<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Detect or/and enforce SSL/STARTTLS in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Detect-or-and-enforce-SSL-STARTTLS/m-p/5893#M688</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the reply. I needed some time to test it and found that SMTP over TLS signature doesn't work for me. I found in the 'More Info' section of 'SMTP over TLS' description that HTTPS Inspection is mandatory for detection but I cannot enable it due to policy reasons.&lt;/P&gt;&lt;P&gt;So no luck in SMTP, no luck in LDAP, no luck in HTTPS because I'm still on R77.&lt;/P&gt;&lt;P&gt;Anyway, thanks for the suggestions. Any other ideas appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 05 Sep 2017 13:44:42 GMT</pubDate>
    <dc:creator>Pawel_</dc:creator>
    <dc:date>2017-09-05T13:44:42Z</dc:date>
    <item>
      <title>Detect or/and enforce SSL/STARTTLS</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Detect-or-and-enforce-SSL-STARTTLS/m-p/5891#M686</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd like to detect and/or enforce that people use encryption when they pass data between systems. For example people say that for SMTP, tcp/25, they use STARTTLS. Is there any way to verify/enforce that STARTTLS is in fact used? I don't want to inspect the content of encrypted traffic, just want to ensure that people encrypt data.&lt;/P&gt;&lt;P&gt;The same question is about STARTTLS for LDAP on tcp/389 or detecting/enforcing the use of HTTPS on non-standard ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Pawel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Aug 2017 09:16:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Detect-or-and-enforce-SSL-STARTTLS/m-p/5891#M686</guid>
      <dc:creator>Pawel_</dc:creator>
      <dc:date>2017-08-31T09:16:49Z</dc:date>
    </item>
    <item>
      <title>Re: Detect or/and enforce SSL/STARTTLS</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Detect-or-and-enforce-SSL-STARTTLS/m-p/5892#M687</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are application signatures for SMTP over TLS.&lt;/P&gt;&lt;P&gt;It would make sense you could create a rule allowing that application and BLOCK regular smtp.&lt;/P&gt;&lt;P&gt;I don't believe we have a similar&amp;nbsp;one for LDAP.&lt;/P&gt;&lt;P&gt;For HTTPS, there is an application signature you can enable in R80.10 (it's disabled in the default https service).&lt;/P&gt;&lt;P&gt;If you want to enforce HTTPS on other ports, create a new TCP service:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58383_pastedImage_1.png" style="width: auto; height: auto;" /&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58384_pastedImage_2.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A rule using this service would have to be used in a layer that has Application Control enabled.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Sep 2017 19:40:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Detect-or-and-enforce-SSL-STARTTLS/m-p/5892#M687</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-09-01T19:40:53Z</dc:date>
    </item>
    <item>
      <title>Re: Detect or/and enforce SSL/STARTTLS</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Detect-or-and-enforce-SSL-STARTTLS/m-p/5893#M688</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the reply. I needed some time to test it and found that SMTP over TLS signature doesn't work for me. I found in the 'More Info' section of 'SMTP over TLS' description that HTTPS Inspection is mandatory for detection but I cannot enable it due to policy reasons.&lt;/P&gt;&lt;P&gt;So no luck in SMTP, no luck in LDAP, no luck in HTTPS because I'm still on R77.&lt;/P&gt;&lt;P&gt;Anyway, thanks for the suggestions. Any other ideas appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Sep 2017 13:44:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Detect-or-and-enforce-SSL-STARTTLS/m-p/5893#M688</guid>
      <dc:creator>Pawel_</dc:creator>
      <dc:date>2017-09-05T13:44:42Z</dc:date>
    </item>
  </channel>
</rss>

