<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CheckPoint Proxy downgrades TLS version in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-SSL-bypass-not-working-previously-quot-Proxy/m-p/245857#M47898</link>
    <description>&lt;P&gt;Is ssl inspection enabled?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Mon, 07 Apr 2025 14:57:21 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-04-07T14:57:21Z</dc:date>
    <item>
      <title>CheckPoint SSL bypass not working (previously "... Proxy downgrades TLS version")</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-SSL-bypass-not-working-previously-quot-Proxy/m-p/245856#M47897</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;We're having a strange behaviour on one of our firewalls.&lt;/P&gt;&lt;P&gt;Users trying to open the website &lt;A href="https://go.sospes.com" target="_blank" rel="noopener"&gt;https://go.sospes.com&lt;/A&gt; over Checkpoint proxy with HTTPS inspection enabled. But the connection times out.&lt;/P&gt;&lt;P&gt;I run a packet capture on the LAN and WAN interfaces and noticed that the client request is TLSv1.2 and the request on the WAN side TLSv1.0.&lt;BR /&gt;I'm sure that the destinatin blocks deprecated protocols like TLSv1 and thats why the users get a timeout.&lt;BR /&gt;&lt;BR /&gt;But why downgrades the firewall the TLS version? It seems that this only happens for this website.&lt;/P&gt;&lt;P&gt;Current version: R81.10 JHF Take 174&lt;/P&gt;</description>
      <pubDate>Tue, 08 Apr 2025 12:51:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-SSL-bypass-not-working-previously-quot-Proxy/m-p/245856#M47897</guid>
      <dc:creator>JasMan</dc:creator>
      <dc:date>2025-04-08T12:51:01Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Proxy downgrades TLS version</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-SSL-bypass-not-working-previously-quot-Proxy/m-p/245857#M47898</link>
      <description>&lt;P&gt;Is ssl inspection enabled?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 07 Apr 2025 14:57:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-SSL-bypass-not-working-previously-quot-Proxy/m-p/245857#M47898</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-04-07T14:57:21Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Proxy downgrades TLS version</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-SSL-bypass-not-working-previously-quot-Proxy/m-p/245869#M47905</link>
      <description>&lt;P&gt;it looks like that site only support tls v1.3 with limited ciphers. not sure if usfw still required for tls v1.3 support, that was a caveat for a while.&amp;nbsp;&lt;A href="https://www.ssllabs.com/ssltest/analyze.html?d=go.sospes.com" target="_blank" rel="noopener"&gt;SSL Server Test: go.sospes.com (Powered by Qualys SSL Labs)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciphers supported per &lt;A href="https://support.checkpoint.com/results/sk/sk104562" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk104562&lt;/A&gt;&lt;/P&gt;&lt;P&gt;looks like usfw may be required for tlsv1.3 per &lt;A href="https://support.checkpoint.com/results/sk/sk65123" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk65123&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Apr 2025 15:58:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-SSL-bypass-not-working-previously-quot-Proxy/m-p/245869#M47905</guid>
      <dc:creator>Lloyd_Braun</dc:creator>
      <dc:date>2025-04-07T15:58:10Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Proxy downgrades TLS version</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-SSL-bypass-not-working-previously-quot-Proxy/m-p/245879#M47908</link>
      <description>&lt;P&gt;Performing TLS Inspection for TLS 1.3 requires USFW mode to be enabled.&lt;BR /&gt;See:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk167052" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk167052&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;Otherwise, the system will downgrade to TLS 1.2.&lt;BR /&gt;Since we're starting with TLS 1.2, that isn't the case here.&lt;/P&gt;
&lt;P&gt;If this TLSv1 connection occurs from the gateway right after the user initiates the connection, this would be the SNI verification step that is sending it.&lt;BR /&gt;Not sure there's a way to tune that, which suggests TAC should be involved.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Apr 2025 16:58:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-SSL-bypass-not-working-previously-quot-Proxy/m-p/245879#M47908</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-04-07T16:58:25Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Proxy downgrades TLS version</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-SSL-bypass-not-working-previously-quot-Proxy/m-p/245904#M47919</link>
      <description>&lt;P&gt;Be aware Wireshark's report of TLS version is frequently misleading.&lt;/P&gt;
&lt;P&gt;All TLS handshakes start with a Client Hello specifying TLSv1.0 (identifier 0x0301). There's then an offer inside the Client Hello to actually negotiate TLSv1.1 (0x0302) or TLSv1.2 (0x0303). Then there's an extension inside&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;that&lt;/EM&gt;&lt;/STRONG&gt; which says the client actually supports TLSv1.3 (0x0304).&lt;/P&gt;
&lt;P&gt;Until it sees a response, Wireshark shows the lowest possible version of the negotiation. That is almost guaranteed to be a false result caused by your actual problem, which is not getting the Server Hello.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Apr 2025 21:41:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-SSL-bypass-not-working-previously-quot-Proxy/m-p/245904#M47919</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2025-04-07T21:41:58Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Proxy downgrades TLS version</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-SSL-bypass-not-working-previously-quot-Proxy/m-p/245965#M47931</link>
      <description>&lt;P&gt;&lt;SPAN class=""&gt;You're right.&lt;/SPAN&gt; &lt;SPAN class=""&gt;I totaly forgot about this.&lt;/SPAN&gt; &lt;SPAN class=""&gt;That's why I wrongly identified it as a TLSv1 request.&lt;/SPAN&gt; &lt;SPAN class=""&gt;‌&lt;span class="lia-unicode-emoji" title=":grimacing_face:"&gt;😬&lt;/span&gt;&lt;BR /&gt;‌&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;We were able to find the reason for the issue.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;The site is excluded from HTTPS inspection on all our firewalls.&lt;/SPAN&gt; &lt;SPAN class=""&gt;But the rule doesn't match anymore on one firewall since last week.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;The last exception logs reportet log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;We've created a new rule for the bypass below the non-working rule to solve the issue.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Now we're trying to identify why the global rule is not matching on one firewall.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;The last matching log entries for that firewall show an error:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;"The probe detected that this destination cannot be inspected and its identity cannot be verified due to a TLS alert (TLS alert: protocol_version)"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;After about 20 of this errors no more HTTP inspection logs where generated for this firewall and website.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Apr 2025 12:46:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-SSL-bypass-not-working-previously-quot-Proxy/m-p/245965#M47931</guid>
      <dc:creator>JasMan</dc:creator>
      <dc:date>2025-04-08T12:46:40Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Proxy downgrades TLS version</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-SSL-bypass-not-working-previously-quot-Proxy/m-p/245970#M47935</link>
      <description>&lt;P&gt;FWIW, I know its recommended to keep any any bypass at end of ssl inspection policy, but I always do any any inspect and works real well.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 08 Apr 2025 12:59:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-SSL-bypass-not-working-previously-quot-Proxy/m-p/245970#M47935</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-04-08T12:59:45Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Proxy downgrades TLS version</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-SSL-bypass-not-working-previously-quot-Proxy/m-p/245976#M47939</link>
      <description>&lt;P&gt;Today I learned. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Apr 2025 13:51:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-SSL-bypass-not-working-previously-quot-Proxy/m-p/245976#M47939</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-04-08T13:51:20Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Proxy downgrades TLS version</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-SSL-bypass-not-working-previously-quot-Proxy/m-p/245977#M47940</link>
      <description>&lt;P&gt;I bet our friend behind tcpdump101 may had not had know that either, will ask him : - )&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 08 Apr 2025 13:58:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-SSL-bypass-not-working-previously-quot-Proxy/m-p/245977#M47940</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-04-08T13:58:44Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Proxy downgrades TLS version</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-SSL-bypass-not-working-previously-quot-Proxy/m-p/245988#M47942</link>
      <description>&lt;P&gt;Here's a screenshot of a negotiation I just caught demonstrating this:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="A packet capture of a connection to 1.1.1.1. A Client Hello is selected. It shows handshake version TLSv1.0, handshake protocol client hello version TLSv1.2, then extension: supported versions with support for TLSv1.3." style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30166i0B3F96AB0C412FEE/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-04-08 at 09.50.45.png" alt="A packet capture of a connection to 1.1.1.1. A Client Hello is selected. It shows handshake version TLSv1.0, handshake protocol client hello version TLSv1.2, then extension: supported versions with support for TLSv1.3." /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;A packet capture of a connection to 1.1.1.1. A Client Hello is selected. It shows handshake version TLSv1.0, handshake protocol client hello version TLSv1.2, then extension: supported versions with support for TLSv1.3.&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Incidentally, SSLv3 is protocol 0x0300, so TLSv1.0 is SSLv3.1. The actual implementation details of TLS are deeply irritating. I'm glad somebody else develops the libraries to deal with it.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Apr 2025 15:07:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-SSL-bypass-not-working-previously-quot-Proxy/m-p/245988#M47942</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2025-04-08T15:07:20Z</dc:date>
    </item>
  </channel>
</rss>

