<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Reverting back to self-signed certificate for HTTPS Inspection in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Reverting-back-to-self-signed-certificate-for-HTTPS-Inspection/m-p/129170#M23573</link>
    <description>&lt;P&gt;Great to hear and good job.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Report back TAC’s findings from the case here or message me with them.&lt;/P&gt;
&lt;P&gt;Would be nice to have this process documented if the product owners say it is supported.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 11 Sep 2021 06:13:21 GMT</pubDate>
    <dc:creator>mcatanzaro</dc:creator>
    <dc:date>2021-09-11T06:13:21Z</dc:date>
    <item>
      <title>Reverting back to self-signed certificate for HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Reverting-back-to-self-signed-certificate-for-HTTPS-Inspection/m-p/129165#M23568</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;Thank you for taking time to read this.&amp;nbsp; I performed the following on an R80.40 install:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Enabled the HTTPS Inspection blade&lt;/LI&gt;&lt;LI&gt;Generated a CSR, had a third-party sign the CSR,&lt;/LI&gt;&lt;LI&gt;Installed the signed certificate&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;However, HTTPS Inspection failed because I used a server certificate, instead of a CA certificate.&amp;nbsp; So now, I want to revert back to using the self-signed certificate which does generate a CA certificate, but this option is no longer available.&amp;nbsp; From the SmartConsole -&amp;gt; Gateways &amp;amp; Servers -&amp;gt; Gateway Object -&amp;gt; HTTPS Inspection window, I can only view or export the existing certificate:&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From Security Policies -&amp;gt;HTTPS Inspection -&amp;gt; HTTPS Tools -&amp;gt; Additional Settings (SmartDashboard) -&amp;gt; HTTPS Inspection -&amp;gt; Gateways , the only option is to Renew or Import:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="screenshot_smartdashboard_LI.jpg" style="width: 332px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13668i146E00921F695284/image-size/medium?v=v2&amp;amp;px=400" role="button" title="screenshot_smartdashboard_LI.jpg" alt="screenshot_smartdashboard_LI.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I've tried disabling HTTPS Inspection, but that did not help either.&amp;nbsp; I've also opened a&amp;nbsp; ticket with CheckPoint and they recommended restoring from backup which unfortunately I do not have or performing a fresh install.&amp;nbsp; They also recommended engaging Professional services.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Before I go this route has anybody encountered this issue or have a recommendation on how to generate the self-signed CA certificate?&lt;/P&gt;</description>
      <pubDate>Sat, 11 Sep 2021 02:14:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Reverting-back-to-self-signed-certificate-for-HTTPS-Inspection/m-p/129165#M23568</guid>
      <dc:creator>cpuser1</dc:creator>
      <dc:date>2021-09-11T02:14:36Z</dc:date>
    </item>
    <item>
      <title>Re: Reverting back to self-signed certificate for HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Reverting-back-to-self-signed-certificate-for-HTTPS-Inspection/m-p/129166#M23569</link>
      <description>&lt;P&gt;I’d have to check this one out in my lab to see if there is a way to clear out the external certificate.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Do you have a private CA in your environment? The self-signed cert doesn’t have to be the one you generated on the gateway.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;I’ve seen a number of deployments where customers who use ADCS will use the same root CA that was used for 802.1x etc. since it is already deployed to their endpoints.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Sep 2021 02:53:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Reverting-back-to-self-signed-certificate-for-HTTPS-Inspection/m-p/129166#M23569</guid>
      <dc:creator>mcatanzaro</dc:creator>
      <dc:date>2021-09-11T02:53:14Z</dc:date>
    </item>
    <item>
      <title>Re: Reverting back to self-signed certificate for HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Reverting-back-to-self-signed-certificate-for-HTTPS-Inspection/m-p/129167#M23570</link>
      <description>&lt;P&gt;Hi mcatanzaro,&lt;/P&gt;&lt;P&gt;Thanks for responding.&lt;/P&gt;&lt;P&gt;No, we don't have a private CA in our environment.&amp;nbsp; If I understand correctly&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;I can generate the self-sign on say, a linux box&lt;/LI&gt;&lt;LI&gt;Create a private CA, sign the CSR&lt;/LI&gt;&lt;LI&gt;Convert signed-certificate to .p12&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Import the .p12 file&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;That sounds doable and I actually tried something similar on the gateway, but I am not sure how to set up the CA:&lt;/P&gt;&lt;P&gt;cpopenssl ca -startdate 2109100000000 -enddate 2909090000000 -in fw_cert.csr -out fw_cert.crt -config $CPDIR/conf/openssl.cnf&lt;/P&gt;&lt;P&gt;Using configuration from /opt/CPshrd-R80.30/conf/openssl.cnf&lt;BR /&gt;Error opening CA private key ./demoCA/private/cakey.pem&lt;BR /&gt;4158678668:error:02001002:system library:fopen:No such file or directory:bss_file.c:413:fopen('./demoCA/private/cakey.pem','r')&lt;BR /&gt;4158678668:error:20074002:BIO routines:FILE_CTRL:system lib:bss_file.c:415:&lt;BR /&gt;unable to load CA private key&lt;/P&gt;&lt;P&gt;I'm actually reading up on how to set up the CA.&amp;nbsp; Would it be okay to do this on the gateway?&lt;/P&gt;</description>
      <pubDate>Sat, 11 Sep 2021 03:11:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Reverting-back-to-self-signed-certificate-for-HTTPS-Inspection/m-p/129167#M23570</guid>
      <dc:creator>cpuser1</dc:creator>
      <dc:date>2021-09-11T03:11:06Z</dc:date>
    </item>
    <item>
      <title>Re: Reverting back to self-signed certificate for HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Reverting-back-to-self-signed-certificate-for-HTTPS-Inspection/m-p/129168#M23571</link>
      <description>&lt;P&gt;Sounds like you have done your research.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regarding the question of using cpopenssl to accomplish this, in my mind I don’t see why it wouldn’t work since it is a port of openssl.&lt;/P&gt;
&lt;P&gt;However, I would pose this solution in your TAC case so we can verify the proper syntax and level of support from the appropriate internal resources.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Sep 2021 05:48:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Reverting-back-to-self-signed-certificate-for-HTTPS-Inspection/m-p/129168#M23571</guid>
      <dc:creator>mcatanzaro</dc:creator>
      <dc:date>2021-09-11T05:48:18Z</dc:date>
    </item>
    <item>
      <title>Re: Reverting back to self-signed certificate for HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Reverting-back-to-self-signed-certificate-for-HTTPS-Inspection/m-p/129169#M23572</link>
      <description>&lt;P&gt;Hi mcatanzaro,&lt;/P&gt;&lt;P&gt;This is what worked for me:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Configure the active gateway to be a CA&lt;/LI&gt;&lt;LI&gt;Sign the CSR&lt;/LI&gt;&lt;LI&gt;Deploy signed certificate to end host&lt;/LI&gt;&lt;LI&gt;Export signed certificate in .p12 format&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Import .p12 certificate in SmartDashboard -&amp;gt; HTTPS Inspection -&amp;gt; CA Certificate&lt;/P&gt;&lt;P&gt;More detailed:&lt;/P&gt;&lt;P&gt;# Create CA directories and files. With Trail and Error and looking at the openssl.cnf file, these are the directories/files needed&lt;/P&gt;&lt;P&gt;mkdir ca_certificate&lt;/P&gt;&lt;P&gt;cd ca_certificate&lt;/P&gt;&lt;P&gt;mkdir demoCA&lt;/P&gt;&lt;P&gt;cd demoCA&lt;/P&gt;&lt;P&gt;mkdir {certs,crl,newcerts,private,crl,conf}&lt;/P&gt;&lt;P&gt;touch {index.txt,serial}&lt;/P&gt;&lt;P&gt;# Serial numbers are in hex and here we are starting with 1&lt;/P&gt;&lt;P&gt;echo "01" &amp;gt; serial&lt;/P&gt;&lt;P&gt;# Create private key for CA&lt;/P&gt;&lt;P&gt;cpopenssl genrsa -aes256 -out private/cakey.pem 4096&lt;/P&gt;&lt;P&gt;# Copy CheckPoint openssl configuration file to local configuration directory&lt;/P&gt;&lt;P&gt;cp $CPDIR/conf/openssl.cnf conf/&lt;/P&gt;&lt;P&gt;# Modify openssl.cnf&lt;/P&gt;&lt;P&gt;- In the [ req_distinguished_name ] section, change the default values to your appropriate environment&lt;/P&gt;&lt;P&gt;&amp;nbsp;- In the [ usr_cert ] section, change the value for basicConstraint from FALSE to TRUE&lt;/P&gt;&lt;P&gt;# Create a certificate for this local CA&lt;/P&gt;&lt;P&gt;cpopenssl req -new -x509 -days 3650 -key private/cakey.pem -out cacert.pem -config config/openssl.cnf&lt;/P&gt;&lt;P&gt;# Generate a CSR on active gateway&lt;/P&gt;&lt;P&gt;cpopenssl req -new -newkey rsa:4096 -sha256 -out gw.csr -keyout gw.key -config &amp;lt;user generated config file including CN name and other data&amp;gt;&lt;/P&gt;&lt;P&gt;# Sign the CSR&lt;/P&gt;&lt;P&gt;cpopenssl ca -startdate 210910000000Z -enddate 290909000000Z -in gw.csr -out gw.crt -config conf/openssl.cnf&lt;/P&gt;&lt;P&gt;# Deploy certificate to end host&lt;/P&gt;&lt;P&gt;# Export the signed certificate in .p12 format&lt;/P&gt;&lt;P&gt;cpopenssl pkcs12 -export -out gw.p12 -in gw.crt -inkey gw.key&lt;/P&gt;&lt;P&gt;# Import the .p12 certificate from the SmartDashboard -&amp;gt; HTTPS Inspection -&amp;gt; CA certificate&lt;/P&gt;&lt;P&gt;# Push the policy&lt;/P&gt;&lt;P&gt;I submitted the above steps to the TAC.&amp;nbsp; I probably won't here back until Monday, but it seems to work so far.&amp;nbsp; Still testing...&lt;/P&gt;</description>
      <pubDate>Sat, 11 Sep 2021 05:53:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Reverting-back-to-self-signed-certificate-for-HTTPS-Inspection/m-p/129169#M23572</guid>
      <dc:creator>cpuser1</dc:creator>
      <dc:date>2021-09-11T05:53:19Z</dc:date>
    </item>
    <item>
      <title>Re: Reverting back to self-signed certificate for HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Reverting-back-to-self-signed-certificate-for-HTTPS-Inspection/m-p/129170#M23573</link>
      <description>&lt;P&gt;Great to hear and good job.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Report back TAC’s findings from the case here or message me with them.&lt;/P&gt;
&lt;P&gt;Would be nice to have this process documented if the product owners say it is supported.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Sep 2021 06:13:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Reverting-back-to-self-signed-certificate-for-HTTPS-Inspection/m-p/129170#M23573</guid>
      <dc:creator>mcatanzaro</dc:creator>
      <dc:date>2021-09-11T06:13:21Z</dc:date>
    </item>
    <item>
      <title>Re: Reverting back to self-signed certificate for HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Reverting-back-to-self-signed-certificate-for-HTTPS-Inspection/m-p/129594#M23618</link>
      <description>&lt;P&gt;TAC has not responded whether the above solution is appropriate or not, but I found the "easier" solution.&amp;nbsp; The renew certificate button in the SmartDashboard is meant for the self-signed certificate that was initially created when HTTPS Inspection was activated.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once you renew the certificate, you can immediately export this certificate from the SmartDashboard, even without pushing a policy.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After you push the policy, do not export the certificate from the SmartConsole.&amp;nbsp; The SmartConsole will export the old certificate.&amp;nbsp; What you have to do is close the SmartConsole and relaunch it.&amp;nbsp; After relaunch, the export from the SmartConsole is the correct, current certificate.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This may be a bug or maybe it's by design -- I'm not sure, but that's how you revert back to the self-signed certificate from a third party certificate.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Sep 2021 19:30:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Reverting-back-to-self-signed-certificate-for-HTTPS-Inspection/m-p/129594#M23618</guid>
      <dc:creator>cpuser1</dc:creator>
      <dc:date>2021-09-16T19:30:09Z</dc:date>
    </item>
    <item>
      <title>Re: Reverting back to self-signed certificate for HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Reverting-back-to-self-signed-certificate-for-HTTPS-Inspection/m-p/129626#M23619</link>
      <description>&lt;P&gt;Most probably SmartConsole cache issue.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Sep 2021 07:32:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Reverting-back-to-self-signed-certificate-for-HTTPS-Inspection/m-p/129626#M23619</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-09-17T07:32:38Z</dc:date>
    </item>
  </channel>
</rss>

