Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

TLS Inspection | OCSP / CRL | Not blocking websites with revoked certificates

Hi everyone,

I'm enforcing my TLS inspection rules to more strict and secure with best practices. So my Decryption Profile:


Using https://badssl.com/ for tests scenarios I had success in almost all practices:

invalid date White check markworking as expected
self-signed White check markworking as expected
untrusted issuer White check markworking as expected
revoked Negative squared cross mark opened site / should block
name mismatch White check markworking as expected
invalid for other reasons

Warning NOK for pinning-test (HPKP)

Warning NOK for DH small group (

CVE-2016-0701)

Warning NOK for DH over composite group

Revoked certificates aren't blocked as desired and good practice in other technologies.

Samples:

https://www.ssl.com/sample-valid-revoked-and-expired-ssl-tls-certificates/  (https://revoked-rsa-dv.ssl.com/)

https://badssl.com/ (https://revoked.badssl.com/)

Ref documents:

https://docs.sophos.com/nsg/sophos-firewall/20.0/Help/en-us/webhelp/onlinehelp/AdministratorHelp/Profiles/DecryptionProfiles/ProfilesDecryptionProfileAdd/index.html

Untrusted user - Revoked: You must import a certificate revocation list (CRL) for this feature to work.

Also a old document from UTM:

https://community.sophos.com/utm-firewall/f/web-protection-web-filtering-application-visibility-control/46318/security-bug-no-revocation-checking-when-performing-https-inspection

I don't think is feasible create CRLs just for firewalls , since OCSP was created to solve this problem.

So OCSP isn't working by default? Is there any plan to cover this?



This thread was automatically locked due to age.