<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: cipher_util - R80.30 / R80.40 - sk126613 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cipher-util-R80-30-R80-40-sk126613/m-p/82614#M6377</link>
    <description>&lt;P&gt;The sk126613 was updated.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;You may need to do a policy push after you modify the cipher suites using cipher_util so that the Security Gateway is updated with the changes.  &lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After the policy push the changes are now active and the cipher_util tool shows the disabled Ciphers.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 21 Apr 2020 12:05:10 GMT</pubDate>
    <dc:creator>Soeren_Rothe</dc:creator>
    <dc:date>2020-04-21T12:05:10Z</dc:date>
    <item>
      <title>cipher_util - R80.30 / R80.40 - sk126613</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cipher-util-R80-30-R80-40-sk126613/m-p/82591#M6373</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;for the Azure VMSS Rollout we need to change the Ciphers automatically, when a new FW instance is deployed.&lt;/P&gt;&lt;P&gt;I would like to disable these Ciphers:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Disabled:
TLS_RSA_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_RC4_128_MD5
TLS_RSA_WITH_RC4_128_SHA&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried this, it works on a VPN Cluster and another VM, but not on the VMSS. I believe this is a timing issue.&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(printf '1\n3\n' ; sleep 2 ; printf '21,22,23\n' ; sleep 1 ; printf 'q\ny\n' ) | cipher_util&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am looking for a proper way to modify these ciphers, what does cipher_util do? Can I somehow do it like on R80.20 ? Is cipher_util able to use a configuration file, if not, is this planned?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2020 08:07:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cipher-util-R80-30-R80-40-sk126613/m-p/82591#M6373</guid>
      <dc:creator>Soeren_Rothe</dc:creator>
      <dc:date>2020-04-21T08:07:05Z</dc:date>
    </item>
    <item>
      <title>Re: cipher_util - R80.30 / R80.40 - sk126613</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cipher-util-R80-30-R80-40-sk126613/m-p/82614#M6377</link>
      <description>&lt;P&gt;The sk126613 was updated.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;You may need to do a policy push after you modify the cipher suites using cipher_util so that the Security Gateway is updated with the changes.  &lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After the policy push the changes are now active and the cipher_util tool shows the disabled Ciphers.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2020 12:05:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cipher-util-R80-30-R80-40-sk126613/m-p/82614#M6377</guid>
      <dc:creator>Soeren_Rothe</dc:creator>
      <dc:date>2020-04-21T12:05:10Z</dc:date>
    </item>
    <item>
      <title>Re: cipher_util - R80.30 / R80.40 - sk126613</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cipher-util-R80-30-R80-40-sk126613/m-p/84282#M6497</link>
      <description>cipher_util modifies a couple of configuration files:&lt;BR /&gt;$CPDIR/conf/multi_portal_cipher_priority.conf&lt;BR /&gt;$CPDIR/conf/ssl_inspection_cipher_priority.conf&lt;BR /&gt;&lt;BR /&gt;It might be easier to simply copy pre-configured versions of these files to the gateways.&lt;BR /&gt;This is noted in sk126613.</description>
      <pubDate>Tue, 05 May 2020 22:20:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cipher-util-R80-30-R80-40-sk126613/m-p/84282#M6497</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-05-05T22:20:12Z</dc:date>
    </item>
    <item>
      <title>Re: cipher_util - R80.30 / R80.40 - sk126613</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cipher-util-R80-30-R80-40-sk126613/m-p/84284#M6498</link>
      <description>&lt;P&gt;Thanks for the hint, I think you refer to this note?&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;In order to apply a configuration to multiple Security Gateways, the 'multi_portal_cipher_priority.conf' / 'ssl_inspection_cipher_priority.conf' files need to be copied to $CPDIR/conf followed by cprestart command. Otherwise, DO NOT edit them as in previous versions. The tool manages the files interactively.&lt;/LI-CODE&gt;&lt;P&gt;&lt;SPAN&gt;The thing is, to perform a cprestart in the middle of the FW Instance creating (VMSS) sounds a little bit risky. So I prefer the cipher_tool using the echo command to disable unwanted ciphers.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;It would be great to just copy over the files to the gateway, just like you mentioned, and ran a command to activate / deactivate the ciphers, just like it is done by cipher_util. Something like "cipher_util --reload config" &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2020 22:54:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cipher-util-R80-30-R80-40-sk126613/m-p/84284#M6498</guid>
      <dc:creator>Soeren_Rothe</dc:creator>
      <dc:date>2020-05-05T22:54:50Z</dc:date>
    </item>
    <item>
      <title>Re: cipher_util - R80.30 / R80.40 - sk126613</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cipher-util-R80-30-R80-40-sk126613/m-p/84286#M6499</link>
      <description>I assume it would be enough to install policy afterwords, but that would obviously require testing.</description>
      <pubDate>Tue, 05 May 2020 23:10:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/cipher-util-R80-30-R80-40-sk126613/m-p/84286#M6499</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-05-05T23:10:09Z</dc:date>
    </item>
  </channel>
</rss>

