In this case thepiratebay.com had to return a certificate that is valid for this domain, which the gateway should be able to inspect.
I checked a site I knew used CloudFlare and when checking the certificate the CN=sni136990.cloudflaressl.com, but the real domain name was in the subjectAltName property that Check Point do not inspect. Why I don't know
I recently did some tests to test the URLF/AppCtrl without using HTTPS inspection, and only relying on HTTPS categorization. Here are the limitations I found.
Allowing a custom site: www.amazon.com
Visit URL: https://www.amazon.com
Certificate CN=www.amazon.com
Status: works
Allowing a custom site: www.google.se
Visit URL: https://www.google.se
Certificate CN=*.google.se
Status: does not work. Check point translates a CN=*.google.se -> https://google.se
This means that I need to allow a custom site with name "google.se" to get this to work
From a debug we can see this behaviour
;27Feb2018
12
:
47
:
55.399003
;[cpu_2];[fw4_2];
1519735675
:{policy,urlf_ssl} appi_rad_uf_cmi_handler_match_cb: call appi_user_cmi_handler_handle_url() with cn=
'google.se'
(
10
);
;27Feb2018
12
:
47
:
55.399005
;[cpu_2];[fw4_2];
1519735675
:{urlf_ssl} appi_user_cmi_handler_handle_url: url_https_normalized =
'https://google.se'
(
18
);
Allowing a custom site: www.youtube.com
Visit URL: https://www.youtube.com
Certificate CN=*.google.com (SubjectAltName=www.youtube.com and youtube.com)
Status: does not work. Check Point does not seem to read SubjectAltName from the certificate.
Right now there seem to be some limitations on what Check Point can do without SSL inspection. Anyone know any plans for them to support wildcard and multidomain certificates? I cannot see any technical reason not to like with SNI.