We have a new installation of server 2019 standard (which is a fileserver and domain controller) with Sophos Enterprise Console.
As a starting point we have created a GPO to make sure all client computers have the required services turned on and ports open in the firewall. The clients already had Sophos installed (the old Sophos Enterprise Console server has been retired). All clients were migrated to the new domain. Using the Enterprise Console on the new server we re-deployed Sophos to all clients. This is succesfull and I checked that the clients are getting their updates from the new server. For some of these clients I also tried installing Sophos manually (from \\SERVERNAME\SophosUpdate\CIDs\S000\SAVSCFXP) , this works without issues.
However the only client that is reporting it's status back to the Enterprise Console is the local Sophos agent installed on the server itself. Even after turning off the firewall, server reboots etc.
When looking at the client the router shows the following errors in the log (trace logging is enabled);
C:\ProgramData\Sophos\Remote Management System\3\Router\Logs
30.06.2019 12:34:25 1B00 I SOF: C:\ProgramData/Sophos/Remote Management System/3/Router/Logs/Router-20190630-103425.log 30.06.2019 12:34:25 1B00 I Sophos Messaging Router 4.1.1.127 starting... 30.06.2019 12:34:25 1B00 I Setting ACE_FD_SETSIZE to 138 30.06.2019 12:34:25 1B00 I Initializing CORBA... 30.06.2019 12:34:25 1B00 I Connection cache limit is 10 30.06.2019 12:34:26 1B00 D New context options = 1000004 30.06.2019 12:34:26 1B00 I Router::ConfigureSslContext: keeping legacy compatibility of TLS 1 and TLS 1.1. 30.06.2019 12:34:26 1B00 T IPAddressSet::InitialiseWithHost() called 30.06.2019 12:34:26 1B00 T Added host network address:192.168.178.57:0 30.06.2019 12:34:26 1B00 T Added host network address:127.0.0.1:0 30.06.2019 12:34:26 1B00 T IPAddressSet::InitialiseWithHost() returns 30.06.2019 12:34:26 1B00 D Creating ORB... 30.06.2019 12:34:26 1B00 I Creating ORB runner with 4 threads 30.06.2019 12:34:26 2040 D RunORB thread started 30.06.2019 12:34:26 1B00 W No public key certificate found in the store. Requesting a new certificate. 30.06.2019 12:34:26 1B00 I Getting parent router IOR from 192.168.178.10:8192 30.06.2019 12:34:26 1B00 T >>> StatusReporting::StatusReporter::Done 30.06.2019 12:34:26 1B00 T DNS : problem 0, changed 1, already reported 0 30.06.2019 12:34:26 1B00 T Certification : problem 0, changed 1, already reported 0 30.06.2019 12:34:26 1B00 T Incoming : problem 0, changed 1, already reported 0 30.06.2019 12:34:26 1B00 T Outgoing : problem 0, changed 1, already reported 0 30.06.2019 12:34:26 1B00 D class StatusReporting::DNSSection changed 30.06.2019 12:34:26 1B00 T >>> StatusReporting::StatusReporter::WriteReport 30.06.2019 12:34:26 216C D RunORB thread started 30.06.2019 12:34:26 1AEC D RunORB thread started 30.06.2019 12:34:26 097C D RunORB thread started 30.06.2019 12:34:26 1B00 I This computer is part of the domain OFFICE 30.06.2019 12:34:26 1B00 T >>> StatusReporting::StatusReporter::WriteAsXML 30.06.2019 12:34:26 1B00 T >>> StatusReporting::DNSSection::WriteAsXML 30.06.2019 12:34:26 1B00 T <<< StatusReporting::DNSSection::WriteAsXML 30.06.2019 12:34:26 1B00 T >>> StatusReporting::CertificationSection::WriteAsXML 30.06.2019 12:34:26 1B00 T <<< StatusReporting::CertificationSection::WriteAsXML 30.06.2019 12:34:26 1B00 T >>> StatusReporting::IncomingSection::WriteAsXML 30.06.2019 12:34:26 1B00 T <<< StatusReporting::IncomingSection::WriteAsXML 30.06.2019 12:34:26 1B00 T >>> StatusReporting::OutgoingSection::WriteAsXML 30.06.2019 12:34:26 1B00 T <<< StatusReporting::OutgoingSection::WriteAsXML 30.06.2019 12:34:26 1B00 T <<< StatusReporting::StatusReporter::WriteAsXML 30.06.2019 12:34:26 1B00 T <<< StatusReporting::StatusReporter::WriteReport 30.06.2019 12:34:26 1B00 T <<< StatusReporting::StatusReporter::Done 30.06.2019 12:34:26 1B00 T >>> StatusReporting::StatusReporter::SetActualParent 30.06.2019 12:34:26 1B00 D Actual parent is `192.168.178.10` 30.06.2019 12:34:26 1B00 T <<< StatusReporting::StatusReporter::SetActualParent 30.06.2019 12:34:26 1B00 T >>> StatusReporting::StatusReporter::Done 30.06.2019 12:34:26 1B00 T DNS : problem 0, changed 0, already reported 0 30.06.2019 12:34:26 1B00 T Certification : problem 0, changed 0, already reported 0 30.06.2019 12:34:26 1B00 T Incoming : problem 0, changed 0, already reported 0 30.06.2019 12:34:26 1B00 T Outgoing : problem 0, changed 0, already reported 0 30.06.2019 12:34:26 1B00 T <<< StatusReporting::StatusReporter::Done 30.06.2019 12:34:26 1B00 T >>> StatusReporting::StatusReporter::Done 30.06.2019 12:34:26 1B00 T DNS : problem 0, changed 0, already reported 0 30.06.2019 12:34:26 1B00 T Certification : problem 0, changed 0, already reported 0 30.06.2019 12:34:26 1B00 T Incoming : problem 0, changed 0, already reported 0 30.06.2019 12:34:26 1B00 T Outgoing : problem 0, changed 0, already reported 0 30.06.2019 12:34:26 1B00 T <<< StatusReporting::StatusReporter::Done 30.06.2019 12:34:26 1B00 I Getting a new router certificate... 30.06.2019 12:34:26 1B00 D Getting the parent message router object using IOR IOR:010000002600000049444c3a536f70686f734d6573736167696e672f4d657373616765526f757465723a312e300000000100000000000000a0000000010102000a0000003132372e302e302e310001204100000014010f004e5550000000210000000001000000526f6f74504f4100526f7574657250657273697374656e740003000000010000004d657373616765526f7574657200000003000000000000000800000001008600004f4154010000001800000001008600010001000100000001000105090101000000000014000000080000000100a60086000220 30.06.2019 12:34:26 1B00 D Getting the certification object... 30.06.2019 12:34:28 1B00 E Router::GetCertificate: Caught CORBA system exception, ID 'IDL:omg.org/CORBA/TRANSIENT:1.0' OMG minor code (2), described as '*unknown description*', completed = NO 30.06.2019 12:34:28 1B00 W Failed to get certificate, retrying in 600 seconds
So Sophos appears to have difficulties with the certificate. However when I connect OpenSSL with the CAC.pem cert it verifies ok:
C:\Program Files\OpenSSL-Win64\bin>openssl.exe s_client -connect 192.168.178.10: 8194 -CApath . -CAfile cac.pem CONNECTED(000000DC) Can't use SSL_get_servername depth=1 CN = EM2_CA verify return:1 depth=0 CN = Router$GM-DC verify return:1 --- Certificate chain 0 s:CN = Router$GM-DC i:CN = EM2_CA 1 s:CN = EM2_CA i:CN = EM2_CA --- Server certificate -----BEGIN CERTIFICATE----- MIIDIjCCAgqgAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDDAZFTTJf Q0EwHhcNMTkwNTE1MDgzODM5WhcNMzkwNTExMDgzODM5WjAXMRUwEwYDVQQDDAxS b3V0ZXIkR00tREMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDIkf7f d6rJwj/9R+//Q8Axr55vtDsqCF8ugr9agWid2+wgiPhK/rz5diA/Q2/X9ulgwKro LXTJjgAToTiJ3npvMERBcaGZC03Nxyai3tLgjmPiMhilKMhm8MUvH5/SEQIqW/uC EfVjYhHddF39iHUUtAHhxiUlkSl69tvfF1o2574Qsy90XDPc6Z8+vMbqRpjk8tOU 1NsK3mwSaCogSOfXEi75Q7ylupNnaD9YVcZR5ldoKgKwgTlh5h8Dbfqyc1gjSZV6 13t2B8+0VpjYj5rkA3r1U3wrvfcy2XxcxjEb0geFt6flg1BmRcOj1i6/NgDBRw6r UAf+d2UJ80SKtUqZAgMBAAGjfzB9MB0GA1UdDgQWBBRh6uuiv9XHef16Sl4zgEml +u2cyjA5BgNVHSMEMjAwgBQAmTl0k2AaQlvQE8lzwEsFqQKRuaEVpBMwETEPMA0G A1UEAwwGRU0yX0NBggEBMAkGA1UdEwQCMAAwDgYDVR0PAQH/BAQDAgWgMAYGAncB BAAwDQYJKoZIhvcNAQELBQADggEBACOi0ug9ZTpanb2fR49g8I3coWNxKrAF8c9w BRs5sXRUb3rfSZGwzUBNqA0stI3KAuTm+Oy5YVg/mog+kCo3q9b6R+RhR2ZO+Prp dIaPuLVyGkBw9OtMPiESj7BH169aUOvzcMaI821nf932lP6/FOEW0STWOJ5odJLX 6rdSM7rSrTQM4Rz2LHt/Dp5vCpwuVqAIwAzWv60nbWKn9cSUlkHoplE06Iez1/7F /NXkQeWMyzi6suRzP2ZXhiIYZ3PT36vbIbmUs3Cn9FRLP3eNamhSK2koIUMzdgII BY1AsBEqdEuOkR9cie4cTXTmckgZPNJChP1XpyoHZ0IjvkJdof8= -----END CERTIFICATE----- subject=CN = Router$GM-DC issuer=CN = EM2_CA --- Acceptable client certificate CA names CN = EM2_CA Client Certificate Types: RSA sign, DSA sign, ECDSA sign Requested Signature Algorithms: RSA+SHA512:DSA+SHA512:ECDSA+SHA512:RSA+SHA384:DS A+SHA384:ECDSA+SHA384:RSA+SHA256:DSA+SHA256:ECDSA+SHA256:RSA+SHA224:DSA+SHA224:E CDSA+SHA224:RSA+SHA1:DSA+SHA1:ECDSA+SHA1 Shared Requested Signature Algorithms: RSA+SHA512:DSA+SHA512:ECDSA+SHA512:RSA+SH A384:DSA+SHA384:ECDSA+SHA384:RSA+SHA256:DSA+SHA256:ECDSA+SHA256:RSA+SHA224:DSA+S HA224:ECDSA+SHA224:RSA+SHA1:DSA+SHA1:ECDSA+SHA1 --- SSL handshake has read 2007 bytes and written 623 bytes Verification: OK --- New, TLSv1.2, Cipher is AES256-GCM-SHA384 Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : AES256-GCM-SHA384 Session-ID: 16AD306CC7F2A9A5B7DF37713A9F38B78FB55EC97E4B92E64FE4D24AC6ACA6BF Session-ID-ctx: Master-Key: 097AF2105E22941C524B6B10994A6BE19C9339DECB83B6FE11669DBF075431A6 452AC15A2D4A4734AC9017746EF07AAC PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 300 (seconds) TLS session ticket: 0000 - 23 af 01 f6 34 5e e9 d0-eb 4a a2 16 3c b9 b2 a7 #...4^...J..<... 0010 - ff 3d c2 0c 97 59 0d d2-5c 94 25 80 8b 1a 60 72 .=...Y..\.%...`r 0020 - d6 b8 9e 5c 86 09 84 e2-54 36 ed 8c 64 5d e8 9d ...\....T6..d].. 0030 - cc 98 0f 7b 92 39 93 29-0e 98 7d 80 df 09 1e 41 ...{.9.)..}....A 0040 - 63 b3 7d 71 b1 ae 60 60-85 55 6a ee a1 18 e3 ce c.}q..``.Uj..... 0050 - b0 7e f6 f5 37 51 cd 37-6d 09 55 d3 02 07 82 2d .~..7Q.7m.U....- 0060 - 4c 09 f1 88 32 fc 59 0f-df d9 b8 31 54 25 ad 8f L...2.Y....1T%.. 0070 - 4d 2d d1 61 5c 2a 3b da-61 c0 93 af 6a 1f 3e 5a M-.a\*;.a...j.>Z 0080 - 90 d3 9b 61 26 5e a2 7a-d6 d3 73 e2 b2 4e 3e ea ...a&^.z..s..N>. 0090 - b6 4c 1b fe c0 4b 54 38-c9 ec 8e a9 b9 40 35 26 .L...KT8.....@5& 00a0 - d3 2e 44 a9 da 13 5a 7d-60 4c eb 0e 77 90 3f e8 ..D...Z}`L..w.?. 00b0 - 7a f9 18 60 8f 86 78 fa-51 fc 85 39 61 cd ea ed z..`..x.Q..9a... Start Time: 1561884633 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no
Also I tried telnetting to the server this shows the IOR however I found no way to decode this;
IOR:010000002600000049444c3a536f70686f734d6573736167696e672f4d657373616765526f75 7465723a312e300000000100000000000000a0000000010102000a0000003132372e302e302e3100 01204100000014010f004e5550000000210000000001000000526f6f74504f4100526f7574657250 657273697374656e740003000000010000004d657373616765526f75746572000000030000000000 0000080000000100f001004f415401000000180000000100f0010100010001000000010001050901 01000000000014000000080000000100a60086000220
The CertManager on the Sophos Enterprise Console server shows no entries in the current log which is strange because 20 clients are constantly trying to connect...
<pre>
30.06.2019 11:21:25 089C I SOF: C:\ProgramData/Sophos/Remote Management System/3/CertificationManager/Logs/CertManager-20190630-092125.log
30.06.2019 11:21:25 089C I [CertMgr]Certification Manager starting...
30.06.2019 11:21:25 089C I [CertMgr]Certification Manager started
30.06.2019 11:21:26 089C I [CertMgr]Enabling request processing
30.06.2019 11:21:26 0C0C I InitialiseClientLibraryLocal CM, SOFTWARE\Sophos\Certification Manager\MessengerStore, CMConfig.reg, 0, ...
30.06.2019 11:21:26 0C0C I Initializing ...
30.06.2019 11:21:26 0C0C I [Msgr:RM]Logged on to Message Router
</pre>
Any thoughts how to solve this? I have been staring at it for quite some time now but unable to fix it...any help is very much appreciated!
This thread was automatically locked due to age.