<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Edom environment and vpnd process in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Edom-environment-and-vpnd-process/m-p/216053#M41211</link>
    <description>&lt;P&gt;Attention, quoting from&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215965#M35811" target="_self"&gt;&lt;SPAN&gt;Important security update - stay protected against VPN Information Disclosure (CVE-2024-24919)&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In R81.10 we added a feature to improve VPN performance - named CCCD&lt;/P&gt;
&lt;P&gt;This feature is&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;disabled by default&lt;/STRONG&gt;, and we know about few advanced customers who are using it.&lt;/P&gt;
&lt;P&gt;Customers who enable CCCD&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;STRONG&gt;are still vulnerable to CVE-2024-24919 even after installing the Hotfix!&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;YOU MUST DISABLE CCCD TO BECOME PROTECTED!&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;Instructions below and also on&amp;nbsp;&lt;A class="fui-Link ___1rxvrpe f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1hu3pq6 f11qmguv f19f4twv f1tyq0we f1g0x7ka fhxju0i f1qch9an f1cnd47f fqv5qza f1vmzxwi f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://support.checkpoint.com/results/sk/sk182336" href="https://support.checkpoint.com/results/sk/sk182336" target="_blank" rel="noreferrer noopener" aria-label="Link SK182336"&gt;SK182336&lt;/A&gt;:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Run the command:&amp;nbsp;&lt;CODE&gt;&lt;STRONG&gt;vpn cccd status&lt;/STRONG&gt;&lt;/CODE&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;The expected output is:&amp;nbsp;&lt;CODE&gt;&lt;STRONG&gt;vpn: 'cccd' is disabled&lt;/STRONG&gt;&lt;/CODE&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If the output differs, stop the&amp;nbsp;&lt;CODE&gt;&lt;STRONG&gt;CCCD&lt;/STRONG&gt;&lt;/CODE&gt;&amp;nbsp;process by running the&amp;nbsp;&lt;CODE&gt;&lt;STRONG&gt;vpn cccd disable&lt;/STRONG&gt;&lt;/CODE&gt;&amp;nbsp;command.&lt;BR /&gt;&lt;BR /&gt;More info by the link above.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 01 Jun 2024 13:31:50 GMT</pubDate>
    <dc:creator>_Val_</dc:creator>
    <dc:date>2024-06-01T13:31:50Z</dc:date>
    <item>
      <title>Edom environment and vpnd process</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Edom-environment-and-vpnd-process/m-p/146727#M23345</link>
      <description>&lt;P&gt;Hi Checkmates,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wanted to share with you a issue we encountered in our company recently.&lt;/P&gt;&lt;P&gt;Management server and gateways are all R80.40 JHF139&lt;/P&gt;&lt;P&gt;After an old Edom environment cleaning, where we removed all edom objects (user groups and network groups), we had a sever issue where all our sites to sites vpn felt down and sll vpn users were not abble to connect to the portal. We raised a SR to the TAC and an engineer took a look at our environment.&lt;/P&gt;&lt;P&gt;From what he saw he suspects a vpnd process crash, and he said we might need some CPU tuning among our 16 CPUs, because one CPU is experiencing heavy load. He said the vpnd process crash bring the same behaviour we had during the crash: SSLVPN portal unresponsive, authentication failure due to radius communication problems, site to site VPN impacted.&lt;/P&gt;&lt;P&gt;We restored the session revison prior to Edom environment cleaning and it solved the issue. We also applied the CPU tuning as recomended by TAC. Few days later, we tried to clean the EDOM environment again and the issue ocured again.&lt;/P&gt;&lt;P&gt;We were abble to see that the issue was present by seeing this log continuously:&amp;nbsp;‘Warning:cp_timed_blocker_handler: XXX’ in vpnd.elg&lt;/P&gt;&lt;P&gt;TAC recomandation was to update to the last JHF150 with this analysis:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Issue occurs because of the following reasons:&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;The vpnd crashes due to wrong memory access. After further analyzing that access, it seems like that memory was valid at some point but got freed unexpectedly causing the vpnd to crash.&amp;nbsp;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Another reason is the because of Application mode which seems to cause vpnd to crash abruptly.&amp;nbsp;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Issue has been resolved in the following fix:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;PRJ-27296,&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;VPNRA-761 Mobile Access In rare scenarios, when SNX client is used with Application mode on the Mobile Access Blade, the&amp;nbsp;VPND&amp;nbsp;process may unexpectedly exit.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;We followed the recomandation and install JHF 150 but it didn't solved the problem.&lt;/P&gt;&lt;P&gt;So we found the solution by ourself by disabling EDOM feature:&amp;nbsp;vpn set_snx_encdom_groups on/off&amp;nbsp;&lt;/P&gt;&lt;P&gt;That was as simple as that, hope it will help.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Apr 2022 14:05:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Edom-environment-and-vpnd-process/m-p/146727#M23345</guid>
      <dc:creator>hemh</dc:creator>
      <dc:date>2022-04-21T14:05:09Z</dc:date>
    </item>
    <item>
      <title>Re: Edom environment and vpnd process</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Edom-environment-and-vpnd-process/m-p/146729#M23346</link>
      <description>&lt;P&gt;Thanks for sharing, thats actually super helpful!&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 21 Apr 2022 14:10:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Edom-environment-and-vpnd-process/m-p/146729#M23346</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-04-21T14:10:46Z</dc:date>
    </item>
    <item>
      <title>Re: Edom environment and vpnd process</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Edom-environment-and-vpnd-process/m-p/146732#M23347</link>
      <description>&lt;P&gt;Thanks for sharing, the vpnd process on gateways is very old and had a lot of wildly different functions stuffed into it over the years; unfortunately there have been some stability issues as well and your story does not surprise me.&amp;nbsp; Thankfully this vpnd process appears to be on the way out as its functions are gradually implemented in new daemons (iked &amp;amp; cccd in R81.10+), with other functions such as Visitor Mode and NAT-T getting implemented in the Firewall Workers/Instances which vastly improves scalability &amp;amp; performance:&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk168297&amp;amp;partition=Advanced&amp;amp;product=IPSec" target="_blank"&gt;sk168297: Large scale support in VPN Remote Access Visitor-Mode&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Apr 2022 14:19:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Edom-environment-and-vpnd-process/m-p/146732#M23347</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-04-21T14:19:59Z</dc:date>
    </item>
    <item>
      <title>Re: Edom environment and vpnd process</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Edom-environment-and-vpnd-process/m-p/216053#M41211</link>
      <description>&lt;P&gt;Attention, quoting from&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215965#M35811" target="_self"&gt;&lt;SPAN&gt;Important security update - stay protected against VPN Information Disclosure (CVE-2024-24919)&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In R81.10 we added a feature to improve VPN performance - named CCCD&lt;/P&gt;
&lt;P&gt;This feature is&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;disabled by default&lt;/STRONG&gt;, and we know about few advanced customers who are using it.&lt;/P&gt;
&lt;P&gt;Customers who enable CCCD&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;STRONG&gt;are still vulnerable to CVE-2024-24919 even after installing the Hotfix!&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;YOU MUST DISABLE CCCD TO BECOME PROTECTED!&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;Instructions below and also on&amp;nbsp;&lt;A class="fui-Link ___1rxvrpe f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1hu3pq6 f11qmguv f19f4twv f1tyq0we f1g0x7ka fhxju0i f1qch9an f1cnd47f fqv5qza f1vmzxwi f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://support.checkpoint.com/results/sk/sk182336" href="https://support.checkpoint.com/results/sk/sk182336" target="_blank" rel="noreferrer noopener" aria-label="Link SK182336"&gt;SK182336&lt;/A&gt;:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Run the command:&amp;nbsp;&lt;CODE&gt;&lt;STRONG&gt;vpn cccd status&lt;/STRONG&gt;&lt;/CODE&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;The expected output is:&amp;nbsp;&lt;CODE&gt;&lt;STRONG&gt;vpn: 'cccd' is disabled&lt;/STRONG&gt;&lt;/CODE&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If the output differs, stop the&amp;nbsp;&lt;CODE&gt;&lt;STRONG&gt;CCCD&lt;/STRONG&gt;&lt;/CODE&gt;&amp;nbsp;process by running the&amp;nbsp;&lt;CODE&gt;&lt;STRONG&gt;vpn cccd disable&lt;/STRONG&gt;&lt;/CODE&gt;&amp;nbsp;command.&lt;BR /&gt;&lt;BR /&gt;More info by the link above.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jun 2024 13:31:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Edom-environment-and-vpnd-process/m-p/216053#M41211</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-06-01T13:31:50Z</dc:date>
    </item>
  </channel>
</rss>

