<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R80.10 disable additional weak ciphers in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-10-disable-additional-weak-ciphers/m-p/104282#M8232</link>
    <description>&lt;P&gt;Thanks, mate! Let me test it out and report the results here. Yes, upgrading to R80.40 is in the pipeline due to the EOS.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edit: No joy. But the similar results are making me guessing that the registry update or install policy is not working?&amp;nbsp; I tried the debug options under the Troubleshooting section but I was not able to see any logs pertaining to&amp;nbsp;&lt;SPAN&gt;vpnd.elg /&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;cptls_params_reorder_ciphers&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Edit (2): do note, the following setting will cause the Checkpoint VPN to be unable to connect.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="results.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/9499iA3035E79697DDBF0/image-size/large?v=v2&amp;amp;px=999" role="button" title="results.png" alt="results.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 08 Dec 2020 09:21:43 GMT</pubDate>
    <dc:creator>nolankam</dc:creator>
    <dc:date>2020-12-08T09:21:43Z</dc:date>
    <item>
      <title>R80.10 disable additional weak ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-10-disable-additional-weak-ciphers/m-p/103945#M8193</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have used the following two SKs to disable a number of ciphers and limited to TLS1.2&lt;/P&gt;&lt;P&gt;SK126613: Change the ciphersuite using cipher utility&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk126613&amp;amp;partition=Advanced&amp;amp;product=Security" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk126613&amp;amp;partition=Advanced&amp;amp;product=Security&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SK147272: Change the cipher suite settings in httpd-ssl.conf.templ&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk147272&amp;amp;partition=Advanced&amp;amp;product=Security" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk147272&amp;amp;partition=Advanced&amp;amp;product=Security&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;They were successful, up to a certain point. That point is the remove of further "weak" ciphers (TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA), which my security team identified as static cipher suites.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've tried to reapply these SKs but when I run nmap, the three ciphers still return.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For SK147272, we had replaced the existing ciphersuite as proposed by the SK “SSLCipherSuite ECDHE-RSA-AES256-SHA384:AES256-SHA256:!ADH:!EXP:RSA:+HIGH:+MEDIUM:!MD5:!LOW:!NULL:!SSLv2:!eNULL:!aNULL:!RC4:!SHA1” to&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;“ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!3DES:!MD5:!PSK”&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But nothing helped. Anyone has any clue? I have raised this to TAC but no updates yet.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Dec 2020 03:09:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-10-disable-additional-weak-ciphers/m-p/103945#M8193</guid>
      <dc:creator>nolankam</dc:creator>
      <dc:date>2020-12-02T03:09:21Z</dc:date>
    </item>
    <item>
      <title>Re: R80.10 disable additional weak ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-10-disable-additional-weak-ciphers/m-p/103952#M8194</link>
      <description>&lt;P&gt;Presumably, you followed all the steps in the SK (including the part where you restart httpd)?&lt;BR /&gt;Can you PM me the relevant SR number?&lt;/P&gt;</description>
      <pubDate>Wed, 02 Dec 2020 05:39:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-10-disable-additional-weak-ciphers/m-p/103952#M8194</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-12-02T05:39:37Z</dc:date>
    </item>
    <item>
      <title>Re: R80.10 disable additional weak ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-10-disable-additional-weak-ciphers/m-p/103958#M8200</link>
      <description>&lt;P&gt;Hi, I don't have the SR number as it was handled by a third party. But yeah, have restarted the httpd, and pushed the policy, and even did a cpstop;cpstart for good measure.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Dec 2020 07:00:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-10-disable-additional-weak-ciphers/m-p/103958#M8200</guid>
      <dc:creator>nolankam</dc:creator>
      <dc:date>2020-12-02T07:00:16Z</dc:date>
    </item>
    <item>
      <title>Re: R80.10 disable additional weak ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-10-disable-additional-weak-ciphers/m-p/103959#M8201</link>
      <description>&lt;P&gt;Your partner should be able to provide the Check Point SR number on request.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Dec 2020 07:01:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-10-disable-additional-weak-ciphers/m-p/103959#M8201</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-12-02T07:01:46Z</dc:date>
    </item>
    <item>
      <title>Re: R80.10 disable additional weak ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-10-disable-additional-weak-ciphers/m-p/104097#M8217</link>
      <description>&lt;P&gt;Here is the SR number:&amp;nbsp;6-0002439886&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2020 07:14:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-10-disable-additional-weak-ciphers/m-p/104097#M8217</guid>
      <dc:creator>nolankam</dc:creator>
      <dc:date>2020-12-03T07:14:37Z</dc:date>
    </item>
    <item>
      <title>Re: R80.10 disable additional weak ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-10-disable-additional-weak-ciphers/m-p/104277#M8231</link>
      <description>&lt;P&gt;In&amp;nbsp;vpn_cipher_priority.conf, you should probably only have the following two ciphers in the allowed section (at least according to the latest case notes):&lt;/P&gt;
&lt;P&gt;:ECDHE-RSA-AES128-GCM-SHA256&lt;BR /&gt;:ECDHE-ECDSA-AES128-GCM-SHA256&lt;/P&gt;
&lt;P&gt;FYI, in R80.40, we upgraded some of the crypto infrastructure and it might be worth upgrading to leverage more current crypto ciphers.&lt;BR /&gt;From R80.30, we have a CLI too (cipher_util) to make it easier to enable/disable ciphers.&lt;BR /&gt;R80.10 is nearing End of Support and suggest planning to upgrade.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2020 23:19:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-10-disable-additional-weak-ciphers/m-p/104277#M8231</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-12-03T23:19:29Z</dc:date>
    </item>
    <item>
      <title>Re: R80.10 disable additional weak ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-10-disable-additional-weak-ciphers/m-p/104282#M8232</link>
      <description>&lt;P&gt;Thanks, mate! Let me test it out and report the results here. Yes, upgrading to R80.40 is in the pipeline due to the EOS.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edit: No joy. But the similar results are making me guessing that the registry update or install policy is not working?&amp;nbsp; I tried the debug options under the Troubleshooting section but I was not able to see any logs pertaining to&amp;nbsp;&lt;SPAN&gt;vpnd.elg /&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;cptls_params_reorder_ciphers&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Edit (2): do note, the following setting will cause the Checkpoint VPN to be unable to connect.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="results.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/9499iA3035E79697DDBF0/image-size/large?v=v2&amp;amp;px=999" role="button" title="results.png" alt="results.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Dec 2020 09:21:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-10-disable-additional-weak-ciphers/m-p/104282#M8232</guid>
      <dc:creator>nolankam</dc:creator>
      <dc:date>2020-12-08T09:21:43Z</dc:date>
    </item>
    <item>
      <title>Re: R80.10 disable additional weak ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-10-disable-additional-weak-ciphers/m-p/104635#M8273</link>
      <description>&lt;P&gt;Changing the vpn_cipher_priority.conf does not seem to help; in any case, this affects the Endpoint VPN client connection, rather than standard HTTPS/443, which was what nmap was looking at.&lt;/P&gt;&lt;P&gt;The VPN client will be unable to connect if I remove these:&amp;nbsp;&lt;SPAN&gt;TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA.&amp;nbsp;Luckily, one of our guys were still connected and was able to undo the changes.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;TAC's advise is after the two SKs, there is nothing else they can do, and upgrade seems to be my only option.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Dec 2020 09:07:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-10-disable-additional-weak-ciphers/m-p/104635#M8273</guid>
      <dc:creator>nolankam</dc:creator>
      <dc:date>2020-12-08T09:07:53Z</dc:date>
    </item>
    <item>
      <title>Re: R80.10 disable additional weak ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-10-disable-additional-weak-ciphers/m-p/104690#M8279</link>
      <description>&lt;P&gt;Agree that upgrading is probably a good idea here, especially given R80.10 is nearing its End of Support date.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Dec 2020 17:15:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-10-disable-additional-weak-ciphers/m-p/104690#M8279</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-12-08T17:15:16Z</dc:date>
    </item>
  </channel>
</rss>

