<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Wildcards in custom Apps in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55538#M1240</link>
    <description>&lt;P&gt;I am attempting to whitelist a long list of domains used by the user awareness training campaign.&lt;/P&gt;
&lt;P&gt;And am seeing this:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/1519iB87F67040154E623/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Can we get some clarity on why this is not working and how to get around this issue.&lt;/P&gt;
&lt;P&gt;The lab is 80.30EA, but the client is running 80.20.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank&amp;nbsp; you,&lt;/P&gt;
&lt;P&gt;Vladimir&lt;/P&gt;</description>
    <pubDate>Tue, 11 Jun 2019 17:16:48 GMT</pubDate>
    <dc:creator>Vladimir</dc:creator>
    <dc:date>2019-06-11T17:16:48Z</dc:date>
    <item>
      <title>Wildcards in custom Apps</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55538#M1240</link>
      <description>&lt;P&gt;I am attempting to whitelist a long list of domains used by the user awareness training campaign.&lt;/P&gt;
&lt;P&gt;And am seeing this:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/1519iB87F67040154E623/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Can we get some clarity on why this is not working and how to get around this issue.&lt;/P&gt;
&lt;P&gt;The lab is 80.30EA, but the client is running 80.20.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank&amp;nbsp; you,&lt;/P&gt;
&lt;P&gt;Vladimir&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2019 17:16:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55538#M1240</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-06-11T17:16:48Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcards in custom Apps</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55749#M1251</link>
      <description>I think the actual issue is the /* at the end of your URL, not the * at the beginning.</description>
      <pubDate>Thu, 13 Jun 2019 18:26:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55749#M1251</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-06-13T18:26:37Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcards in custom Apps</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55800#M1252</link>
      <description>&lt;P&gt;it says it right there, remove / at the end of domain&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jun 2019 09:54:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55800#M1252</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2019-06-14T09:54:29Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcards in custom Apps</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55831#M1255</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/181"&gt;@_Val_&lt;/a&gt;&amp;nbsp;, but the UG states that the "/*" should be there. Would the custom app defined with asterisk before domain name only allow for any path?&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jun 2019 14:13:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55831#M1255</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-06-14T14:13:03Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcards in custom Apps</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55832#M1256</link>
      <description>I think the docs are in error in this case, the /* isn't required.</description>
      <pubDate>Fri, 14 Jun 2019 14:41:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55832#M1256</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-06-14T14:41:26Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcards in custom Apps</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55936#M1266</link>
      <description>&lt;P&gt;The editor will accept both / and * but not together.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mytest.png" style="width: 617px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/1572i535A60325C3927C6/image-size/large?v=v2&amp;amp;px=999" role="button" title="mytest.png" alt="mytest.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2019 09:17:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55936#M1266</guid>
      <dc:creator>Paul_Grigg</dc:creator>
      <dc:date>2019-06-17T09:17:51Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcards in custom Apps</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55938#M1267</link>
      <description>&lt;P&gt;Reminds me of&amp;nbsp;sk106623&amp;nbsp;Custom Application/Site that was created to match a domain and sub-domains, is not matched by Application &amp;amp; URL Filtering policy...&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2019 10:12:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55938#M1267</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-06-17T10:12:25Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcards in custom Apps</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55953#M1270</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/11884"&gt;@Paul_Grigg&lt;/a&gt;&amp;nbsp;, can you describe the anticipated behavior in each case?&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2019 12:50:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55953#M1270</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-06-17T12:50:34Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcards in custom Apps</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55954#M1271</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21294"&gt;@G_W_Albrecht&lt;/a&gt;&amp;nbsp;, but CP puts out a warning sign in the same sk you are referencing.&lt;/P&gt;
&lt;P&gt;Specifically, the notion of "not using REGEX with HTTPS sites unless inspection is enabled".&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2019 12:56:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55954#M1271</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-06-17T12:56:38Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcards in custom Apps</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55956#M1272</link>
      <description>&lt;P&gt;What i mean is:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Application/Site was created with URL &lt;/SPAN&gt;&lt;EM&gt;*.example.com&amp;nbsp;&lt;/EM&gt;&lt;SPAN&gt;to match domain "&lt;/SPAN&gt;&lt;EM&gt;example.com&lt;/EM&gt;&lt;SPAN&gt;" and sub-domains "&lt;/SPAN&gt;&lt;EM&gt;*.example.com&lt;/EM&gt;&lt;SPAN&gt;".&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This will not work, only *example.com* - and this&amp;nbsp;seems like your issue to me, when&amp;nbsp;*example.com/* will not work, only&amp;nbsp;*example.com/ or&amp;nbsp;*example.com*.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;RegEx might be&amp;nbsp;helpful here when https&amp;nbsp;inception is used...&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2019 13:10:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55956#M1272</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-06-17T13:10:37Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcards in custom Apps</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55968#M1273</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21294"&gt;@G_W_Albrecht&lt;/a&gt;&amp;nbsp;, if HTTPS inspection would've been enabled, perhaps.&lt;/P&gt;
&lt;P&gt;This being said, I am hesitant to suggest enabling HTTPS inspection on anything not running R80.30, where it is significantly improved. But R80.30 still has some issues, (you can find one of the threads describing MABDA shortcomings).&lt;/P&gt;
&lt;P&gt;Also, one of my&amp;nbsp;acquaintances recently published a paper of how to use REGEX processing as a target for DOS and it was not pretty. So I am trying to stay away from its use unless absolutely necessary.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2019 13:56:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55968#M1273</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-06-17T13:56:36Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcards in custom Apps</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55969#M1274</link>
      <description>&lt;P&gt;You did not state in your post that you do not use https, so i did falsely assume that.! R80.30 has several shortcomings - a MABDA HF (&lt;SPAN&gt;sk113410&lt;/SPAN&gt;) should only be available in July, also a new build is planned for ca. 2 month from now. At least, we have a R80.30 MTA Update HF...&lt;/P&gt;
&lt;P&gt;Using RegEx for DOS sounds interesting, please point out that paper to us all ! Up to now, the danger was that people use RegEx expressions with a wrong syntax (i at least had some customers that did that), so it did not work as expected.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2019 14:07:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55969#M1274</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-06-17T14:07:02Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcards in custom Apps</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55972#M1275</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21294"&gt;@G_W_Albrecht&lt;/a&gt;&amp;nbsp;, I actually see relatively low number of companies adopting HTTPS inspection and am hoping to push them to it once 80.30 matures a bit.&lt;/P&gt;
&lt;P&gt;You can read the short write-up here and check the links at the end for additional references:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://medium.com/@somdevsangwan/exploiting-regular-expressions-2192dbbd6936" target="_blank"&gt;https://medium.com/@somdevsangwan/exploiting-regular-expressions-2192dbbd6936&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2019 14:19:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55972#M1275</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-06-17T14:19:51Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcards in custom Apps</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55979#M1276</link>
      <description>&lt;P&gt;Thank you for the link ! Yes, you always better think twice when using RegEx - and nested repetition ops are not a good idea... But it is like i already said - you have to know a lot before using RexEx...&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2019 15:06:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/55979#M1276</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-06-17T15:06:51Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcards in custom Apps</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/56074#M1277</link>
      <description>&lt;P&gt;Again regarding DOS on RegEx: With CP GWs, RegEx is used on the user URLs in APP CTRL and URL filtering. So an attack here has to come from the internal net, as requests from outside do not trigger&amp;nbsp;APP CTRL and URL filtering.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So, the issues with RegEx are clearly not important when used with&amp;nbsp;APP CTRL and URL filtering.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2019 13:02:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/56074#M1277</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-06-18T13:02:14Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcards in custom Apps</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/56080#M1278</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21294"&gt;@G_W_Albrecht&lt;/a&gt;&amp;nbsp;, I suspect that it is still exploitable from outside using URL encoding, such as those described here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://nvisium.com/blog/2015/06/11/regex-regularly-exploitable.html" target="_blank"&gt;https://nvisium.com/blog/2015/06/11/regex-regularly-exploitable.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2019 13:14:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/56080#M1278</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-06-18T13:14:32Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcards in custom Apps</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/56084#M1279</link>
      <description>&lt;P&gt;It is only exploitable if your servers that can be reached from outside employ such RegEx to filter input - but the RegEx in APP CTRL and URLF will not be exploitable.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2019 13:28:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Wildcards-in-custom-Apps/m-p/56084#M1279</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-06-18T13:28:09Z</dc:date>
    </item>
  </channel>
</rss>

