<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cloning Group Nessus and SSLv3 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cloning-Group-Nessus-and-SSLv3/m-p/239944#M46540</link>
    <description>&lt;P&gt;Hi Check Mates,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been looking through a Nessus Scan of a gateway cluster today, I had allowed all ports for the scanner to the gateways and turned off IPS for it.&lt;/P&gt;&lt;P&gt;The gateway version is R81.20 Jumbo hotfix 92&lt;/P&gt;&lt;P&gt;Nessus is complaining about the existence of SSLv3 and some weak ciphers. We disabled SSLv3 years ago and get an A+ from the Qualys SSL scanner online.&lt;/P&gt;&lt;P&gt;Then I noticed that it is Port TCP/1129 that is accepting SSLv3 (and 2) see the screenshot. This is of course the cloning group port.&lt;/P&gt;&lt;P&gt;I have searched the KB and these pages and cannot find any mention of this, has anyone else seen this and do we know how to get the cloning group comms onto TLS1.2?&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;</description>
    <pubDate>Wed, 29 Jan 2025 10:46:44 GMT</pubDate>
    <dc:creator>John_Fenoughty</dc:creator>
    <dc:date>2025-01-29T10:46:44Z</dc:date>
    <item>
      <title>Cloning Group Nessus and SSLv3</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cloning-Group-Nessus-and-SSLv3/m-p/239944#M46540</link>
      <description>&lt;P&gt;Hi Check Mates,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been looking through a Nessus Scan of a gateway cluster today, I had allowed all ports for the scanner to the gateways and turned off IPS for it.&lt;/P&gt;&lt;P&gt;The gateway version is R81.20 Jumbo hotfix 92&lt;/P&gt;&lt;P&gt;Nessus is complaining about the existence of SSLv3 and some weak ciphers. We disabled SSLv3 years ago and get an A+ from the Qualys SSL scanner online.&lt;/P&gt;&lt;P&gt;Then I noticed that it is Port TCP/1129 that is accepting SSLv3 (and 2) see the screenshot. This is of course the cloning group port.&lt;/P&gt;&lt;P&gt;I have searched the KB and these pages and cannot find any mention of this, has anyone else seen this and do we know how to get the cloning group comms onto TLS1.2?&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2025 10:46:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cloning-Group-Nessus-and-SSLv3/m-p/239944#M46540</guid>
      <dc:creator>John_Fenoughty</dc:creator>
      <dc:date>2025-01-29T10:46:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cloning Group Nessus and SSLv3</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cloning-Group-Nessus-and-SSLv3/m-p/239948#M46541</link>
      <description>&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk182091" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk182091&lt;/A&gt;&lt;/P&gt;
&lt;TABLE id="filter1Table" class="TableStyle-TP_Table_Jumbo_Fixes" cellspacing="0"&gt;
&lt;TBODY&gt;
&lt;TR class="TableStyle-TP_Table_Jumbo_Fixes-Body-Grey_Background"&gt;
&lt;TD class="TableStyle-TP_Table_Jumbo_Fixes-BodyE-Column_Style_ID-Grey_Background"&gt;
&lt;P&gt;PRJ-43614,&lt;BR /&gt;PRHF-26959&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Jumbo_Fixes-BodyE-Column_Style_Product-Grey_Background"&gt;
&lt;P&gt;Gaia OS&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Jumbo_Fixes-BodyD-Column_Style_Description-Grey_Background"&gt;
&lt;P&gt;&lt;STRONG&gt;UPDATE&lt;/STRONG&gt;: Gaia Cloning Groups will now use the highest TLS version available.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Strange should already be fixed. Best way is to make Wireshark capture and use the SK above to see if it is really SSLV3 or maybe false positive. If not open a TAC case with the capture.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2025 11:16:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cloning-Group-Nessus-and-SSLv3/m-p/239948#M46541</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-01-29T11:16:52Z</dc:date>
    </item>
  </channel>
</rss>

