Got it, thank you Dameon.
So, it's a product design flaw and I'll never be able to explain my stakeholders why Checkpoint is damaging our business relationships.
TAC is all fun and games, but in the real world no one has the time to go on a four day "investigation" on every message that bounces back in error.
I've opened a case with TAC two days ago and still have no answer. That's why I came here.
Meanwhile we had to work with our business partners on a trial-and-error process and found out what the problem was (it is in the header of this post).
Told TAC our conclusions.
Still no answer.
This is a déjà-vu. Last year we had to stop using TLS because Checkpoint doesn't know how to properly handle encryption.
Guess I'll go back to Fortinet. They also have a lousy product and support but at least verbosely tell me why.
EDIT: Truth be told, that was an idle threat, a simple quirk. Our investment on Checkpoint isn't fully amortized and it would be absurd to change path or manufacturer 9 months after. Throughout the years I've used several different providers and honestly these kind of problems are pervasive on the industry. Most of the times these security products world well or uneventfully but from time to time we get stuck on unanswered quests. Sincerily I was hoping Checkpoint would be different, for some reason.
With my past experiences most of the problems were about threats not being detected. Can't have it all, I guess