Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

Sophos Firewall: [LetsEncrypt] How To in Sophos Firewall

Disclaimer: This information is provided as-is for the benefit of the Community. Please contact Sophos Professional Services if you require assistance with your specific environment.


Overview

    This recommended Read reviews different options for obtaining a Let's Encrypt certificate.

    Update

    Update: V21.0 supports Lets Encrypt onboard:  Sophos Firewall v21 Early Access Announcement  
    Note: Make sure your Sophos Firewall time is correct to avoid potential Certificate Trust issues

    UTM has LE Support for WAF (since UTM9.6). However, you can also use LE certificates on Sophos. Many people do not know that you need a small Linux server and 5-10 minutes of your time every three months. You can automate this. 

    First, I want to share LE's "how it works" page. https://letsencrypt.org/how-it-works/

    My Setup

    Internet - Sophos - Ubuntu 20.04 LTS
    Ubuntu has "certbot" installed. Feel free to use other LE modules.
    https://certbot.eff.org/ https://certbot.eff.org/lets-encrypt/ubuntubionic-apache
    Follow straight the Guide for your OS. I am relying fully on those apps for the renewal process.  

    Next, I am choosing the HTTP-01 method for LE, so I need a DNAT for LE to my Ubuntu.

     (V18). 

    PS: I am using HTTP DNAT for the renewal process and will deactivate those rules afterward. But you can also use only the LE IPs: 
    https://community.letsencrypt.org/t/can-i-get-list-ip-from-letsencrypt/57117
    PS2: As explained in this Community thread, you could switch to the DNS validation.  

    The next step would be to check your Domain. Your DNS A-Record should point to your WAN IP. Otherwise, this process won’t work. 
    So perform a dig / nslookup of your domain. It’ll point to your WAN IP, so your DNAT will work, and HTTP packets will be forwarded to Certbot. 
    You can also use the Sophos free DDNS service. https://community.sophos.com/kb/en-us/123126 

    Certbot

    Let us start Certbot and try it. 
    My renewal process is straightforward:


    (Be careful: LE blocks you after a couple of "failed" requests for some time, so check everything.)
    Ultimately, you’ll get four files on your Linux: Public, Chain, Fullchain, and Privatekey Certificates. 

    Upload to Sophos Firewall

    You’ll use this Public and Privatkey certificate. 
    There are a couple of approaches to upload this to Sophos. 

    The first LE Cert can be uploaded. 
    It would be best to use the Public.pem in "Certificate" and the Privatkey in "Private key." 
    PS: you have to rename the Privatkey.pem to Privatkey.key. Otherwise, Sophos won’t take this certificate. 

    Optionally, you can upload the other Chain and fullchain Certificates under Certificate Authorities (Without Private key). 
    Now, you can use this Certificate for WAF/Webadmin. 

    In renewal (each 90 Days), choose a process.

    Automation 

    You can upload the new LE certificate with another Name and replace it in WAF/Webadmin. 
    Or you can "update" the current LE certificate with the new public.pem / private.key. However, for this method, you have to switch to a fallback certificate in WAF/Webadmin because Sophos can't update a currently used certificate.  

    After all, those steps are manually processed every 90 days. 
    You can "script" this if you want to. Basically, upload the certificate to Sophos every 90 Days. 


    Other members of the community have already performed scripts for this.

    If you want to script this, this community can help you if you struggle with a point.
    So kindly open a new thread with your issue with the API, and we’ll try to find a solution. 

    Sophos Factory

    Sophos Factory brings a new Tool to automate Script-based approaches. This means you can easily run a Script like Certbot or Lego in a Sophos Factory environment to generate and upload the certificate to the Sophos Firewall. 

    Sophos Factory offers a free Community Edition. https://community.sophos.com/sophos-factory/ https://community.sophos.com/sophos-factory/b/release-notes-news/posts/get-started-here-sophos-factory-offer-automation-for-all-with-its-free-community-edition

    Within Sophos Factory, it could look like this:

    Each step is a scripting component. Using tools like Lego and Github, the "Pipeline" will run once, generate the certificate, and upload it to the Firewall. 

    Contribution:
     
     https://zerossl.com/free-ssl/#crt Free alternative to this approach
    For the Github script. 
     Thanks for the PHP Script! 
     for a Powershell Script with WAF integration. 
     is for another version of a Powershell script. 




    Added link
    [edited by: emmosophos at 10:47 PM (GMT -8) on 16 Dec 2024]
    Parents
    • Update: V21.0 supports Lets Encrypt onboard:  Sophos Firewall v21 Early Access Announcement  

      __________________________________________________________________________________________________________________

    • FINALLY!!!!!!

      Now we need the time server back....

    • It is fw job to allow chinese camera only to have access to external ntp source. Less roles is more secure.

    • Hi,

      Sorry, but before you introduce NTP you should first implement the mail functions for quarantine properly.

      I can't understand at all how you can't simply send quarantine reports like other manufacturers when a mail ends up in quarantine. This is only possible if the person also has an account. This may work with 5 people but not with 50 or 100 who are not automatically loaded via AD by SFOS.


      In the UTM this was simply even automatic, now you need everything extra at SFOS via account for collective mailbox group mail addresses.

    • Did you had a chance to look into Central Email, which brings all those features (plus additional features as well)? 

      UTM customers nowadays are advised to migrate to CEMA (Central Email) instead of using the Email Protection of the firewall.

      __________________________________________________________________________________________________________________

    • Email Protection works pretty well I must admit. But its kind of annoying for my team to find reasons for undelivered mail as it is only visible as a tooltip. The use of rbl is very effective and made reports almost obsolet. 

      Glad LE finally made it to SFOS. 

      Still missing sophos otp for webserver protection though. :(

    • You could just say, our MTA implementation is crap - and we don't have plans to fix that -> use the cloud product instead.
      or move on to solutions that don't get crippled by their successor products.

    • Currently, all of my customers, when they get to choose between UTM and CEMA, they would go with CEMA all the way, as it is the full fetched email product, coming from the Sophos Email Appliance, which was always the primary Email product of Sophos. 

      Nowadays, as Sophos split up the email subscription into an own subscription, everybody can decide what to do with their email product and you are not locked into a bundle. 

      The promos of Sophos also include CEMA and not Email on the Firewall. 

      The Email protection of Sophos works as it is - and it does it job of scanning and filtering emails. Bugs are getting addressed and fixed as well.

      If a customer has certain requirements, you can always interact with Sophos or the Sophos partner to validate the options like moving to CEMA or interacting with another product. 

      __________________________________________________________________________________________________________________

    • The only reason not to have an internal NTP server is if you have no internal devices.

      Yes, NTP traffic might seem like just bytes moving in and out, but there are significant concerns with exposing this traffic to the internet. NTP traffic is not encrypted, meaning it’s visible to every node it passes through. This not only adds unnecessary latency and traffic on WAN interfaces and routers but also presents a substantial security risk.

      Relying on external NTP servers means your time synchronization is vulnerable to man-in-the-middle attacks. Attackers could intercept and manipulate the time data, potentially causing significant disruptions, especially in environments where precise timing is crucial. This vulnerability could impact time-sensitive applications, mismatching log-times are only the start of problems...

      It’s puzzling, to say the least, that a security provider like Sophos would suggest its customers expose their devices to third-party NTP servers for something as fundamental as time synchronization. The fact that Sophos collects telemetry from sophos.pool.ntp.org only highlights the irony...

      The real issue here is that Sophos had a very good UTM product - one with great usability and a comprehensive feature set. But you chose to abandon it in favor of a new product that is inferior in many ways. XGS suffers from poor usability and manageability (SUM vs SFM or Central anyone?), and many expected features, like an internal NTP server, are simply missing - or only get added after years and customer complaints, hints why we're in this very forum thread.

      And to add insult to injury, your sales team still claims the new product is “better in every way”, "easy to move over" (by manually building a new config/ruleset), or my personal favorite from 2018, “full feature parity by the end of the year.”
      Why not just be honest? Admit that you don’t want to implement certain features or that (allegedly) you lack the budget or manpower to do so. Stop tiptoeing around the obvious - just be upfront. 

      You could simply say, “Yes, that was a great feature in UTM, but we have no plans to bring it to Cyberoam, Sophos Firewall, XG, XGS. Either expose your NTP traffic to the internet with a NAT rule (which, as a SECURITY PROVIDER, we do not recommend), or implement your own NTP solution.”

      If your equipment requires millisecond-accurate time, you likely already have the necessary hardware in place. For everyone else, running a GPS NTP appliance or something like Docker-NTP in a container would at least keep the traffic off the WAN.

      Finally, consider the compliance implications. Many regulatory standards and industry best practices recommend or even require internal time synchronization services to maintain accurate logs and prevent tampering. By not providing an internal NTP server, Sophos might be inadvertently pushing customers to adopt practices that could lead to non-compliance, potentially opening them up to fines or penalties.

    • might be a bit off-topic to continue with MTA in this topic...

      but moving to a cloud-based mail security solution when your emails are already in the cloud (e.g., EXO) makes (some) sense. However, relying on a cloud service to filter emails when you intentionally keep your mail servers on-premises to avoid data being on 'someone else's computer' (aka the cloud) is not just ironic—it's counterproductive and undermines the very reason for keeping things in-house. I'll keep the discussion about the Central Mail Product off this Thread. 

    • You cannot compare a UTM product, which started in 2002 with a product, which started its root in a GDPR time. 

      Implementing a NTP Server in a firewall nowadays has more to it than only installing a NTP service to a linux system. You need to harden the device - make sure no one can exploit it and escape to other sub systems etc. 
      No one says, you have to redirect the time sync to an external service. You can install your own NTP service in your network, which is based on the standards and compliance you have. UTM never fulfill the regulations, some customers have. 

      So you can use an external by using NAT or an internal by using NAT, forcing everyone to use this server and no other service.

      In the end, if you use NAT or a NTP Server is technically the same. The client gets a NTP response from someone you trust. 

      If you want to be the own NTP server, like above, you need to make sure, you complain with certain services anyway. 

      __________________________________________________________________________________________________________________

    • Fair Point. 
      I missed to clarify where I'm coming from. I'm referring to the commonly recommended scenario 1 from this post (and I implied you wer referring to it as well):  Sophos Firewall: Using NAT to achieve NTP proxy like functionality  (scenario 2, has later been added)

      I'm not negating the point of having a "Any to WAN -> NAT to internal NTP" NAT-rule. Such a rule makes sense and should absolutely be setup, if you care about NTP in your network.

      yes, NTP servers need some care. If you don't want to maintain them yourself, you need an appliance.
      But it does not change the fact, that you had this feature in the previous product, which is now missing. And an additional service/appliance I need to implement and manage and take care of.

    Reply
    • Fair Point. 
      I missed to clarify where I'm coming from. I'm referring to the commonly recommended scenario 1 from this post (and I implied you wer referring to it as well):  Sophos Firewall: Using NAT to achieve NTP proxy like functionality  (scenario 2, has later been added)

      I'm not negating the point of having a "Any to WAN -> NAT to internal NTP" NAT-rule. Such a rule makes sense and should absolutely be setup, if you care about NTP in your network.

      yes, NTP servers need some care. If you don't want to maintain them yourself, you need an appliance.
      But it does not change the fact, that you had this feature in the previous product, which is now missing. And an additional service/appliance I need to implement and manage and take care of.

    Children
    • So at the moment, talking to most customers, they have one of this: 
      AD server (which services time)
      Special appliance for NTP with a radio to receive NTP (specific use case of compliance). 
      Not having anything and not "caring" about NTP. 

      In any of those cases, we can fully complain this with a NTP NAT redirect. 

      An NTP server on SFOS has (in my eyes) 0 value. But costs money to develop and implement in SFOS (Service, hardening, Webadmin implementation etc.). 
      Using Sophos resources to implement this feature for "0 value" to the customer - Is maybe not the best investment.

      Maybe in the future, this will be implemented, but as you can see in V21.0, Sophos is implementation also new features like 3th Party feeds and other SD-WAN Implementations - which adds a value to the customer. 

      __________________________________________________________________________________________________________________