<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS Certificate Validation - ds.kaspersky.com / Harmony Endpoint in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Certificate-Validation-ds-kaspersky-com-Harmony-Endpoint/m-p/152825#M25521</link>
    <description>&lt;P&gt;(Also trusting the CA raises the whole subject of the Kaspersky situation (sk178688, sk118539, etc), but that's a whole different topic &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; )&lt;/P&gt;</description>
    <pubDate>Tue, 12 Jul 2022 16:52:35 GMT</pubDate>
    <dc:creator>Ben_Dunkley</dc:creator>
    <dc:date>2022-07-12T16:52:35Z</dc:date>
    <item>
      <title>HTTPS Certificate Validation - ds.kaspersky.com / Harmony Endpoint</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Certificate-Validation-ds-kaspersky-com-Harmony-Endpoint/m-p/152824#M25520</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;After dealing with some certificate validation issues recently (resolved via sk64521 / sk173629 - slightly frustrating this isn't automatic by default), almost all of the certificate validation errors are gone.&lt;/P&gt;&lt;P&gt;The last remaining validation error is for the FQDN ds.kaspersky.com, which logs as follows (identifying &amp;amp; irrelevant info snipped out):&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;HTTPS Validation: Untrusted Certificate&lt;BR /&gt;Description: Certificate DN: 'CN=ds.kaspersky.com,OU=CIWD,O=AO Kaspersky Lab,L=Moscow,ST=Moscow,C=RU' Requested Server Name: ds.kaspersky.com. See sk159872&lt;BR /&gt;Destination: 82.202.185.148&lt;BR /&gt;Destination Port: 443&lt;BR /&gt;IP Protocol: 6&lt;BR /&gt;Action: Detect&lt;BR /&gt;Type: Log&lt;BR /&gt;Blade: HTTPS Inspection&lt;BR /&gt;Service: TCP/443&lt;BR /&gt;Product Family: Network&lt;BR /&gt;Resource: ds.kaspersky.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This occurs across half a dozen or so destination IP addresses, but the same FQDN in each case.&lt;/P&gt;&lt;P&gt;Testing using openssl reveals the following certificate chain, and there are no Kaspersky certificates in Checkpoint's Trusted CA list, which is fine I guess, as it does look like Kaspersky are potentially just using their own CA, which may not be publicly trusted (i.e. if it is explicitly trusted in their products that leverage these services).&lt;/P&gt;&lt;DIV&gt;Certificate chain&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;0 s:/C=RU/ST=Moscow/L=Moscow/O=AO Kaspersky Lab/OU=CIWD/CN=ds.kaspersky.com&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp;i:/C=RU/O=Kaspersky Lab/CN=Kaspersky Lab Public Services TLS CA&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;1 s:/C=RU/O=Kaspersky Lab/CN=Kaspersky Lab Public Services TLS CA&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp;i:/DC=com/DC=kaspersky/DC=authenticity/CN=Kaspersky Lab Public Services Root Certification Authority&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;The part that is a little frustrating, is that all this traffic is originating from Check Point Harmony Endpoint clients!&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;So I'm curious what view others may have on this, ignore it? manually trust the CA? something else?&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Thanks,&lt;/DIV&gt;&lt;DIV&gt;Ben&lt;/DIV&gt;</description>
      <pubDate>Tue, 12 Jul 2022 16:48:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Certificate-Validation-ds-kaspersky-com-Harmony-Endpoint/m-p/152824#M25520</guid>
      <dc:creator>Ben_Dunkley</dc:creator>
      <dc:date>2022-07-12T16:48:47Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Certificate Validation - ds.kaspersky.com / Harmony Endpoint</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Certificate-Validation-ds-kaspersky-com-Harmony-Endpoint/m-p/152825#M25521</link>
      <description>&lt;P&gt;(Also trusting the CA raises the whole subject of the Kaspersky situation (sk178688, sk118539, etc), but that's a whole different topic &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; )&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jul 2022 16:52:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Certificate-Validation-ds-kaspersky-com-Harmony-Endpoint/m-p/152825#M25521</guid>
      <dc:creator>Ben_Dunkley</dc:creator>
      <dc:date>2022-07-12T16:52:35Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Certificate Validation - ds.kaspersky.com / Harmony Endpoint</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Certificate-Validation-ds-kaspersky-com-Harmony-Endpoint/m-p/152860#M25528</link>
      <description>&lt;P&gt;As you have mentioned yourself, Kaspersky is a tricky subject. However, you can manually configure to trust that cert, if you are absolutely sure this is what you want/need.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jul 2022 06:49:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Certificate-Validation-ds-kaspersky-com-Harmony-Endpoint/m-p/152860#M25528</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-07-13T06:49:05Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Certificate Validation - ds.kaspersky.com / Harmony Endpoint</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Certificate-Validation-ds-kaspersky-com-Harmony-Endpoint/m-p/152868#M25531</link>
      <description>&lt;P&gt;Hi Ben,&lt;/P&gt;
&lt;P&gt;Yes this is a certificate originating from our usage of the Kaspersky SDK in this version of Harmony Endpoint. It has been signed like that (with Kaspersky CA) for the past few years, it is not new.&lt;/P&gt;
&lt;P&gt;I guess the answer to your question goes back to you - what is your goal? you want to suppress those "Untrusted Certificate" logs on the GW? then you can trust it .. do you just want to know if it's "suspicious"? then no it's not suspicious.&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jul 2022 09:22:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Certificate-Validation-ds-kaspersky-com-Harmony-Endpoint/m-p/152868#M25531</guid>
      <dc:creator>TP_Master</dc:creator>
      <dc:date>2022-07-13T09:22:08Z</dc:date>
    </item>
  </channel>
</rss>

