<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issues with SecureClients and R80.40 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-SecureClients-and-R80-40/m-p/176501#M32315</link>
    <description>&lt;P&gt;If I had to guess, your renewed certificate is signed with a SHA-256 hash.&lt;BR /&gt;&lt;A href="https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/sha2-and-windows/ba-p/1128617" target="_self"&gt;Windows didn’t support SHA-256 until XP SP3&lt;/A&gt;.&lt;BR /&gt;That means SecureClient R56 probably doesn’t, either.&lt;/P&gt;</description>
    <pubDate>Tue, 28 Mar 2023 23:13:05 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2023-03-28T23:13:05Z</dc:date>
    <item>
      <title>Issues with SecureClients and R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-SecureClients-and-R80-40/m-p/176497#M32313</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Appreciate any assistance.&lt;/P&gt;&lt;P&gt;VSX R80.40 Take 154 VPN gateway with very old legacy SecureClients (R56) connecting (no office mode).&lt;/P&gt;&lt;P&gt;Everything was working fine until the SSL certificate under IPSec VPN section expired and had to be renewed.&amp;nbsp; After renewal and policy installation, SecureClients failed to connect with&amp;nbsp;"Phase1 Received Notification from Peer: invalid certificate" error message.&lt;/P&gt;&lt;P&gt;Recreating the profile and the site on the clients side didn't help.&amp;nbsp; The error about invalid certificate disappeared, but the site couldn't be created -- no errors on the gateway side, and the client times out.&amp;nbsp; We do get the thumbprint of the new certificate, there is 443/tcp and 500/udp traffic. The client is authenticated (we see successful Radius logs), so Phase 1 is fine. Then we see 264/tcp (FW1_topo) and I think this is where the clients fail, but no errors whatsoever.&amp;nbsp; It looks like they timeout getting the topology, although nothing is blocked on the gateway side.&lt;/P&gt;&lt;P&gt;There were no changes in the configuration of the VPN settings -- only the certificate was renewed.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2023 22:40:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-SecureClients-and-R80-40/m-p/176497#M32313</guid>
      <dc:creator>Teddy_Brewski</dc:creator>
      <dc:date>2023-03-28T22:40:57Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with SecureClients and R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-SecureClients-and-R80-40/m-p/176501#M32315</link>
      <description>&lt;P&gt;If I had to guess, your renewed certificate is signed with a SHA-256 hash.&lt;BR /&gt;&lt;A href="https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/sha2-and-windows/ba-p/1128617" target="_self"&gt;Windows didn’t support SHA-256 until XP SP3&lt;/A&gt;.&lt;BR /&gt;That means SecureClient R56 probably doesn’t, either.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2023 23:13:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-SecureClients-and-R80-40/m-p/176501#M32315</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-03-28T23:13:05Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with SecureClients and R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-SecureClients-and-R80-40/m-p/176506#M32319</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Checked -- SHA1 is used:&lt;/P&gt;&lt;P&gt;From the management:&lt;/P&gt;&lt;P&gt;cpopenssl pkcs12 -in $FWDIR/conf/InternalCA.p12 -nokeys -nomacver -passin pass: | cpopenssl x509 -noout -text | grep "Signature Algorithm"&lt;BR /&gt;Error outputting keys and certificates&lt;BR /&gt;4146366848:error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:crypto/evp/evp_enc.c:615:&lt;BR /&gt;4146366848:error:23077074:PKCS12 routines:PKCS12_pbe_crypt:pkcs12 cipherfinal error:crypto/pkcs12/p12_decr.c:63:&lt;BR /&gt;4146366848:error:2306A075:PKCS12 routines:PKCS12_item_decrypt_d2i:pkcs12 pbe crypt error:crypto/pkcs12/p12_decr.c:94:&lt;BR /&gt;Signature Algorithm: sha1WithRSAEncryption&lt;BR /&gt;Signature Algorithm: sha1WithRSAEncryption&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 02:11:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-SecureClients-and-R80-40/m-p/176506#M32319</guid>
      <dc:creator>Teddy_Brewski</dc:creator>
      <dc:date>2023-03-29T02:11:05Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with SecureClients and R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-SecureClients-and-R80-40/m-p/176507#M32320</link>
      <description>&lt;P&gt;Well, thats a tricky one. R56 client is probably long time unsupported. Can it still work? I have no clue, but here are some things I would check. Btw, excellent job in verifying what you already described &lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;-does zdebug show anything if you grep for say public IP of the user trying to create a site?&lt;/P&gt;
&lt;P&gt;-can you do fw monitor or tcpdump for their public IP to see if anything is even trying to hit the firewall?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 02:14:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-SecureClients-and-R80-40/m-p/176507#M32320</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-29T02:14:27Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with SecureClients and R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-SecureClients-and-R80-40/m-p/176509#M32321</link>
      <description>&lt;P&gt;That's the ICA, what about the actual gateway certificate?&lt;BR /&gt;In any case, SecureClient R56 is very much out of support at this point.&lt;BR /&gt;What are you running it on, exactly?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 03:55:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-SecureClients-and-R80-40/m-p/176509#M32321</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-03-29T03:55:56Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with SecureClients and R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-SecureClients-and-R80-40/m-p/176514#M32322</link>
      <description>&lt;P&gt;From the GUI it says:&lt;/P&gt;&lt;P&gt;Public Key: RSA (1024 bits)&lt;BR /&gt;Signature: RSA with SHA1&lt;/P&gt;&lt;P&gt;Not sure how to check it from the console.&lt;/P&gt;&lt;P&gt;We had to use R56 due to the old software that runs on Windows 2003.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 05:06:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-SecureClients-and-R80-40/m-p/176514#M32322</guid>
      <dc:creator>Teddy_Brewski</dc:creator>
      <dc:date>2023-03-29T05:06:55Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with SecureClients and R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-SecureClients-and-R80-40/m-p/176516#M32323</link>
      <description>&lt;P&gt;I did collect vpnd debug logs -- everything looks fine for the Phase 1, it just never progresses into Phase 2.&lt;/P&gt;&lt;P&gt;It used to work one day ago, the only difference now is that in order to recreate the site clients have to access&amp;nbsp;&lt;SPAN&gt;264/tcp (FW1_topo)? I checked that the port is listening on the gateway, and I can telnet to it remotely (Accept Remote Access connections implied rule is triggered) .&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Tried tcpdump too -- 443/tcp, 500/udp and 264/tcp, nothing else is requested.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 05:16:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-SecureClients-and-R80-40/m-p/176516#M32323</guid>
      <dc:creator>Teddy_Brewski</dc:creator>
      <dc:date>2023-03-29T05:16:23Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with SecureClients and R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-SecureClients-and-R80-40/m-p/176518#M32324</link>
      <description>&lt;P&gt;Try to enable logs on SecureClient itself (on Windows 2003 workstation). There you should be able to see what is going on.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 06:10:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-SecureClients-and-R80-40/m-p/176518#M32324</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2023-03-29T06:10:46Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with SecureClients and R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-SecureClients-and-R80-40/m-p/176669#M32357</link>
      <description>&lt;P&gt;Unless you can find something useful in the client logs as&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1702"&gt;@JozkoMrkvicka&lt;/a&gt;&amp;nbsp;suggested, not sure what else we can suggest here.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 23:31:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-SecureClients-and-R80-40/m-p/176669#M32357</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-03-29T23:31:17Z</dc:date>
    </item>
  </channel>
</rss>

