Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
rmasprey
Contributor
Jump to solution

HTTPS Inspection issue

Hi All,

I have opened a case with checkpoint on Friday last week, still haven't got the issue resolved, so maybe somebody here can give me some ideas of where to look.

The client has a 3100 Appliance with Checkpoint management server and HTTPS inspection enabled. Management Server and Device both running version R81.10 and up to date.

Users have been experiencing issues logging into Teams, and in my testing I have had issues connecting to certain websites like office.com and even checkpoint.com. The https inspection certificate is deployed via GPO and it is installed on under Trusted Root Certificate Authority.

Testing with Chrome I get an error your connection is not private. You cannot visit www.checkpoint.com right now because the website uses HSTS. Network errors and attacks are usually temporary, so this page will probably work later.

I updated the Trusted Ca list and added the Https Inspection Certificate to the list under SmartDashboard and installed policy but that has not helped. 

https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut... 

I have resorted to bypassing all traffic in the HTTPS Inspection policy which is not ideal and then I can connect to checkpoint.com or office.com without any issues.

 

0 Kudos
2 Solutions

Accepted Solutions
rmasprey
Contributor

Thank you to everybody who took the time to respond to the issue I was experiencing. I did a remote session with checkpoint, the issue was resolved adding two Certificate Authorities that where missing to the Https Inspection Trusted CA.

ISRG Root X1

DigiCert Global Root G2

Once these where added I was able to connect to the office.com and checkpoint site without any issues.

missing certs.jpg

 

View solution in original post

(1)
Sorin_Gogean
Advisor

Hello @casgrain ,

Certificates can be imported into Checkpoint HTTPS Tools (you should have bumped into that if you were doing HTTPS Inspection) .

Untitled_A.pngUntitled-B.png


Thank you,

View solution in original post

0 Kudos
24 Replies
G_W_Albrecht
Legend
Legend

This is a StandAlone SMS / GW with https inspection enabled ? This is HW from 2016, so it might well be that R81.10 SMS & GW & https inspection is too much work - have a look in cpview to see the load history !

CCSE CCTE CCSM SMB Specialist
0 Kudos
rmasprey
Contributor

Thank you for your reply.  Yes it is StandAlone SMS / GW with HTTPS inspection enabled. Cpview looked okay from what I could tell.

Browsing office.com as my testing I noticed the bellow observations, the left image is with HTTPS inspection, the right is without.

office.com error.jpgoffice works.jpg

 

The custom HTTPS bypass rule does not appear to be working, I have added portal.office.com and office.com and it still inspects them. The financial services rule is working in that I could connect to banking sites with no issue.

I tried a local news website, and it connects fine, the certificate shows issued by and the name of the HTTPS inspection certificate "client.com"

I observe the following log in the Man Server:

detect.jpg

I have had a look at sk159872, which doesn't seem to give me any help, I updated the Trusted CA list on the smartdashboard with Checkpoint support yesterday. I have added the https inspection certificate to this list and it has not helped. I have observed a fair number of Microsoft URL's failing with Untrusted Certificate.

I am waiting for more feedback from Checkpoint as to what to check next.

 

0 Kudos
the_rock
Legend
Legend

I worked with customer who had very similar issue and it turned out to be certificate related, will have to see what exactly. Question...does same problem happen in EVERY browser, or just chrome?

0 Kudos
rmasprey
Contributor

I have tried it in edge and does a similar thing, the certificate has been in use since 2019. Issued to is the "domain.com" of the client. I wander if the name is causing issues, if I recall it was generated on the firewall when we setup HTTPS inspection.

.certificate.jpg

 

In edge I get the following warning but can choose to to still visit the site.

office.com.png

I upgraded the firewall to R81.10 on the 18 August, and 2 weeks later (2 September) I was notified of issues with staff connecting to teams. If it broke with the upgrade to R81.10 I would have expected to be notified much earlier as they have weekly Teams meetings.

0 Kudos
rmasprey
Contributor

Firefox showed the following information first on office.com

firefox office.com.png

When I go to a local news site I saw this warning checking the certificate and shows the verified by certificate name.

firefox error.jpg

The certificate issued is self issued from the firewall and was added by the administrator via GPO. I understand the basic concepts of how HTTPS inspection works, but I can't figure out which part of the process is failing causing the your connection is not secure warning.

Could certain websites like office.com or checkpoint.com  have extra security and warning the browser it is not getting a known certificate so this connection is insecure. The local news website doesn't have these added security features which is why it connects to the site and gives the warning as above when viewing the certificate details.

 

0 Kudos
the_rock
Legend
Legend

I saw with my customer it was the issue where SAN (subject alternative name) was missing in the cert, but may had not been exact same problem like what you are having. Question...when you compare the cert you see for one that works and one that does not, what is the difference?

0 Kudos
rmasprey
Contributor

@the_rockthank you for coming back to me. I will have a look at the certificates in more detail. Its weird that I can connect to some sites and the browser shows me the https certificate and it works but refuses to connect to Microsoft or Checkpoint websites.

Maybe I need to create a new certificate on the firewall and see if that solves the issue.

0 Kudos
the_rock
Legend
Legend

I get what @Wolfgang is saying, but I find it odd that it worked fine for some time and then stopped all of a sudden. I have a really nice lab with https inspection that it works using self signed cert from the firewall if you wish to have a look, happy to show you. I have windows 10 PC behind the fw and we can test any site you have issue with.

Let me know.

 

Andy

0 Kudos
rmasprey
Contributor

Hi Andy,

Thank you for your reply. I would be interested to see what the certificate info is in your lab with https inspection if you visit https://www.checkpoint.com/

When I go to checkpoint using Edge I get the bellow on the certificate info.  The issued by part is what is causing my issues I suspect. On other websites that work it shows the name of the certificate the firewall created.

checkpoint site.PNG

How it looks on my machine bypassing HTTPS inspection as I am not domain joined.

checkpoint working.PNG

Today I resorted to adding all the users who need to use Teams meetings to a bypass group we have as temporary fix.

0 Kudos
the_rock
Legend
Legend

I get exact same message for cert as your 2nd screenshot, but thats most likely because I am NOT inspecting the website, otherwise, if I were, I would get firewall cert.

Andy

rmasprey
Contributor

Thank you for this Andy. I have a HTTPS Custom Bypass list under No SSL inspection, which includes Health and Financial Services category. The groups appear to work as I can reach bank sites, the custom list is not working 100%. I added https://www.checkpoint.com/  but still can't get to the site with out a warning. Going to do some troubleshooting with this area.

 

0 Kudos
the_rock
Legend
Legend

Lets do remote, I would need to see why that happens.

0 Kudos
rmasprey
Contributor

Thank you for the reply Andy. Checkpoint had booked a support call for today and they resolved the issue.

0 Kudos
the_rock
Legend
Legend

What was the solution if you dont mind sharing? We always like to share the positive outcome, so it helps everyone else.

Andy

0 Kudos
Wolfgang
Authority
Authority

@rmasprey you wrote certificate from the firewall is self signed…

Does this mean you are using CheckPoints firewall management internal CA for HTTPS inspection?

If yes, you have to deploy this root CA certificate to your clients. If you have a look at the trusted chain on the client you should see the newly created certificate for the inspected website and all CAs up to the root CA.

0 Kudos
rmasprey
Contributor

Thank you for the reply @Wolfgang, yes it is a self signed certificate from the firewall and it is deployed to the workstations via a group policy. This has been working up until recently.

 

0 Kudos
rmasprey
Contributor

Thank you to everybody who took the time to respond to the issue I was experiencing. I did a remote session with checkpoint, the issue was resolved adding two Certificate Authorities that where missing to the Https Inspection Trusted CA.

ISRG Root X1

DigiCert Global Root G2

Once these where added I was able to connect to the office.com and checkpoint site without any issues.

missing certs.jpg

 

(1)
the_rock
Legend
Legend

Ah, makes sense. We had case with escalation about this in the past and were give some sort of script from R&D, but then were told not to run it as it could cause more issues, so client just added them manually. Glad it worked out!

0 Kudos
casgrain
Participant

How did you add those CAs to the list?

0 Kudos
Sorin_Gogean
Advisor

Hello @casgrain ,

Certificates can be imported into Checkpoint HTTPS Tools (you should have bumped into that if you were doing HTTPS Inspection) .

Untitled_A.pngUntitled-B.png


Thank you,

0 Kudos
dvsken1976
Explorer

This solved it for me thanks!

 

0 Kudos
SalomIdhogela
Participant

This resolved my issue, however I am unable to access www.cisco.com. I am getting the below error, please how you resolved yours.

"

Did Not Connect: Potential Security Issue

Firefox detected a potential security threat and did not continue to www.cisco.com because this website requires a secure connection.

What can you do about it?

www.cisco.com has a security policy called HTTP Strict Transport Security (HSTS), which means that Firefox can only connect to it securely. You can’t add an exception to visit this site.

The issue is most likely with the website, and there is nothing you can do to resolve it.

If you are on a corporate network or using antivirus software, you can reach out to the support teams for assistance. You can also notify the website’s administrator about the problem.'"

 

Regards,

Salom

0 Kudos
_Val_
Admin
Admin

This means FF is detecting that HTTPSi is substituting the certificate. Either double-check that FF is trusting Check Point HTTPSi root certificate or make an exception for cisco.com in HTTPSi policy

0 Kudos
_Val_
Admin
Admin

Also, look into sk106996

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    Tue 23 Apr 2024 @ 11:00 AM (EDT)

    East US: What's New in R82

    Thu 25 Apr 2024 @ 11:00 AM (SGT)

    APAC: CPX 2024 Recap

    Tue 30 Apr 2024 @ 03:00 PM (CDT)

    EMEA: CPX 2024 Recap

    Thu 02 May 2024 @ 11:00 AM (SGT)

    APAC: What's new in R82

    Tue 23 Apr 2024 @ 11:00 AM (EDT)

    East US: What's New in R82

    Thu 25 Apr 2024 @ 11:00 AM (SGT)

    APAC: CPX 2024 Recap

    Tue 30 Apr 2024 @ 03:00 PM (CDT)

    EMEA: CPX 2024 Recap

    Thu 02 May 2024 @ 11:00 AM (SGT)

    APAC: What's new in R82
    CheckMates Events