This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

SSL scanning implementation / Best practise (errorhandling....)

I´m interesting in your experiences with activating the ssl scanning feature. I implemented and activated it in an environment serving about 4000 users.Just to imagine, there are (per day) 11820 unique domains and 2300 unique users.

Many different webpages are visited and my experience is, that many sites are broken or not visible after activation. I have to create a lots of exceptions for ssl scanning and some for the certificate check. Sometimes I face problems with certificates, that seems to be ok (no problems with direct internet connection, works good with the same browser). What can cause this? Could it be, that the utm doesn´t know all public trusted root CAs?

So I´m interested in your experience, how to handle all this... Do you completely disable the certificate checks (because you might think the enduser would skip all the security warnings anyway? ) ? Or do you also prefer to create exceptions?

Ciao

Sebastian



This thread was automatically locked due to age.
  • Yes, that is expected behaviour..:). Some web sites and services just don't work with SSL scanning enabled, so you have to create exceptions. The easiest way is to create one Filtering Exception using Tag like "No SSL scanning sites", and then just Tag every domain or IP that you want to except.

    In my experience problems are usually related with web services (like web applications, syncs and updates), and rarely with regular HTTPS web sites.
  • Sebastian, I like to roll out SSL scanning gradually, applying it to different groups selectively. You can accomplish this with GPOs applied to different Active Directory groups so that only a few have their Internet Settings configured to use the UTM Standard mode. The trick is that a Standard-mode Profile can capture traffic before a Transparent one can.

    Cheers - Bob
     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • I would also like to add to the previous responses by advising NOT to disable certificate validation.

    It's true that without HTTPS scanning, many users might ignore the certificate warning presented by the browser anyway. But with HTTPS scanning enabled, and certificate checking disabled, the browser would display no warnings at all. The SSL filtering has to replace the original certificate with a locally-signed one, which will always be valid and trusted for a browser that has trusted the UTM CA certificate.

    So disabling certificate validation effectively removes the ability for the browser to alert users to be on their guard. With cert validation enabled, the UTM may block some legitimate sites with minor cert issues, but it will remove the risk that a user clicking through a certificate warning will suffer a major security incident.

    Cheers
    Rich

    P.S. We do update the trusted certificate lists for the UTM but there may be times when the list gets out of sync with browsers. Feel free to submit any gaps that you notice via the feature request portal.
  • Hi Bob,

    very interesting, nice trick!

  • I agree, we are handling it the same way right now.

    Thanks,
    Sebastian

  • Hi Rich,

    here is one Site with a Symantec Certifcate. I often have problems with this certificates. Could you take a look at it and tell me, why the sophos throws an error here, while the browser ( has no trouble with it?

    https://portal.bibserve.com/ptl/login/pre-login.faces

    Who´s "responsible" for the problem? Webserveradmin or Sophos developers?

    Best Regards

    Sebastian

  • If you want to know more about the quality of certificates, please go to

    www.ssllabs.com and use their "Test your server".


    Here is the report for the site you mentioned.

    https://www.ssllabs.com/ssltest/analyze.html?d=portal.bibserve.com

    Off the top of my head, I suspect that the certificate chain issues are what are causing the certificate to be considered invalid by the UTM.  However the exact details here are at the limits of my knowledge.

    Similarly, using linux command line openssl

    $ openssl s_client -connect portal.bibserve.com:443
    CONNECTED(00000003)
    depth=0 /C=FR/ST=Puy-de-Dome/L=Clermont-Ferrand/O=Manufacture Francaise des Pneumatiques Michelin/OU=ZONE3/CN=portal.bibserve.com
    verify error:num=20:unable to get local issuer certificate
    verify return:1
    depth=0 /C=FR/ST=Puy-de-Dome/L=Clermont-Ferrand/O=Manufacture Francaise des Pneumatiques Michelin/OU=ZONE3/CN=portal.bibserve.com
    verify error:num=27:certificate not trusted
    verify return:1
    depth=0 /C=FR/ST=Puy-de-Dome/L=Clermont-Ferrand/O=Manufacture Francaise des Pneumatiques Michelin/OU=ZONE3/CN=portal.bibserve.com
    verify error:num=21:unable to verify the first certificate
    verify return:1
    ---
    Certificate chain
     0 s:/C=FR/ST=Puy-de-Dome/L=Clermont-Ferrand/O=Manufacture Francaise des Pneumatiques Michelin/OU=ZONE3/CN=portal.bibserve.com
       i:/C=US/O=Symantec Corporation/OU=Symantec Trust Network/CN=Symantec Class 3 Secure Server CA - G4
    [...]

    SSL-Session:
        Protocol  : TLSv1
        Cipher    : AES256-SHA
        Session-ID: 25093A60818A4E52E886E79FC24CEFEF76A25A23031472DBE73F2DB1D9AB436F
        Session-ID-ctx:
        Master-Key: E2E62FCC19F95BB575B3436FD301174145390E61B440F0E29C1069252F06730CC216D71372FE297A00BA399D9CE47667
        Key-Arg   : None
        Start Time: 1457540674
        Timeout   : 300 (sec)
        Verify return code: 21 (unable to verify the first certificate)

  • Confirmed with another SSL checker online tool. Administrator of that website didn't import all of the intermediate certificates.

  • Hey guys,

    thanks for this useful information. So now I know, that the webserver admin didn´t do his job right.... But in the moment Im getting tons of tickets with exactly this problem. Can I import intermediate certificates into the utm to solve this problem?

    The problem is, that the most browsers don´t have any problems with this missing certificates.... Propably they have installed all the necessary intermediate certificates....

    For me it doesn´t look as an option, to create uncountable exceptions for websites, where the problem is the webserver configuration itself.... I just want to find a practicable soltution for this...

  • I found something on the feature request portal, seems to be related to this topic:

    feature.astaro.com/.../2524138-astaroos-support-intermediate-cas