<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Trouble with the MACs after hardening Cypers/TLS/SSL in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Trouble-with-the-MACs-after-hardening-Cypers-TLS-SSL/m-p/128831#M8107</link>
    <description>&lt;P&gt;Try by adding back&amp;nbsp;&lt;SPAN&gt;TLS_RSA_WITH_AES_128_CBC_SHA to comply with the minimum specifications of the TLS 1.2 RFC.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I had an issue where MAC's wouldn't connect and this solved it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;As your logs show, the MAC client is expecting at least these suites:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;TLS_RSA_WITH_AES_128_CBC_SHA&lt;BR /&gt;TLS_RSA_WITH_AES_256_CBC_SHA&lt;BR /&gt;TLS_RSA_WITH_RC4_128_MD5&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;But it should do with the AES ones.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 07 Sep 2021 07:02:53 GMT</pubDate>
    <dc:creator>Alex-</dc:creator>
    <dc:date>2021-09-07T07:02:53Z</dc:date>
    <item>
      <title>Trouble with the MACs after hardening Cypers/TLS/SSL</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Trouble-with-the-MACs-after-hardening-Cypers-TLS-SSL/m-p/128468#M8105</link>
      <description>&lt;P&gt;Hello community,&lt;/P&gt;&lt;P&gt;as part of PCI certification we have lately hardened our FW and removed a couple of legacy things - including e.g. support for SSLv3.&lt;/P&gt;&lt;P&gt;Now I have a couple of MACs who can no longer connect to the VPN - track.log looks like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;[ 688 0x201c99e00][31 Aug 16:16:38][talkssl] talkssl::client_handler: start ssl negotaition&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;[ 688 0x201c99e00][31 Aug 16:16:38][talkssl] talkssl::client_handler: start openSSL negotaition&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;[ 688 0x201c99e00][31 Aug 16:16:38][] ckpSSL_PrepareConnection: verify mode: 0&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;[ 688 0x201c99e00][31 Aug 16:16:38][] My SSL Ciphers:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;[ 688 0x201c99e00][31 Aug 16:16:38][] Cipher List:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;[ 688 0x201c99e00][31 Aug 16:16:38][] 0: AES128-SHA&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SSLv3 Kx=RSA&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Au=RSA&amp;nbsp; Enc=AES(128)&amp;nbsp; Mac=SHA1&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;[ 688 0x201c99e00][31 Aug 16:16:38][] 1: AES256-SHA&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SSLv3 Kx=RSA&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Au=RSA&amp;nbsp; Enc=AES(256)&amp;nbsp; Mac=SHA1&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;[ 688 0x201c99e00][31 Aug 16:16:38][] 2: RC4-MD5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SSLv3 Kx=RSA&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Au=RSA&amp;nbsp; Enc=RC4(128)&amp;nbsp; Mac=MD5&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;[ 688 0x201c99e00][31 Aug 16:16:38][talkssl] talkssl::client_handler: Returning OK!!!&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;[ 688 0x201c99e00][31 Aug 16:16:38][proxy_wrapper] ProxyWrapper::CloseProxyConn: Starting ...&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;[ 688 0x201c99e00][31 Aug 16:16:38][proxy_wrapper] ProxyWrapper::CancelConnect: Starting ...&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;[ 688 0x201c99e00][31 Aug 16:16:38][proxy_wrapper] ProxyWrapper::CancelConnect: Proxy connection is in init state. Cannot cancel connection&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;[ 688 0x201c99e00][31 Aug 16:16:38][] ckpSSL_NegotiateStep: current state = before/connect initialization&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;[ 688 0x201c99e00][31 Aug 16:16:38][] ckpSSL_NegotiateStep: should retry.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;[ 688 0x201c99e00][31 Aug 16:16:38][] ckpSSL_NegotiateStep: current state = SSLv2/v3 read server hello A&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;[ 688 0x201c99e00][31 Aug 16:16:38][] SSL e stack&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;[ 688 0x201c99e00][31 Aug 16:16:38][] 688:error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert handshake failure:s23_clnt.c:757&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Now the obvious question: why is the MAC Client only trying to connect using SSLv3 ? Surely Is this a left over from previous configs ? We tried deinstall/install but no success.&lt;/P&gt;&lt;P&gt;My cypher list is now:&lt;/P&gt;&lt;P&gt;TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256&lt;BR /&gt;TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384&lt;BR /&gt;TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256&lt;BR /&gt;TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256&lt;/P&gt;&lt;P&gt;Any help appreciated.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MG&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Aug 2021 15:03:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Trouble-with-the-MACs-after-hardening-Cypers-TLS-SSL/m-p/128468#M8105</guid>
      <dc:creator>MaxGutberletRM</dc:creator>
      <dc:date>2021-08-31T15:03:06Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble with the MACs after hardening Cypers/TLS/SSL</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Trouble-with-the-MACs-after-hardening-Cypers-TLS-SSL/m-p/128820#M8106</link>
      <description>&lt;P&gt;What precise client is connecting?&lt;BR /&gt;What precise version of it?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Sep 2021 22:53:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Trouble-with-the-MACs-after-hardening-Cypers-TLS-SSL/m-p/128820#M8106</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-09-06T22:53:43Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble with the MACs after hardening Cypers/TLS/SSL</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Trouble-with-the-MACs-after-hardening-Cypers-TLS-SSL/m-p/128831#M8107</link>
      <description>&lt;P&gt;Try by adding back&amp;nbsp;&lt;SPAN&gt;TLS_RSA_WITH_AES_128_CBC_SHA to comply with the minimum specifications of the TLS 1.2 RFC.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I had an issue where MAC's wouldn't connect and this solved it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;As your logs show, the MAC client is expecting at least these suites:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;TLS_RSA_WITH_AES_128_CBC_SHA&lt;BR /&gt;TLS_RSA_WITH_AES_256_CBC_SHA&lt;BR /&gt;TLS_RSA_WITH_RC4_128_MD5&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;But it should do with the AES ones.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Sep 2021 07:02:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Trouble-with-the-MACs-after-hardening-Cypers-TLS-SSL/m-p/128831#M8107</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2021-09-07T07:02:53Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble with the MACs after hardening Cypers/TLS/SSL</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Trouble-with-the-MACs-after-hardening-Cypers-TLS-SSL/m-p/128921#M8108</link>
      <description>&lt;P&gt;This ! I re-enabled the AES-256&amp;nbsp; ciphers and it worked How do we turn this into a feature Request "MAC Client should be able to connect without RSA based cipher algorithms" ?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 09:45:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Trouble-with-the-MACs-after-hardening-Cypers-TLS-SSL/m-p/128921#M8108</guid>
      <dc:creator>MaxGutberletRM</dc:creator>
      <dc:date>2021-09-08T09:45:54Z</dc:date>
    </item>
  </channel>
</rss>

