Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

TLS Inspection & Google Passkeys

I have TLS inspection setup on my main network running through a Sophos XG (20.0.2 MR-2) and am trying to setup Google Passkeys for G-Mail. 

The passkeys were setup using a different network connection, and they do work on another network. If I go through the G-Mail logon process it gets to the point of displaying the QR code which I scan on a mobile phone, at which point the browser give a "Something went wrong" error and G-Mail asks if I want to try again. 

If I turn TLS inspection off the logon process works using passkeys.

To get Passkey authentication working I suspect that I need to exclude one of the Google URLs from TLS inspection, but don't know which one. I don't want to exclude all Google services, including Gmail itself, from TLS - just the Passkey authentication process.

Has anyone got this working with TLS enabled?



Added TAGs
[edited by: Raphael Alganes at 9:52 AM (GMT -7) on 16 Oct 2024]
Parents
  • Hi  ,

    Thank you for reaching out to the community, under the web > exceptions add the following:

    ^([A-Za-z0-9.-]*\.)?accounts\.google\.com/

    ^([A-Za-z0-9.-]*\.)?apis\.google\.com/

    ^([A-Za-z0-9.-]*\.)?*\.client-channel\.google\.com/

    ^([A-Za-z0-9.-]*\.)?clients*\.google\.com/

    ^([A-Za-z0-9.-]*\.)?contacts\.google\.com/

    ^([A-Za-z0-9.-]*\.)?*\.googleusercontent\.com/

    ^([A-Za-z0-9.-]*\.)?mail\.google\.com/

    ^([A-Za-z0-9.-]*\.)?mail-attachment\.google\.com/

    ^([A-Za-z0-9.-]*\.)?ogs\.google\.com/

    ^([A-Za-z0-9.-]*\.)?play\.google\.com/

    ^([A-Za-z0-9.-]*\.)?ssl\.gstatic\.com/

    ^([A-Za-z0-9.-]*\.)?www\.google\.com/

    ^([A-Za-z0-9.-]*\.)?www\.gstatic\.com/

    Thanks & Regards,
    _______________________________________________________________

    Vivek Jagad | Team Lead, Global Support & Services 

    Log a Support Case | Sophos Service Guide
    Best Practices – Support Case


    Sophos Community | Product Documentation | Sophos Techvids | SMS
    If a post solves your question please use the 'Verify Answer' button.

  • Thanks Vivek. I tries entering the list and the following two entries were rejected,

    ^([A-Za-z0-9.-]*\.)?*\.client-channel\.google\.com/
    ^([A-Za-z0-9.-]*\.)?*\.googleusercontent\.com/

    When i try to use the passkey I still get the message below.

  • Hi,

    are you using IPv6 in your firewall? I had to create a special IPv6 rule with a local IP host definition because the current version of XG does not allow the use of IPv6 FQDNs in firewall rules.

    Ian

    XG115W - v20.0.2 MR-2 - Home

    XG on VM 8 - v21 GA

    If a post solves your question please use the 'Verify Answer' button.

  • Hi Ian,

    IPv6 is enabled on the router, firewall and workstation, but not used. The active connection is Sophos are not showing any active IPv6 sessions.

    Just to clarify, did you have to create an entry for your workstation? Just curious about what the rule was you had to make.

    TIA 

  • I had to make a specific gmail rule for IPv6 traffic. IP4 traffic was handled by the existing mail rule.

    I had to use the IPv6 address of google and create my own IP address group because the current versions of XG v20 and v21 do not support IPv6 FQDNs. The rule only allows smtps.

    Ian

    XG115W - v20.0.2 MR-2 - Home

    XG on VM 8 - v21 GA

    If a post solves your question please use the 'Verify Answer' button.

  • That's helpful and sent me down the right path. I created an IPV6 rule for LAN to WAN, with the "Destination networks" being the predefined "Google app enforcement" group. The "Security features" are,

    • Block QUIC protocol
    • Scan HTTP and decrypted HTTPS
    • Use zero-day protection
    • Use web proxy instead of DPI engine

    If Decrypt HTTPS during web proxy filtering is enables then the passkey auth fails. 

    The description on the group is, "Google app domain enforcement requires use of the web proxy. Use this FQDN group in a firewall rule to ensure that all affected traffic is handled by the proxy." However, the selected hosts are google.com and *.google.com. If I understand the settings above, that will leave a whole heap of traffic uninspected. 

    The general rule is allowing GMail using inspection. The next question is how to tighten the destination network from "Google app enforcement" to just the destinations needed  for passkey auth. I can't work that out from the Google documentation. Does anyone have any references?  

Reply
  • That's helpful and sent me down the right path. I created an IPV6 rule for LAN to WAN, with the "Destination networks" being the predefined "Google app enforcement" group. The "Security features" are,

    • Block QUIC protocol
    • Scan HTTP and decrypted HTTPS
    • Use zero-day protection
    • Use web proxy instead of DPI engine

    If Decrypt HTTPS during web proxy filtering is enables then the passkey auth fails. 

    The description on the group is, "Google app domain enforcement requires use of the web proxy. Use this FQDN group in a firewall rule to ensure that all affected traffic is handled by the proxy." However, the selected hosts are google.com and *.google.com. If I understand the settings above, that will leave a whole heap of traffic uninspected. 

    The general rule is allowing GMail using inspection. The next question is how to tighten the destination network from "Google app enforcement" to just the destinations needed  for passkey auth. I can't work that out from the Google documentation. Does anyone have any references?  

Children