- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Hello all,
for the past few days (especially on government websites) we have been experiencing problems with web browsing. The error shown in the logs is the following:"
Certificate chain is inconsistent. Refer to sk159872 for more details.
Certificate DN: 'CN=*.fondimpresa.it,O=FONDIMPRESA,ST=Roma,C=IT' Requested Server Name: pf.fondimpresa.it.
Unhandled critical extension. Refer to sk159872 for more details.
Certificate DN: 'CN=domiciliodigitale.gov.it,O=Agenzia per l'Italia Digitale,L=Roma,ST=Roma,C=IT' Requested Server Name: domiciliodigitale.gov.it.
HTTPS isp option:
Public root certificates are present.
Can someone help me understand the reason and help me resolve the issue?
Many thanks,
Alessandro
Hey Alessandro,
Did you try bypassing any of those sites as a test?
Yes, I tried to bypass HTTPS inspection and everything works.
Have you installed the CRL fix released this week? sk184766
Yes do this first, it's what resolved the issue for me.
Only now I’ve noticed that a popup appeared in SmartConsole mentioning a CRL validation issue.
I’ll try updating the system and will give you feedback.
Thank you
I tried installing the fix, but it seems the problem hasn’t been resolved.
Did you install it on both management and gateways?
No, I've installed the fix only on the management server. Our gateways are running version R81.20, and there is no fix available for these appliances in the KB.
Hmm, ok, in my case it's R82 gateways and R82.10 SMS.
Try running 'cpca_client recreate_crls' on the management server. When I did this I didn't have any interruption to anything so it seems to be safe.
This website uses incomplete cert chain, see SSL labs results:
https://www.ssllabs.com/ssltest/analyze.html?d=pf.fondimpresa.it&hideResults=on
You need to add the missing inter certs in your server config. So add full chain all but not the root cert! Then you get anchor issues in ssllabs.
If you do not manage this website try to add the missing certs into the cp same as you update the CA list.
https://support.checkpoint.com/results/sk/sk64521
Before doing that, I will install the CRL fix released this week, as suggested by @the_rock.
If this fix does not resolve the issue I will try to follow the steps you suggested.
Thank you!
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 25 | |
| 12 | |
| 11 | |
| 8 | |
| 7 | |
| 7 | |
| 6 | |
| 6 | |
| 6 | |
| 6 |
Tue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceWed 13 May 2026 @ 11:00 AM (EDT)
TechTalk: The State of Ransomware Q1 2026: Key Trends and Their ImpactThu 14 May 2026 @ 07:00 PM (EEST)
Under the Hood: Presentando Check Point Cloud Firewall como ServicioTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY