<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TLS versions and NAT methods in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS-versions-and-NAT-methods/m-p/169981#M30824</link>
    <description>&lt;P&gt;Thanks &lt;SPAN&gt;Dameon&lt;/SPAN&gt;,&lt;/P&gt;&lt;P&gt;We'll try that and let you know. In addition, look at the attached that shows the expanded TLS info.&lt;/P&gt;</description>
    <pubDate>Wed, 01 Feb 2023 19:11:08 GMT</pubDate>
    <dc:creator>lincolnwebber</dc:creator>
    <dc:date>2023-02-01T19:11:08Z</dc:date>
    <item>
      <title>TLS versions and NAT methods</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS-versions-and-NAT-methods/m-p/168975#M30556</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;I have noticed an issue with a particular Internet website depending on the NAT method used by the firewall when accessed by clients inside the network.&lt;/P&gt;&lt;P&gt;If I hide the traffic, the website will not load (timeout). However, if I static NAT, the website loads fine.&lt;/P&gt;&lt;P&gt;I took tcpdumps of both scenarios and noticed the following:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;When using hide NAT, the TLS version proposed by the gateway/hidden address is TLSv1 (site times out)&lt;/LI&gt;&lt;LI&gt;When using static NAT, the TLS version proposed by the static NAT address is TLSv1.2 (site loads successfully)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Any idea what may cause this? Can I force the firewall to use TLSv1.2 as a client?&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2023 17:33:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS-versions-and-NAT-methods/m-p/168975#M30556</guid>
      <dc:creator>lincolnwebber</dc:creator>
      <dc:date>2023-01-24T17:33:04Z</dc:date>
    </item>
    <item>
      <title>Re: TLS versions and NAT methods</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS-versions-and-NAT-methods/m-p/169024#M30570</link>
      <description>&lt;P&gt;Version/JHF of the gateway?&lt;BR /&gt;What blades are enabled on the gateway?&lt;BR /&gt;Did you run a tcpdump to see what the actual clients are proposing?&lt;BR /&gt;The only time I'd think we'd mess with the TLS version is if HTTPS Inspection is on.&lt;BR /&gt;Not sure why the NAT type would make any difference.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jan 2023 05:06:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS-versions-and-NAT-methods/m-p/169024#M30570</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-01-25T05:06:45Z</dc:date>
    </item>
    <item>
      <title>Re: TLS versions and NAT methods</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS-versions-and-NAT-methods/m-p/169935#M30817</link>
      <description>&lt;P&gt;The Blades the are enabled are:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Firewall&lt;/LI&gt;&lt;LI&gt;IPsec VPN&lt;/LI&gt;&lt;UL&gt;&lt;LI&gt;Policy Server&lt;/LI&gt;&lt;/UL&gt;&lt;LI&gt;Dynamic Routing&lt;/LI&gt;&lt;LI&gt;SecureXl&lt;/LI&gt;&lt;LI&gt;QoS&lt;/LI&gt;&lt;LI&gt;ClusterXL&lt;/LI&gt;&lt;LI&gt;Monitoring&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;See attached tcpdumps&amp;nbsp; taken on the PC. Note the highlights&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2023 14:54:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS-versions-and-NAT-methods/m-p/169935#M30817</guid>
      <dc:creator>lincolnwebber</dc:creator>
      <dc:date>2023-02-01T14:54:48Z</dc:date>
    </item>
    <item>
      <title>Re: TLS versions and NAT methods</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS-versions-and-NAT-methods/m-p/169968#M30823</link>
      <description>&lt;P&gt;The only thing I can think of that might be affecting this somehow is…SecureXL?&lt;BR /&gt;Try doing an fwaccel off and repeat the test from a different system.&lt;BR /&gt;As this disables SecureXL templating, it is not recommend to run with this off for long.&lt;BR /&gt;It can be re-enabled with fwaccel on.&amp;nbsp;&lt;BR /&gt;Either way, I recommend engaging with the TAC.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2023 18:06:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS-versions-and-NAT-methods/m-p/169968#M30823</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-02-01T18:06:32Z</dc:date>
    </item>
    <item>
      <title>Re: TLS versions and NAT methods</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS-versions-and-NAT-methods/m-p/169981#M30824</link>
      <description>&lt;P&gt;Thanks &lt;SPAN&gt;Dameon&lt;/SPAN&gt;,&lt;/P&gt;&lt;P&gt;We'll try that and let you know. In addition, look at the attached that shows the expanded TLS info.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2023 19:11:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS-versions-and-NAT-methods/m-p/169981#M30824</guid>
      <dc:creator>lincolnwebber</dc:creator>
      <dc:date>2023-02-01T19:11:08Z</dc:date>
    </item>
    <item>
      <title>Re: TLS versions and NAT methods</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS-versions-and-NAT-methods/m-p/169986#M30825</link>
      <description>&lt;P&gt;TLSv1.2 is always proposed as an upgrade from TLSv1.0. If the negotiation times out, you won't ever see the TLSv1.2 upgrade message, so Wireshark will identify the negotiation as TLSv1.0. Meanwhile, when Wireshark sees the upgrade to TLSv1.2, it retroactively marks all packets as TLSv1.2. Ignore the TLS version stuff, as it's not actually part of the issue.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2023 20:23:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS-versions-and-NAT-methods/m-p/169986#M30825</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2023-02-01T20:23:20Z</dc:date>
    </item>
    <item>
      <title>Re: TLS versions and NAT methods</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS-versions-and-NAT-methods/m-p/170004#M30829</link>
      <description>&lt;P&gt;To demonstrate what I'm talking about, I just captured my laptop connecting to ipchicken.com. Here's a segment of Wireshark's analysis of the Client Hello:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2023-02-01 at 18.02.47.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19391iC8CADF12BD4CBECB/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2023-02-01 at 18.02.47.png" alt="Screenshot 2023-02-01 at 18.02.47.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Note that the handshake's protocol version is TLSv1.0, then within the handshake (in the Client Hello), the version is TLSv1.2. That's my client specifying it can negotiate TLSv1.2. Then there's a supported_versions extension to the Client Hello where my client says it actually supports 1.0, 1.1, 1.2, or 1.3.&lt;/P&gt;
&lt;P&gt;The handshake reply from the server then has its version set to TLSv1.2, the Client Hello specifies TLSv1.2, then the supported_versions extension contains only TLSv1.3. This is how we end up with a TLSv1.3 connection with no TLSv1.2 in use at all. Totally obvious, right?&lt;/P&gt;
&lt;P&gt;TLS negotiations are incredibly junky. Until Wireshark sees the Server Hello's contents, it can't be sure which version is actually in use.&lt;/P&gt;
&lt;P&gt;Fun side note: you see the 0x0301, 0x0302, 0x0303, 0x0304? Those are the version numbers in hexadecimal. SSLv3 was 0x0300. TLSv1.3 calls itself SSLv3.4 internally.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2023 00:13:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TLS-versions-and-NAT-methods/m-p/170004#M30829</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2023-02-02T00:13:35Z</dc:date>
    </item>
  </channel>
</rss>

