This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

SSL scanning implementation / Best practise (errorhandling....)

I´m interesting in your experiences with activating the ssl scanning feature. I implemented and activated it in an environment serving about 4000 users.Just to imagine, there are (per day) 11820 unique domains and 2300 unique users.

Many different webpages are visited and my experience is, that many sites are broken or not visible after activation. I have to create a lots of exceptions for ssl scanning and some for the certificate check. Sometimes I face problems with certificates, that seems to be ok (no problems with direct internet connection, works good with the same browser). What can cause this? Could it be, that the utm doesn´t know all public trusted root CAs?

So I´m interested in your experience, how to handle all this... Do you completely disable the certificate checks (because you might think the enduser would skip all the security warnings anyway? ) ? Or do you also prefer to create exceptions?

Ciao

Sebastian



This thread was automatically locked due to age.
Parents
  • I use two SSL site checkers. the one from my certificate vendor, Thawte, and the one from SSLLABS.com that was mentioned previously.   Thawte is part of Symantec.  The URL is https://cryptoreport.thawte.com/checker/views/certCheck.jsp

    When the Thawte utility sees a missing intermediate for a Symantec or Thawte certificate, it will provide a link to download it.   You install it within UTM using this click sequence:  Web Protection... Filtering Options...  HTTPS CAs...Then choose the "Upload Local CAs" from the "Verification CAs" section of the page.   This works, even though the certificate is not a CA certificate.

    I post the Thawte link reluctantly.   As a courtesy to them, you should use the SSL checker provided by your certificate vendor first.

    I have determined that Godaddy only issues binary intermediate certificates.   UTM cannot load these.  

    I don't have any information for other certificate sources.

    The SSL Labs test utility is more comprehensive and slower, so I only use it when the Thawte site is insufficient.  Ssllabs has the advantage of identifying all of the IP addresses associated with a DNS name, including both IPV4 and IPV6.   If you have inconsistent results, it may be because the remote site uses more than one IP address, and the servers are configured differently.  

    SSL Labs provides better insight into certificate chain problems, particularly "contains anchor"   This means that the site is sending a root certificate as part of the chain, which is incorrect.   UTM will reject the certificate chain if anything is self-signed, which is always the case for a root certificate, which is why the root has to be preinstalled on your PC to be trusted.

    As I have explained elsewhere, I parse yesterday's log files to find all of the certificate errors, then use the SSL checker sites to identify the actual problem, then use WHOIS to idenify someone at the organization to contact, then use Microsoft Word mail-merge to send an email to all of the sites for which I have a contact.   If I cannot find a contact with WHOIS and the entity is obviously legitimate, I try to make contact using their website "Contact Us" page.   I usually have about 10 URLs per day, on a large population but not as large as yours.   Most sites are very responsive.

    Parsing the log files to identify missing certificates is complicated.   I have posted the details as several replies to "UTM best practise guide for strict webfiltering", which is at this URL https://community.sophos.com/products/unified-threat-management/f/55/p/74489/286777#286777

    This notification process has saved me from having to create an exception list that is so long that I have to worry about performance problems.   Besides, why should I weaken my defenses just because someone else is messed up?

Reply
  • I use two SSL site checkers. the one from my certificate vendor, Thawte, and the one from SSLLABS.com that was mentioned previously.   Thawte is part of Symantec.  The URL is https://cryptoreport.thawte.com/checker/views/certCheck.jsp

    When the Thawte utility sees a missing intermediate for a Symantec or Thawte certificate, it will provide a link to download it.   You install it within UTM using this click sequence:  Web Protection... Filtering Options...  HTTPS CAs...Then choose the "Upload Local CAs" from the "Verification CAs" section of the page.   This works, even though the certificate is not a CA certificate.

    I post the Thawte link reluctantly.   As a courtesy to them, you should use the SSL checker provided by your certificate vendor first.

    I have determined that Godaddy only issues binary intermediate certificates.   UTM cannot load these.  

    I don't have any information for other certificate sources.

    The SSL Labs test utility is more comprehensive and slower, so I only use it when the Thawte site is insufficient.  Ssllabs has the advantage of identifying all of the IP addresses associated with a DNS name, including both IPV4 and IPV6.   If you have inconsistent results, it may be because the remote site uses more than one IP address, and the servers are configured differently.  

    SSL Labs provides better insight into certificate chain problems, particularly "contains anchor"   This means that the site is sending a root certificate as part of the chain, which is incorrect.   UTM will reject the certificate chain if anything is self-signed, which is always the case for a root certificate, which is why the root has to be preinstalled on your PC to be trusted.

    As I have explained elsewhere, I parse yesterday's log files to find all of the certificate errors, then use the SSL checker sites to identify the actual problem, then use WHOIS to idenify someone at the organization to contact, then use Microsoft Word mail-merge to send an email to all of the sites for which I have a contact.   If I cannot find a contact with WHOIS and the entity is obviously legitimate, I try to make contact using their website "Contact Us" page.   I usually have about 10 URLs per day, on a large population but not as large as yours.   Most sites are very responsive.

    Parsing the log files to identify missing certificates is complicated.   I have posted the details as several replies to "UTM best practise guide for strict webfiltering", which is at this URL https://community.sophos.com/products/unified-threat-management/f/55/p/74489/286777#286777

    This notification process has saved me from having to create an exception list that is so long that I have to worry about performance problems.   Besides, why should I weaken my defenses just because someone else is messed up?

Children
No Data