<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R80.20 missing basic/critical rootCA's is there any public CA bundle from checkpoint? in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/109703#M4801</link>
    <description>&lt;P&gt;This update resolves the issue with:&lt;BR /&gt;&lt;A href="https://wiki.squid-cache.org/" target="_blank"&gt;https://wiki.squid-cache.org/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Another one is:&lt;BR /&gt;&lt;A href="https://www.sefaria.org.il/" target="_blank"&gt;https://www.sefaria.org.il/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;which is missing the:&lt;BR /&gt;&lt;BR /&gt;DigiCert Baltimore Root&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;LI-CODE lang="c"&gt;# true|openssl s_client -showcerts -connect www.sefaria.org.il:443
CONNECTED(00000003)
depth=2 C = IE, O = Baltimore, OU = CyberTrust, CN = Baltimore CyberTrust Root
verify return:1
depth=1 C = US, O = "Cloudflare, Inc.", CN = Cloudflare Inc ECC CA-3
verify return:1
depth=0 C = US, ST = CA, L = San Francisco, O = "Cloudflare, Inc.", CN = sni.cloudflaressl.com
verify return:1
---
Certificate chain
 0 s:C = US, ST = CA, L = San Francisco, O = "Cloudflare, Inc.", CN = sni.cloudflaressl.com
   i:C = US, O = "Cloudflare, Inc.", CN = Cloudflare Inc ECC CA-3
-----BEGIN CERTIFICATE-----
MIIExjCCBG2gAwIBAgIQB+CHD8vdd+kG+1SK23EkJTAKBggqhkjOPQQDAjBKMQsw
CQYDVQQGEwJVUzEZMBcGA1UEChMQQ2xvdWRmbGFyZSwgSW5jLjEgMB4GA1UEAxMX
Q2xvdWRmbGFyZSBJbmMgRUNDIENBLTMwHhcNMjAwNzMwMDAwMDAwWhcNMjEwNzMw
MTIwMDAwWjBtMQswCQYDVQQGEwJVUzELMAkGA1UECBMCQ0ExFjAUBgNVBAcTDVNh
biBGcmFuY2lzY28xGTAXBgNVBAoTEENsb3VkZmxhcmUsIEluYy4xHjAcBgNVBAMT
FXNuaS5jbG91ZGZsYXJlc3NsLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA
BPiqegg/gbj42QMKwqiuQleDNc/5F3gZ8h5z7qzUf8yCRiPtR157Xq+Jmcxw5f3H
9Du3eTlkiPWjDRajnPqmkAyjggMQMIIDDDAfBgNVHSMEGDAWgBSlzjfq67B1DpRn
iLRF+tkkEIeWHzAdBgNVHQ4EFgQU0mL0OKunXhWSD0MAQ2pYGgougMMwQgYDVR0R
BDswOYIVc25pLmNsb3VkZmxhcmVzc2wuY29tgg5zZWZhcmlhLm9yZy5pbIIQKi5z
ZWZhcmlhLm9yZy5pbDAOBgNVHQ8BAf8EBAMCB4AwHQYDVR0lBBYwFAYIKwYBBQUH
AwEGCCsGAQUFBwMCMHsGA1UdHwR0MHIwN6A1oDOGMWh0dHA6Ly9jcmwzLmRpZ2lj
ZXJ0LmNvbS9DbG91ZGZsYXJlSW5jRUNDQ0EtMy5jcmwwN6A1oDOGMWh0dHA6Ly9j
cmw0LmRpZ2ljZXJ0LmNvbS9DbG91ZGZsYXJlSW5jRUNDQ0EtMy5jcmwwTAYDVR0g
BEUwQzA3BglghkgBhv1sAQEwKjAoBggrBgEFBQcCARYcaHR0cHM6Ly93d3cuZGln
aWNlcnQuY29tL0NQUzAIBgZngQwBAgIwdgYIKwYBBQUHAQEEajBoMCQGCCsGAQUF
BzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wQAYIKwYBBQUHMAKGNGh0dHA6
Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9DbG91ZGZsYXJlSW5jRUNDQ0EtMy5jcnQw
DAYDVR0TAQH/BAIwADCCAQQGCisGAQQB1nkCBAIEgfUEgfIA8AB2APZclC/RdzAi
FFQYCDCUVo7jTRMZM7/fDC8gC8xO8WTjAAABc5/v9osAAAQDAEcwRQIhAJJaJY8P
UsfDZ4pLwYyV6n07cx2eYfWpo1lhVHagzy5MAiA4RFwktErfCDmq05x3tdOL9mCU
IjHfcNOFMlChUq68cgB2AFzcQ5L+5qtFRLFemtRW5hA3+9X6R9yhc5SyXub2xw7K
AAABc5/v9sAAAAQDAEcwRQIgJVmnFuuk4VPK8+mYMVOahtDubRywV04JvpRatYl9
vTYCIQD4tIs4TyYrZDYb8PB3a+8y+hDrfHr00zLViVsark3L8jAKBggqhkjOPQQD
AgNHADBEAiBygUy7z4CoXOVBgGXWMXv3sCb6V+6F4gabw4ASYQrvHwIgaeBgH3Sj
llg8CgcIuHQ+INUnyDS8NUnBQgZFhpl2DcU=
-----END CERTIFICATE-----
 1 s:C = US, O = "Cloudflare, Inc.", CN = Cloudflare Inc ECC CA-3
   i:C = IE, O = Baltimore, OU = CyberTrust, CN = Baltimore CyberTrust Root
-----BEGIN CERTIFICATE-----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[root@mail-125 ~]# true|openssl s_client -showcerts -connect www.sefaria.org.il:443
CONNECTED(00000003)
depth=2 C = IE, O = Baltimore, OU = CyberTrust, CN = Baltimore CyberTrust Root
verify return:1
depth=1 C = US, O = "Cloudflare, Inc.", CN = Cloudflare Inc ECC CA-3
verify return:1
depth=0 C = US, ST = CA, L = San Francisco, O = "Cloudflare, Inc.", CN = sni.cloudflaressl.com
verify return:1
---
Certificate chain
 0 s:C = US, ST = CA, L = San Francisco, O = "Cloudflare, Inc.", CN = sni.cloudflaressl.com
   i:C = US, O = "Cloudflare, Inc.", CN = Cloudflare Inc ECC CA-3
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
 1 s:C = US, O = "Cloudflare, Inc.", CN = Cloudflare Inc ECC CA-3
   i:C = IE, O = Baltimore, OU = CyberTrust, CN = Baltimore CyberTrust Root
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
---
Server certificate
subject=C = US, ST = CA, L = San Francisco, O = "Cloudflare, Inc.", CN = sni.cloudflaressl.com

issuer=C = US, O = "Cloudflare, Inc.", CN = Cloudflare Inc ECC CA-3

---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: ECDSA
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 2517 bytes and written 396 bytes
Verification: OK
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Server public key is 256 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
DONE&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;Thanks,&lt;/P&gt;</description>
    <pubDate>Wed, 03 Feb 2021 15:14:53 GMT</pubDate>
    <dc:creator>elicro</dc:creator>
    <dc:date>2021-02-03T15:14:53Z</dc:date>
    <item>
      <title>R80.20 missing basic/critical rootCA's is there any public CA bundle from checkpoint?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108147#M4682</link>
      <description>&lt;P&gt;I have tried to access &lt;A href="https://www.clalit.co.il" target="_blank" rel="noopener"&gt;https://www.clalit.co.il&lt;/A&gt;&amp;nbsp;and from this it appears that the R80.20.20 is missing the basic RootCA certificates update.&lt;/P&gt;&lt;P&gt;For this specific domain the the relevant RootCA is:&lt;/P&gt;&lt;TABLE cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid-cell-inner "&gt;DigiCert Global Root G2&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid-cell-inner "&gt;DigiCert Global Root G2&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid-cell-inner "&gt;Fri Jan 1 14:00:00 2038&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the ones in the R80.20 are:&lt;/P&gt;&lt;TABLE cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid-cell-inner "&gt;&lt;SPAN class="x-livesearch-match"&gt;DigiCert&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;High Assurance EV Root CA&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid-cell-inner "&gt;&lt;SPAN class="x-livesearch-match"&gt;DigiCert&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;High Assurance EV Root CA&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid-cell-inner "&gt;11/10/2031 12:00:00 AM&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid-cell-inner "&gt;&lt;DIV class="cp cp-glyph-subject_sic_certificate cp-icon-default-color cp-image"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid-cell-inner "&gt;&lt;SPAN class="x-livesearch-match"&gt;DigiCert&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Global Root CA&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid-cell-inner "&gt;&lt;SPAN class="x-livesearch-match"&gt;DigiCert&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Global Root CA&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid-cell-inner "&gt;11/10/2031 12:00:00 AM&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid-cell-inner "&gt;&lt;DIV class="cp cp-glyph-subject_sic_certificate cp-icon-default-color cp-image"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid-cell-inner "&gt;&lt;SPAN class="x-livesearch-match"&gt;DigiCert&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Assured ID Root CA&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid-cell-inner "&gt;&lt;SPAN class="x-livesearch-match"&gt;DigiCert&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Assured ID Root CA&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid-cell-inner "&gt;11/10/2031 12:00:00 AM&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, is there a global bundle that CheckPoint supply or I need to download one from Firefox or Chrome or Windows?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Eliezer&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jan 2021 11:39:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108147#M4682</guid>
      <dc:creator>elicro</dc:creator>
      <dc:date>2021-01-19T11:39:59Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 missing basic/critical rootCA's is there any public CA bundle from checkpoint?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108150#M4683</link>
      <description>&lt;P&gt;In HTTPS inspection settings in SmartConsole there is Trusted CAs menu. Check if this certificate is listed and if not, you can download the predefined ca-bundle from CheckPoint using the Automatic update menu in the bottom. Otherwise you can upload it by yourself.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jan 2021 12:08:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108150#M4683</guid>
      <dc:creator>MartinTzvetanov</dc:creator>
      <dc:date>2021-01-19T12:08:18Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 missing basic/critical rootCA's is there any public CA bundle from checkpoint?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108153#M4684</link>
      <description>&lt;P&gt;I want to install the ca-bundle from CheckPoint since I do not have that automatic update menu.&lt;BR /&gt;If I had it I wouldn't ask...&lt;/P&gt;&lt;P&gt;Is there any specific place this ca-bundle can be downloaded from manually?&lt;/P&gt;&lt;P&gt;I can ... add trusted CA's however it's weird that an update to R80.20.20 doesn't contain these.&lt;BR /&gt;If the browser and the OS has this I assume that the NGFW 1530 should have it in the firmware upgrade.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jan 2021 12:26:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108153#M4684</guid>
      <dc:creator>elicro</dc:creator>
      <dc:date>2021-01-19T12:26:49Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 missing basic/critical rootCA's is there any public CA bundle from checkpoint?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108183#M4685</link>
      <description>&lt;P&gt;Just ask TAC in a quick chat !&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jan 2021 16:04:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108183#M4685</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2021-01-19T16:04:39Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 missing basic/critical rootCA's is there any public CA bundle from checkpoint?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108187#M4688</link>
      <description>&lt;P&gt;You wouldnt believe me what is their level of Chutzpa even if I would have qutoted their response in the chat.&lt;/P&gt;&lt;P&gt;And believe me I didn't wanted to write what i am writing here...&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jan 2021 16:27:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108187#M4688</guid>
      <dc:creator>elicro</dc:creator>
      <dc:date>2021-01-19T16:27:30Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 missing basic/critical rootCA's is there any public CA bundle from checkpoint?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108194#M4692</link>
      <description>&lt;P&gt;Please send me the SR in a private message.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jan 2021 17:22:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108194#M4692</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-01-19T17:22:32Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 missing basic/critical rootCA's is there any public CA bundle from checkpoint?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108238#M4700</link>
      <description>&lt;P&gt;The CA bundle is probably part of the firmware.&lt;BR /&gt;I doubt it can be updated outside of a firmware update or manually adding the&amp;nbsp;relevant missing CA keys manually here:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2021-01-19 at 11.53.45 AM.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/10272i3BF94D6FFE6E4698/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2021-01-19 at 11.53.45 AM.png" alt="Screen Shot 2021-01-19 at 11.53.45 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Having the CA bundle auto-update is most likely an RFE.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jan 2021 02:26:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108238#M4700</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-01-20T02:26:48Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 missing basic/critical rootCA's is there any public CA bundle from checkpoint?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108251#M4701</link>
      <description>&lt;P&gt;OK then, auto-update but I'm stuck with the device that cannot be auto-updated.&lt;/P&gt;&lt;P&gt;And the firmware currently doesn't contain these.&lt;/P&gt;&lt;P&gt;My most best solution to resolve this issue to allow traffic is to use Debian or RHEL or SLES or Firefox pem CA bundles in one file.&lt;BR /&gt;I would like to get a practical solution from TAC or R&amp;amp;D.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jan 2021 06:44:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108251#M4701</guid>
      <dc:creator>elicro</dc:creator>
      <dc:date>2021-01-20T06:44:39Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 missing basic/critical rootCA's is there any public CA bundle from checkpoint?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108305#M4711</link>
      <description>&lt;P&gt;OK So I have verified, CP wants a subscription and support contract to operate the device.&lt;BR /&gt;Not enough I have paid a really lot of money for the device and the support I need to pay monthly for extra something.&lt;/P&gt;&lt;P&gt;Sorry But it's too much investment and above my poor pocket, If someone wants my 1530 let me know.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jan 2021 14:05:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108305#M4711</guid>
      <dc:creator>elicro</dc:creator>
      <dc:date>2021-01-20T14:05:49Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 missing basic/critical rootCA's is there any public CA bundle from checkpoint?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108306#M4712</link>
      <description>&lt;P&gt;There is no such thing as a free lunch 8)&lt;/img&gt; Subscription and Support are needed for any CP product, so your sales contact should have told you so when you bought it. If not, you could ask for your money back, anyway...&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jan 2021 14:14:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108306#M4712</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2021-01-20T14:14:43Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 missing basic/critical rootCA's is there any public CA bundle from checkpoint?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108324#M4714</link>
      <description>&lt;P&gt;Going your own... so ..uh... could it be one of these? Should you do a firmware upgrade these will most likely get over written, but it sounds like you're in no danger of that.&lt;/P&gt;&lt;P&gt;[Expert@1500]# find / -name "*bundle*" | grep -v chroot&lt;BR /&gt;/pfrm2.0/opt/fw1/bin/ca-bundle.crt&lt;BR /&gt;/pfrm2.0/opt/fw1/database/ca_bundle.pem&lt;BR /&gt;/pfrm2.0/config1/fw1/conf/te_remote_gw_ca_bundle.pem&lt;BR /&gt;/pfrm2.0/config1/fw1/database/ca_bundle.pem&lt;BR /&gt;[Expert@1500]#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jan 2021 16:45:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108324#M4714</guid>
      <dc:creator>John_Fleming</dc:creator>
      <dc:date>2021-01-20T16:45:36Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 missing basic/critical rootCA's is there any public CA bundle from checkpoint?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108348#M4717</link>
      <description>&lt;P&gt;I'm curious what is the issue with simply adding the needed CA keys into the device as shown?&lt;BR /&gt;Have you actually tried it?&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jan 2021 22:54:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108348#M4717</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-01-20T22:54:16Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 missing basic/critical rootCA's is there any public CA bundle from checkpoint?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108359#M4719</link>
      <description>&lt;P&gt;First, I would have expected from an Israeli company to release a firmware with the 2021 relevant ca bundle and not 2016..&lt;/P&gt;&lt;P&gt;If you don't understand this then I cannot answer other questions.&lt;/P&gt;&lt;P&gt;We have a saying: לא תשנא אחיך בלבבך&lt;/P&gt;&lt;P&gt;it's ridiculously amazing to even ask me your question.&lt;/P&gt;&lt;P&gt;the number of updated ca's since 2016 is not something that should be left for any admin.&lt;/P&gt;&lt;P&gt;If checkpoint tech support do not understand the issue with this i assume the certificate blinds their eyes from the real world.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In what world MS windows version do not contain/include a ca bundle, do you think .gov.il domain will use such a product?&lt;/P&gt;&lt;P&gt;also let say they will, if they expect me to use such a product then they are missing something in their brain.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2021 04:22:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108359#M4719</guid>
      <dc:creator>elicro</dc:creator>
      <dc:date>2021-01-21T04:22:27Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 missing basic/critical rootCA's is there any public CA bundle from checkpoint?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108366#M4720</link>
      <description>&lt;P&gt;Thank you for bringing the issue to our attention, we appreciate the feedback.&lt;BR /&gt;I feel pretty confident this will be addressed in a future firmware build.&lt;BR /&gt;I’ll check if there is a different workaround in the meantime.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2021 06:54:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108366#M4720</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-01-21T06:54:34Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 missing basic/critical rootCA's is there any public CA bundle from checkpoint?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108669#M4742</link>
      <description>&lt;P&gt;I tried to reburn he image and it seems that the list of certificates was updated.&lt;BR /&gt;It's a bit weird for me that this was the only solution I had tried and worked.&lt;/P&gt;</description>
      <pubDate>Sun, 24 Jan 2021 16:14:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108669#M4742</guid>
      <dc:creator>elicro</dc:creator>
      <dc:date>2021-01-24T16:14:52Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 missing basic/critical rootCA's is there any public CA bundle from checkpoint?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108725#M4744</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;
&lt;P&gt;CA list gets frequently updates, and actually, was just updated in our last release, so the issue was not an outdated CA list, but an issue in the upgrade code.&lt;/P&gt;
&lt;P&gt;clean install get the list updated, and thanks to your feedback, the issue in the upgrade code is now fixes - so CA list gets updated also in upgrade.&lt;/P&gt;
&lt;P&gt;will be release soon as GA. for those who needs it now, you can contact support.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jan 2021 08:03:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/108725#M4744</guid>
      <dc:creator>Amir_Ayalon</dc:creator>
      <dc:date>2021-01-25T08:03:41Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 missing basic/critical rootCA's is there any public CA bundle from checkpoint?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/109585#M4789</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/20406"&gt;@Amir_Ayalon&lt;/a&gt;Just to verify, I have checked what have changed and it seems that the Root CA which Lets Encrypt is using was changed in the last month or more.&lt;/P&gt;&lt;P&gt;Due to this every site which updated the certificate was un-reachable.&lt;/P&gt;&lt;P&gt;It includes many many sites behind sni.cloudflare.com&lt;/P&gt;&lt;P&gt;For example:&lt;BR /&gt;&lt;A href="https://www.sefaria.org.il/" target="_blank"&gt;https://www.sefaria.org.il/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Feb 2021 16:30:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/109585#M4789</guid>
      <dc:creator>elicro</dc:creator>
      <dc:date>2021-02-02T16:30:51Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 missing basic/critical rootCA's is there any public CA bundle from checkpoint?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/109647#M4793</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi Elicro,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;not sure i understand what you meant.&lt;/P&gt;
&lt;P&gt;have you used clean install and still experience an issue ?&lt;/P&gt;
&lt;P&gt;(BTW, an official R80.20.20 firmware with some important fixes (including this), will be released today)&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 09:48:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/109647#M4793</guid>
      <dc:creator>Amir_Ayalon</dc:creator>
      <dc:date>2021-02-03T09:48:11Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 missing basic/critical rootCA's is there any public CA bundle from checkpoint?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/109648#M4794</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/20406"&gt;@Amir_Ayalon&lt;/a&gt;&amp;nbsp; Please explain which clean install you are thinking of - including reset to factory settings ?&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 10:01:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/109648#M4794</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2021-02-03T10:01:00Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 missing basic/critical rootCA's is there any public CA bundle from checkpoint?</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/109663#M4795</link>
      <description>&lt;P&gt;For a new SMB image this would be via USB I expect.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 11:18:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/R80-20-missing-basic-critical-rootCA-s-is-there-any-public-CA/m-p/109663#M4795</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2021-02-03T11:18:32Z</dc:date>
    </item>
  </channel>
</rss>

