<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic HTTPS Inspection Broken Certificate Chain on websites in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Broken-Certificate-Chain-on-websites/m-p/224342#M43104</link>
    <description>&lt;P data-unlink="true"&gt;I wanted to find out if other people have this issue.&amp;nbsp; We occasionally run into websites that display untrusted certificate errors when in fact these sites do have trusted certificate.&amp;nbsp; A detect log indicates that the Certificate Chain is not signed by a Trusted CA, which is NOT TRUE.&amp;nbsp; It is signed, but when I run the test with www.ssllabs.com,&amp;nbsp;they state the website has a broken chain.&amp;nbsp; It's a certificate from a valid CA, just whoever installed the certificate on these sites, may not know how to install them properly to include the full chain.&amp;nbsp; The sites i'm actually speaking of that we've had the most trouble with are 'usda.gov' sites.&amp;nbsp; The most current one is 'usdalinc.sc.egov.usda.gov'.&amp;nbsp; It seems like what SOMETIMES fixes this is adding the server certificate into the trusted CA.&amp;nbsp; OR i just have to do a bypass which I'd rather not do.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;Is there anything or any other option that corrects this issue?&amp;nbsp; That can leave things to where they're inspected, but not indicate the site is untrusted just because of a broken chain on their end?&amp;nbsp; I just want to get other people's take on what they do for this particular scenario.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 22 Aug 2024 20:49:47 GMT</pubDate>
    <dc:creator>jberg712</dc:creator>
    <dc:date>2024-08-22T20:49:47Z</dc:date>
    <item>
      <title>HTTPS Inspection Broken Certificate Chain on websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Broken-Certificate-Chain-on-websites/m-p/224342#M43104</link>
      <description>&lt;P data-unlink="true"&gt;I wanted to find out if other people have this issue.&amp;nbsp; We occasionally run into websites that display untrusted certificate errors when in fact these sites do have trusted certificate.&amp;nbsp; A detect log indicates that the Certificate Chain is not signed by a Trusted CA, which is NOT TRUE.&amp;nbsp; It is signed, but when I run the test with www.ssllabs.com,&amp;nbsp;they state the website has a broken chain.&amp;nbsp; It's a certificate from a valid CA, just whoever installed the certificate on these sites, may not know how to install them properly to include the full chain.&amp;nbsp; The sites i'm actually speaking of that we've had the most trouble with are 'usda.gov' sites.&amp;nbsp; The most current one is 'usdalinc.sc.egov.usda.gov'.&amp;nbsp; It seems like what SOMETIMES fixes this is adding the server certificate into the trusted CA.&amp;nbsp; OR i just have to do a bypass which I'd rather not do.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;Is there anything or any other option that corrects this issue?&amp;nbsp; That can leave things to where they're inspected, but not indicate the site is untrusted just because of a broken chain on their end?&amp;nbsp; I just want to get other people's take on what they do for this particular scenario.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2024 20:49:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Broken-Certificate-Chain-on-websites/m-p/224342#M43104</guid>
      <dc:creator>jberg712</dc:creator>
      <dc:date>2024-08-22T20:49:47Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Broken Certificate Chain on websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Broken-Certificate-Chain-on-websites/m-p/224346#M43105</link>
      <description>&lt;P&gt;I am running R81.10 JHF 150 with HTTPS inspection, the website you provided is working fine for me with no certificate issues.&lt;/P&gt;
&lt;P&gt;Are you automatically downloading and updating your CA certs?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="HTTPS_CertUpdate.png" style="width: 475px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/27318i28215D248100012F/image-size/large?v=v2&amp;amp;px=999" role="button" title="HTTPS_CertUpdate.png" alt="HTTPS_CertUpdate.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Is your Trusted CA drop-down list empty? (it should be)&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="TrustedCAList.png" style="width: 933px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/27320i13C9CD4B0B2D88DF/image-size/large?v=v2&amp;amp;px=999" role="button" title="TrustedCAList.png" alt="TrustedCAList.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2024 21:01:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Broken-Certificate-Chain-on-websites/m-p/224346#M43105</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2024-08-22T21:01:49Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Broken Certificate Chain on websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Broken-Certificate-Chain-on-websites/m-p/224347#M43106</link>
      <description>&lt;P&gt;We are running R81.20 JHF 79.&amp;nbsp; We are set to download and update the Trusted CAs automatically.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Add CA list does have some certificates in it.&amp;nbsp; We did run a cpm_doc and I saw where some CAs were listed, but I don't know how to clean those up.&amp;nbsp; How do we remove those?&amp;nbsp; Or what do we do with those?&amp;nbsp; Our list under Add shows 14 objects out of 497.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2024 21:06:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Broken-Certificate-Chain-on-websites/m-p/224347#M43106</guid>
      <dc:creator>jberg712</dc:creator>
      <dc:date>2024-08-22T21:06:02Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Broken Certificate Chain on websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Broken-Certificate-Chain-on-websites/m-p/224349#M43107</link>
      <description>&lt;P&gt;If you only have 14 items in the list, I would just click on them to manually add and then do a publish / install.&lt;/P&gt;
&lt;P&gt;Not sure with regards to the cpm_doc.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2024 21:43:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Broken-Certificate-Chain-on-websites/m-p/224349#M43107</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2024-08-22T21:43:01Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Broken Certificate Chain on websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Broken-Certificate-Chain-on-websites/m-p/224392#M43117</link>
      <description>&lt;P&gt;I have ssl inspection lab on same versions, just tested those sites, no issues.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2024 15:53:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Broken-Certificate-Chain-on-websites/m-p/224392#M43117</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-08-23T15:53:51Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Broken Certificate Chain on websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Broken-Certificate-Chain-on-websites/m-p/224906#M43251</link>
      <description>&lt;P&gt;Let me ask this.&amp;nbsp; What sort of issues are there with Certificates being in the drop down list under 'Add'.&amp;nbsp; The reason why they are there is because most of them are expired and some were user added certificates to 3rd parties that we no longer use.&amp;nbsp; So, when I removed them from the big list of Trusted CAs, I'm guessing they ended up there.&amp;nbsp; I don't really need those certificates/CAs anymore.&amp;nbsp; If they're in that list, even though they've expired/no longer in use, what harm or issue does it create?&lt;/P&gt;</description>
      <pubDate>Wed, 28 Aug 2024 20:29:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Broken-Certificate-Chain-on-websites/m-p/224906#M43251</guid>
      <dc:creator>jberg712</dc:creator>
      <dc:date>2024-08-28T20:29:57Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Broken Certificate Chain on websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Broken-Certificate-Chain-on-websites/m-p/224921#M43256</link>
      <description>&lt;P&gt;I recall an SK, I believe the HTTPS Inspection Best Practices, stating that adding the CA manually in the list is the way to go, I used to do this from time to time for specific sites from a tool like ssllabs, but hadn't seen this issue recently.&lt;/P&gt;
&lt;P&gt;You're correct and your expired certificates won't be used anyway so you can leave them out of the main list.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2024 05:23:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Broken-Certificate-Chain-on-websites/m-p/224921#M43256</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2024-08-29T05:23:17Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Broken Certificate Chain on websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Broken-Certificate-Chain-on-websites/m-p/225033#M43290</link>
      <description>&lt;P&gt;The only issue with certificates being in the drop-down list is, if you browse to a website using that specific certificate in the drop-down list, then you will get an error message while using HTTPS inspection as it is not trusted.&lt;/P&gt;
&lt;P&gt;In the case of your specific scenario, the website is using "Entrust Certification Authority - L1K" &amp;amp; "Entrust Root Certification Authority - G2", so those should not be in the drop-down list, if they are, please add them.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2024 19:32:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Broken-Certificate-Chain-on-websites/m-p/225033#M43290</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2024-08-29T19:32:25Z</dc:date>
    </item>
  </channel>
</rss>

