<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Inspection Engine Broken in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/SSL-Inspection-Engine-Broken/m-p/37036#M7809</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Daniel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure I understand.&amp;nbsp; In our case the OCSP request was going out but the answer had a time that was in the past so the TLS sessions were considered NOT trusted and were blocked.&amp;nbsp; And I mean every TLS browser session in our Enterprise was blocked and this included multiple network segments but no DMZ.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 12 Jul 2018 14:47:52 GMT</pubDate>
    <dc:creator>Dan_Roddy</dc:creator>
    <dc:date>2018-07-12T14:47:52Z</dc:date>
    <item>
      <title>SSL Inspection Engine Broken</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SSL-Inspection-Engine-Broken/m-p/37030#M7803</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;All outbound SSL traffic is broken today.&amp;nbsp; This error is seen in Tracker: HTTPS Inspection error occured.&amp;nbsp; Action Reason:&amp;nbsp;Blocking request as configured in engine settings of Application Control.&amp;nbsp; This occured after 4:00 AM today...ie. right after our IPS update completed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This error is seen in SmartEvents for any and all domains:&amp;nbsp;OCSP response time obsolete. Response considered unreliable.&lt;BR /&gt; Certificate DN: 'CN=*.agkn.com' Requested Server Name: d.agkn.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had to disable SSL inspection on the gateway to get the enterprise web browsing restored.&amp;nbsp; Is the database corrupted?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HELP!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you in advance, can I give you all my points for help?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan Roddy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jul 2018 22:39:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SSL-Inspection-Engine-Broken/m-p/37030#M7803</guid>
      <dc:creator>Dan_Roddy</dc:creator>
      <dc:date>2018-07-05T22:39:21Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection Engine Broken</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SSL-Inspection-Engine-Broken/m-p/37031#M7804</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As part of HTTPS Inspection, the gateway validates the certificate on the remote site.&lt;/P&gt;&lt;P&gt;This is partially done with OCSP.&lt;/P&gt;&lt;P&gt;You can disable this by unchecking the "Revoked server certificate" option here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/66948_pastedImage_2.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I suppose it's possible an IPS or App Control update somehow is blocking the OCSP queries.&lt;/P&gt;&lt;P&gt;Did you open a TAC case by chance?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jul 2018 23:14:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SSL-Inspection-Engine-Broken/m-p/37031#M7804</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-07-05T23:14:08Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection Engine Broken</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SSL-Inspection-Engine-Broken/m-p/37032#M7805</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When I arrived at my desk at 6:30 this morning Kyle Danielson called me to discuss the case I had not opened.&amp;nbsp; I must be thanking you Dameon for the connection - turns out this is a known problem with at least one other environment.&amp;nbsp; I will be re-enabling SSL inspection this afternoon to do further troubleshooting.&amp;nbsp; Here is a related error I found in Tracker that suggests and engine setting, can you tell me what and where the relevant engine settings are?&amp;nbsp; Looking in Blades/Application Control &amp;amp; URL Filtering/Advanced Settings.&amp;nbsp; Is this maybe a SSLv3 issue?&amp;nbsp; How will the gateway react if the connection is SSLv3?&amp;nbsp; I agree that no browsers should have SSLv3 enabled.&amp;nbsp; Too many questions!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Record Details&lt;/P&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="padding: 6px 6px 0px 0px;"&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD class=""&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD class=""&gt;Application Control - HTTPS Inspection error occurred (2)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=""&gt;Product Family&lt;/TD&gt;&lt;TD class=""&gt;&lt;IMG border="0" src="https://community.checkpoint.com/Image/SmartViewTracker/product_family_network.ico" style="margin-right: 3px;" /&gt;Network&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=""&gt;Action Reason&lt;/TD&gt;&lt;TD class=""&gt;Blocking request as configured in engine settings of Application Control&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jul 2018 18:11:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SSL-Inspection-Engine-Broken/m-p/37032#M7805</guid>
      <dc:creator>Dan_Roddy</dc:creator>
      <dc:date>2018-07-06T18:11:29Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection Engine Broken</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SSL-Inspection-Engine-Broken/m-p/37033#M7806</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can't claim full credit for this one, though yes, I helped connect the dots&amp;nbsp;&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;If the issue were SSLv3 the error would be more clear.&lt;/P&gt;&lt;P&gt;Other than what I suggested above, I'm at a loss personally.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jul 2018 20:14:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SSL-Inspection-Engine-Broken/m-p/37033#M7806</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-07-06T20:14:14Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection Engine Broken</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SSL-Inspection-Engine-Broken/m-p/37034#M7807</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pretty sure OCSP verification happens in the various wstlsd daemons on the gateway, any interesting messages dumped into &lt;STRONG&gt;&lt;EM&gt;$FWDIR/log/wstlsd.elg &lt;/EM&gt;&lt;/STRONG&gt;around the time of the issue?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any chance the IPS update started interfering with DNS lookups being performed by the firewall which is necessary for OCSP checks?&amp;nbsp; Were any DNS signatures updated?&amp;nbsp; Did you try backing out the IPS update which is now possible under R80+ management?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any chance the clock on your systems jumped forward or backward an excessive amount during this period due to issues with NTP?&amp;nbsp; The error message about the time being "obsolete" is kind of strange...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jul 2018 21:24:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SSL-Inspection-Engine-Broken/m-p/37034#M7807</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-07-06T21:24:55Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection Engine Broken</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SSL-Inspection-Engine-Broken/m-p/37035#M7808</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In the App &amp;amp; URL filtering blade, there is an option for the &lt;A href="https://community.checkpoint.com/t5/tag/OCSP/tg-p"&gt;&lt;/A&gt;&amp;nbsp; protocol as an explicit choice. OCSP is done over http, thus not an option you necessarily want to allow servers in &lt;A href="https://community.checkpoint.com/t5/tag/dmz/tg-p"&gt;&lt;/A&gt; or limited access zones. Works well with combined strict FW rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/67019_pastedImage_1.png" /&gt;&lt;BR /&gt;&lt;BR /&gt;Looking forward to the layers in R80.xx and applying this in more places.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2018 14:31:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SSL-Inspection-Engine-Broken/m-p/37035#M7808</guid>
      <dc:creator>Daniel_Moore</dc:creator>
      <dc:date>2018-07-12T14:31:05Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection Engine Broken</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SSL-Inspection-Engine-Broken/m-p/37036#M7809</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Daniel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure I understand.&amp;nbsp; In our case the OCSP request was going out but the answer had a time that was in the past so the TLS sessions were considered NOT trusted and were blocked.&amp;nbsp; And I mean every TLS browser session in our Enterprise was blocked and this included multiple network segments but no DMZ.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2018 14:47:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SSL-Inspection-Engine-Broken/m-p/37036#M7809</guid>
      <dc:creator>Dan_Roddy</dc:creator>
      <dc:date>2018-07-12T14:47:52Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection Engine Broken</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SSL-Inspection-Engine-Broken/m-p/37037#M7810</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tim,&amp;nbsp; Kyle Danielson from TAC was able to capture debug on this...firewall clocks are right on, no apparent time issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="background-color: #ffffff; color: #000000; font-size: 12px;"&gt;From our support case:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="background-color: #ffffff; color: #000000; font-size: 12px;"&gt;Debugged WSTLSD to confirm if the issue is the same as the other one that was reported.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="background-color: #ffffff; color: #000000; font-size: 12px;"&gt;We were able to replicate the issue with WSTLSD debug.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="background-color: #ffffff; color: #000000; font-size: 12px;"&gt;The problem here is that the GW is getting a 'next update' that's in the past.&amp;nbsp;&lt;/EM&gt;&lt;BR style="color: #000000; font-size: 12px;" /&gt;&lt;EM style="background-color: #ffffff; color: #000000; font-size: 12px;"&gt;-This could be some problem with parsing on the gateway or with the response sent by the CA.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="background-color: #ffffff; color: #000000; font-size: 12px;"&gt;I wanted to debug again and get captures to confirm what the server is sending back, however the issue wouldn't replicate again. We'd have to figure out some way to clear the CPTLS cache for HTTPS inspection to force it.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 12px;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 15px;"&gt;There is alot of clutter around this case maybe obscuring the root cause.&amp;nbsp; One thing I found is that content delivery networks do this thing called OCSP splicing where they get the OCSP answer and cache it - so if that were the issue it would be outside our organization and maybe CDN was failing to update OCSP answers and their cached answer was stale. ( I really put a lot of credit to this theory)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 15px;"&gt;NOW another thing jumps out as I continue to query the database I found these System Alerts that started at 4:16 AM and continued until 5:00 PM on July 5th (the day all 443 traffic failed)&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;STRONG style="background-color: #ffffff; color: #000000;"&gt;Internal error occurred, could not connect to "cws.checkpoint.com:80". Check proxy configuration on the gateway.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;STRONG style="background-color: #ffffff; color: #000000;"&gt;This is the AntiBot Blade with a High Threat System Alert.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 15px;"&gt;What do you think about this as contributing to the foray?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2018 15:17:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SSL-Inspection-Engine-Broken/m-p/37037#M7810</guid>
      <dc:creator>Dan_Roddy</dc:creator>
      <dc:date>2018-07-12T15:17:07Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection Engine Broken</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SSL-Inspection-Engine-Broken/m-p/37038#M7811</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The settings we have configured are more extensive 77.30 than Daemon's screen shot above, but we are not doing full SSL inspect either. If you can exclude the OCSP traffic from inspection on any blade, globally, you can artificially reduce "latency" of the return response.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2018 15:39:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SSL-Inspection-Engine-Broken/m-p/37038#M7811</guid>
      <dc:creator>Daniel_Moore</dc:creator>
      <dc:date>2018-07-12T15:39:44Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection Engine Broken</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SSL-Inspection-Engine-Broken/m-p/37039#M7812</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't think there would be any latency because OCSP is always done on port 80, thus no inspection necessary.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2018 16:55:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SSL-Inspection-Engine-Broken/m-p/37039#M7812</guid>
      <dc:creator>Dan_Roddy</dc:creator>
      <dc:date>2018-07-12T16:55:28Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection Engine Broken</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SSL-Inspection-Engine-Broken/m-p/37040#M7813</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Depending on the blades you have enabled, HTTP traffic does get inspected (and always does at the kernel level) no matter if you have IPS specific inspections enable or not. Latency being RTT for a server to respond. If there were a lot of errors, during a specific period of time, it's very possible upstream providers were doing maintenance or had an outage.&amp;nbsp;Do you have external polling/ monitors setup for network health outside of your Checkpoint environment? Did Amazon have any service disruptions during the window of time? The interwobble ain't perfect.&lt;BR /&gt;&lt;BR /&gt;I don't know the exact acceptable threshold for Checkpoint to say yeh or neh on a certificate revocation check. I do know explicitly allowing a port and protocol is different than any* any*. Mentioning the OCSP Protocol option for those who many not know it exists and future reference. &lt;A href="https://community.checkpoint.com/t5/tag/hth/tg-p"&gt;&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2018 17:35:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SSL-Inspection-Engine-Broken/m-p/37040#M7813</guid>
      <dc:creator>Daniel_Moore</dc:creator>
      <dc:date>2018-07-12T17:35:20Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection Engine Broken</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SSL-Inspection-Engine-Broken/m-p/37041#M7814</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OCSP acting up again but only on a limited number of domains, not all domains - response time obsolete (again)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OCSP response time obsolete. Response considered unreliable.&lt;BR /&gt; Certificate DN: 'CN=*.algovid.com,OU=EssentialSSL Wildcard,OU=Domain Control Validated' Requested Server Name: a.algovid.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone have insight into CDNs and this new term to me: OCSP Stiching or OCSP Splicing?&amp;nbsp; I am suspicious of this caching of OCSP responses, grrr.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Jul 2018 14:19:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SSL-Inspection-Engine-Broken/m-p/37041#M7814</guid>
      <dc:creator>Dan_Roddy</dc:creator>
      <dc:date>2018-07-13T14:19:12Z</dc:date>
    </item>
  </channel>
</rss>

