<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disable SSLv3 on CPCA in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Disable-SSLv3-on-CPCA/m-p/132304#M23922</link>
    <description>&lt;P&gt;Ok I have a solution/workaround, but its an issue CP will need to fix.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the LTA.tgz file on the cloud portal contains an outdated version of "opsec_pull_cert" and "opsec_pull_cert.exe", this &lt;FONT color="#000000"&gt;version&lt;/FONT&gt;&amp;nbsp;only seems to support sslv3. The way to resolve it is on your log server run this:&lt;/P&gt;
&lt;P&gt;find /&amp;nbsp; -name opsec_pull_cert&lt;/P&gt;
&lt;P&gt;and find the version bundled with log exporter (on my R80.40 it was in&amp;nbsp;/opt/CPrt-R80.40/log_indexer/opsec_pull_cert)&lt;/P&gt;
&lt;P&gt;Copy that binary file, and overwrite it in the LTA extracted folder, now when you run ./LTA run the fetch certificate process will work and use tls1.x because its using the newer opsec_pull_cert binary&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 20 Oct 2021 23:02:37 GMT</pubDate>
    <dc:creator>Ryan_Ryan</dc:creator>
    <dc:date>2021-10-20T23:02:37Z</dc:date>
    <item>
      <title>Disable SSLv3 on CPCA</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-SSLv3-on-CPCA/m-p/132183#M23917</link>
      <description>&lt;P&gt;Hi I am following:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://dl3.checkpoint.com/paid/7a/7ab66b38bbe0505e3933c89fe00b020d/CP_CloudServices_AdminGuide_2.5.pdf?HashKey=1634714374_18847c131f7a7abdb9f522f26491882d&amp;amp;xtn=.pdf" target="_blank"&gt;https://dl3.checkpoint.com/paid/7a/7ab66b38bbe0505e3933c89fe00b020d/CP_CloudServices_AdminGuide_2.5.pdf?HashKey=1634714374_18847c131f7a7abdb9f522f26491882d&amp;amp;xtn=.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;to setup LTA between our cloud and the onprem log server. I am stuck at the point of pulling the cert from the manager to the log server. Running the script does it for you, also the document details how to do it manually, however both fail with the same error:&lt;/P&gt;
&lt;P&gt;Opsec error. rc=-1 err=-100 General error in Certificate Authority&lt;/P&gt;
&lt;P&gt;(command:&amp;nbsp;opsec_pull_cert )&lt;/P&gt;
&lt;P&gt;I did a tcpdump on the traffic, what I am seeing is the log server trying to establish an SSLv3 connection to the manager on port 18210, and the session tanks out with a handshake failed. I suspect the manager is refusing to communicate on sslv3, is there anyway I can turn off sslv3 on the log server? I have it already disabled on the webserver, I am not sure where this setting would be, or alternatively can I enable it temporarily on the manager to get the cert pushed?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Oct 2021 07:30:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-SSLv3-on-CPCA/m-p/132183#M23917</guid>
      <dc:creator>Ryan_Ryan</dc:creator>
      <dc:date>2021-10-20T07:30:15Z</dc:date>
    </item>
    <item>
      <title>Re: Disable SSLv3 on CPCA</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Disable-SSLv3-on-CPCA/m-p/132304#M23922</link>
      <description>&lt;P&gt;Ok I have a solution/workaround, but its an issue CP will need to fix.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the LTA.tgz file on the cloud portal contains an outdated version of "opsec_pull_cert" and "opsec_pull_cert.exe", this &lt;FONT color="#000000"&gt;version&lt;/FONT&gt;&amp;nbsp;only seems to support sslv3. The way to resolve it is on your log server run this:&lt;/P&gt;
&lt;P&gt;find /&amp;nbsp; -name opsec_pull_cert&lt;/P&gt;
&lt;P&gt;and find the version bundled with log exporter (on my R80.40 it was in&amp;nbsp;/opt/CPrt-R80.40/log_indexer/opsec_pull_cert)&lt;/P&gt;
&lt;P&gt;Copy that binary file, and overwrite it in the LTA extracted folder, now when you run ./LTA run the fetch certificate process will work and use tls1.x because its using the newer opsec_pull_cert binary&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Oct 2021 23:02:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Disable-SSLv3-on-CPCA/m-p/132304#M23922</guid>
      <dc:creator>Ryan_Ryan</dc:creator>
      <dc:date>2021-10-20T23:02:37Z</dc:date>
    </item>
  </channel>
</rss>

