systems a little and to do this I am fashioning pre-configured CNF files with scripts that generate the CSR, submit them to the CA, and then possibly pump the resultant CER and KEY files back into the gateways.&lt;/P&gt;&lt;P&gt;In doing this I have been looking at the default CNF file used in the official guide and its full of a LOT of fluff that is only there for the local CA when generating self signed certificates, and is entirely pointless otherwise.&lt;/P&gt;&lt;P&gt;By way of comparison, a CNF file I created for another device we use was a total of 23 lines long, as compared to the checkpoint default one that's almost 400.&amp;nbsp; And the resultant certificates appear identical.&lt;/P&gt;&lt;P&gt;Does anyone know what lines are critical for certificates to be used for the GAIA web portal, Proxy, and HTTPS inspection?&lt;/P&gt;&lt;P&gt;This is the short CNF file I used for my other device&lt;/P&gt;&lt;PRE&gt;[ req ]&lt;BR /&gt;distinguished_name = req_distinguished_name&lt;BR /&gt;req_extensions = v3_req&lt;BR /&gt;encrypt_key = no&lt;BR /&gt;prompt = no&lt;BR /&gt;string_mask = nombstr&lt;BR /&gt;&lt;BR /&gt;[ v3_req ]&lt;BR /&gt;basicConstraints = CA:false&lt;BR /&gt;keyUsage = nonRepudiation, digitalSignature, keyEncipherment&lt;BR /&gt;subjectAltName = @alt_names&lt;BR /&gt;&lt;BR /&gt;[ alt_names ]&lt;BR /&gt;DNS.1 = device.domain.net&lt;BR /&gt;IP.1 = 10.10.10.10&lt;BR /&gt;&lt;BR /&gt;[ req_distinguished_name ]&lt;BR /&gt;commonName = device.domain.net&lt;BR /&gt;0.organizationName = company&lt;BR /&gt;organizationalUnitName = IT&lt;BR /&gt;countryName = country&lt;BR /&gt;stateOrProvinceName = state&lt;BR /&gt;localityName = city&lt;/PRE&gt;&lt;P&gt;As far as i can see the only additional lines possibly needed from the Checkpoint CNF file would be this section:&lt;/P&gt;&lt;PRE&gt;[ proxy_cert_ext ]&lt;BR /&gt;basicConstraints=CA:FALSE&lt;BR /&gt;nsComment = "OpenSSL Generated Certificate"&lt;BR /&gt;subjectKeyIdentifier=hash&lt;BR /&gt;authorityKeyIdentifier=keyid,issuer&lt;BR /&gt;proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo&lt;/PRE&gt;&lt;P&gt;But I don't see how its actually referenced in the CNF file as "proxy_cert_ext" isn't mentioned anywhere else and it doesn't appear to make any visible difference to the cert itself.&lt;/P&gt;&lt;P&gt;Everything else seems redundant, optional, or purely for configuring the CA which we don't need.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone see a problem with using a simplified CNF like the one above?&lt;/P&gt;&lt;P&gt;I know I can try it and its unlikely to break anything permanently and I can always put the old cert back, but some confidence that this is the right move would be good.&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Feb 2022 01:15:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Simplifying-the-OpenSSL-CNF-file-for-semi-automated-certificate/m-p/140326#M21530</guid>
      <dc:creator>Adrian_Bawn</dc:creator>
      <dc:date>2022-02-03T01:15:59Z</dc:date>
    </item>
    <item>
      <title>Re: Simplifying the OpenSSL CNF file for semi-automated certificate renewal.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Simplifying-the-OpenSSL-CNF-file-for-semi-automated-certificate/m-p/140328#M21531</link>
      <description>&lt;P&gt;Are you modifying the .cnf file on the Check Point itself or a different system?&lt;BR /&gt;Keep in mind for HTTPS Inspection, a CA Key is required (not a regular certificate), which means the basicConstraints line is wrong for that use case.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Feb 2022 01:34:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Simplifying-the-OpenSSL-CNF-file-for-semi-automated-certificate/m-p/140328#M21531</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-02-03T01:34:41Z</dc:date>
    </item>
    <item>
      <title>Re: Simplifying the OpenSSL CNF file for semi-automated certificate renewal.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Simplifying-the-OpenSSL-CNF-file-for-semi-automated-certificate/m-p/140330#M21532</link>
      <description>&lt;P&gt;So currently following the guide we edit the existing openssl.cnf, add the appropriate SAN entries, generate a CSR and they submit that to our internal windows CA to generate a "webserver" certificate which we then import back into the device along with the relevant root certificates.&lt;/P&gt;&lt;P&gt;This works, and gives us a signed certificate that's valid for our domain and recognised by our internal clients, but it doesn't use the Checkpoint CA at all as far as i am aware.&lt;/P&gt;&lt;P&gt;It seems the HTTPS Inspection is actually a separate certificate (locally generated on the gateway) so that's a different issue.&amp;nbsp; The one I am talking about is just for the GAIA and Usercheck portals I believe.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Feb 2022 01:56:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Simplifying-the-OpenSSL-CNF-file-for-semi-automated-certificate/m-p/140330#M21532</guid>
      <dc:creator>Adrian_Bawn</dc:creator>
      <dc:date>2022-02-03T01:56:37Z</dc:date>
    </item>
  </channel>
</rss>

