- Products
- Learn
- Local User Groups
- Partners
- More
Policy Insights and Policy Auditor in Action
19 November @ 5pm CET / 11am ET
Access Control and Threat Prevention Best Practices
Watch HereOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi,
about 10 months ago I've set up Identity Awareness in our production environment, which worked like a charm since about a week or two ago. Now I'm faced with an SSL handshake error that doesn't make any sense to me. The symptoms are absolutely identical to what I found in sk167159 (including the DEBUG logs). Sadly there is no solution at the end of the article, that is anywhere useful.
Also important: I don't use #Quantum Security Management but the common virtual management based on Gaia.
Did someone of you encounter this ever before, or does know what to do?
What I've already tried:
What also makes this weird:
Any help is appreciated.
Best regards,
Daniel
Logs ($FWDIR/log/cpm.elg😞
26/04/21 14:31:16,203 DEBUG internal.wrappers.LdapConnectionWrapper [qtp1192021461-72]: Constructing LDAPConnection.
26/04/21 14:31:16,203 DEBUG internal.wrappers.SslLdapConnectionWrapper [qtp1192021461-72]: Connection timeout(in seconds): '30'.
26/04/21 14:31:16,203 DEBUG internal.wrappers.SslLdapConnectionWrapper [qtp1192021461-72]: Trying to create the SSL Socket factory(have different behaviour depending on the JRE vendor).
26/04/21 14:31:16,203 DEBUG internal.wrappers.SslLdapConnectionWrapper [qtp1192021461-72]: Checking if environment variable 'PROPERTY_DEFAULT_SSL_PROTOCOL' defined and not empty.
26/04/21 14:31:16,203 DEBUG internal.wrappers.SslLdapConnectionWrapper [qtp1192021461-72]: Environment variable 'PROPERTY_DEFAULT_SSL_PROTOCOL' is not defined.
26/04/21 14:31:16,203 DEBUG internal.wrappers.SslLdapConnectionWrapper [qtp1192021461-72]: Creating first SSL socket factory with protocol: 'SSL_TLSv2'.
26/04/21 14:31:16,227 DEBUG internal.wrappers.LdapConnectionWrapper [qtp1192021461-72]: Got result code different from 'ResultCode.SERVER_DOWN(81)', not reconnecting.
26/04/21 14:31:16,228 DEBUG internal.wrappers.SslLdapConnectionWrapper [qtp1192021461-72]: Connect error(CONNECT_ERROR), checking if SSL connectivity(I/O) or certificate problem.
26/04/21 14:31:16,228 DEBUG internal.wrappers.SslLdapConnectionWrapper [qtp1192021461-72]: Checking if the error is SSLException error.
26/04/21 14:31:16,228 DEBUG internal.wrappers.SslLdapConnectionWrapper [qtp1192021461-72]: Error is SSL error, checking if it's SSL handshake error.
26/04/21 14:31:16,228 DEBUG internal.wrappers.SslLdapConnectionWrapper [qtp1192021461-72]: Error is SSL handshake error, checking if it's SSL certificate error.
26/04/21 14:31:16,228 DEBUG internal.wrappers.SslLdapConnectionWrapper [qtp1192021461-72]: Error is SSL certificate error, checking if it's framework certificate error or ckp error.
26/04/21 14:31:16,228 DEBUG internal.wrappers.SslLdapConnectionWrapper [qtp1192021461-72]: Error is ckp certificate error, forward it to the client.
26/04/21 14:31:19,284 DEBUG internal.wrappers.LdapConnectionWrapper [qtp1192021461-204]: Connection not exist, trying to connect.
26/04/21 14:31:19,284 DEBUG internal.wrappers.LdapConnectionWrapper [qtp1192021461-204]: Trying to connect to the directory according to: com.checkpoint.objects.ldap.connection.internal.properties.QueryAdConnectionDetails {Domain Name='*******', Connection Key='*******', Connection Info list='[]', Directory ID='*******', Username='svccheckpointldap', User DN='CN=*******,OU=Service Accounts,DC=*******', Password='*******', Bind DN='DC=*******', Server name / FQDN='*******', Server IPv4='172.*******', Server IPv6='', Server Uid='*******', Port='636', Use ssl='true', Ui fetch profile ID='*******', Object domain ID='*******', Branches list='[DC=*******]'}.
Best is to take this to TAC
Can you post the output of
echo | openssl s_client -connect 172.16.1.1:636 | openssl x509 -noout -text | grep "Signature Algorithm"
where 172.16.1.1 is your LDAP server ip (redacted in your debug output)? Has to be done from a machine which can reach the LDAP server of course. If you are using GAIA for that, use cpopenssl instead of openssl.
Then we can see if it is really the issue from sk167159.
Hi,
your reply melped me to understand the issue - i was thinking the client configuration is the issue. Our LDAP-Server uses SHA256 so it is in fact a different issue.
I will follow Val's recommendation and open a case.
Best regards and thanks for your effort
-- Daniel
Hi,
what was the solution to this issue? Our customer is having the same issue with r80.40.
Thank you
Hi GrassF,
actually i'm not 100% sure. Our issue grew to an almost full failure of AD integration, which we were able to solve by re-fetching the fingerprints of all Domain Controllers in the related LDAP Account Units (Object Browser -> Servers -> ...).
In the end I was angry about myself because this is kind of obvious and is also stated in the Administrators Guide.
-- Daniel
PS: This ended up as a yearly reminder in my calendar 🙂
@Daniel_Ranft can you elaborate a bit? I think that would help the community to have a more detailed description of the resolution steps
sure...
First of all: This only applies if your domain controllers use LDAPS (LDAP + SSL via Port 636).
Typically the domain controller SSL certificates used for LDAPS are valid for a year. These certificates are used to establish a trust relationship to the Check Point environment.
If these certificates expire and are renewed (most likely without interaction), your firewalls need to know the new fingerprint of the certificates. This is a manual process, that is done for every domain controller.
As mentioned before, you do this in the related LDAP Account Unit object in the Servers tab. For all servers you hit Edit, switch to the Encryption tab and click on "Fetch" next to the old fingerprint. If the fingerprint changes and you install the policy, this might solve all your issues (hopefully).
Thank you, @Daniel_Ranft
Hi Daniel,
thank you for the quick answer. Issue solved 🙂
Thank you
On sk167159, I may have a customer with this issue. What did you find as a solution for this? sk167159 seems to just give you a general brush off and points finger at IBM. How is a customer supposed to deal with that?
Any information you can provide on the topic would be useful.
Thanks
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 25 | |
| 14 | |
| 13 | |
| 10 | |
| 6 | |
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 3 |
Wed 19 Nov 2025 @ 11:00 AM (EST)
TechTalk: Improve Your Security Posture with Threat Prevention and Policy InsightsThu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERThu 20 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 19 Nov 2025 @ 11:00 AM (EST)
TechTalk: Improve Your Security Posture with Threat Prevention and Policy InsightsThu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERThu 20 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY