Tim, Kyle Danielson from TAC was able to capture debug on this...firewall clocks are right on, no apparent time issue.
From our support case:
Debugged WSTLSD to confirm if the issue is the same as the other one that was reported.
We were able to replicate the issue with WSTLSD debug.
The problem here is that the GW is getting a 'next update' that's in the past.
-This could be some problem with parsing on the gateway or with the response sent by the CA.
I wanted to debug again and get captures to confirm what the server is sending back, however the issue wouldn't replicate again. We'd have to figure out some way to clear the CPTLS cache for HTTPS inspection to force it.
There is alot of clutter around this case maybe obscuring the root cause. One thing I found is that content delivery networks do this thing called OCSP splicing where they get the OCSP answer and cache it - so if that were the issue it would be outside our organization and maybe CDN was failing to update OCSP answers and their cached answer was stale. ( I really put a lot of credit to this theory)
NOW another thing jumps out as I continue to query the database I found these System Alerts that started at 4:16 AM and continued until 5:00 PM on July 5th (the day all 443 traffic failed)
Internal error occurred, could not connect to "cws.checkpoint.com:80". Check proxy configuration on the gateway.
This is the AntiBot Blade with a High Threat System Alert.
What do you think about this as contributing to the foray?