This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

How to detect decrypt HTTPS web proxy certificate failures

Hi,

 

Some applications on IOS devices fail to connect to their servers if decrypt HTTPS using a web proxy is enabled (obviously the Sophos XG CA is imported and enabled). I suspect they may have implemented certificate pinning or another control which prevents the Sophos XG CA certificate from being accepted by the app.

 

Is there a way to detect in the XG logs that either the TLS handshake between app/client and XG/server or XG/client and originating web server has failed? This would help in identifying which domain the app wants to connect to, since it is not always easy to identify this in the web filter logs.

 

Note: the solution to this is to add the domain of the originating web server the app wants to connect to to the web exception list and skip the HTTPS decryption there.

 

Br,

Jan



This thread was automatically locked due to age.
Parents
  • If you are using v18 and the DPI mode, there are new logs for SSL/TLS that are clearer, as well as a new dashboard.  There is new workflow to make changes to the rules from within those.

    I do not know all the specifics of Android and IOS, but I do know that on some, manually installing a CA only gets used by some thing and not all.  However if you are using a MDM solution (mobile device management) such as the one Sophos has, for some devices it can install a more system-level CA that gets used by more.  Google/Apple really want to keep normal users away from installing CAs on their devices, but recognize that company-managed devices may need company CAs installed.

Reply
  • If you are using v18 and the DPI mode, there are new logs for SSL/TLS that are clearer, as well as a new dashboard.  There is new workflow to make changes to the rules from within those.

    I do not know all the specifics of Android and IOS, but I do know that on some, manually installing a CA only gets used by some thing and not all.  However if you are using a MDM solution (mobile device management) such as the one Sophos has, for some devices it can install a more system-level CA that gets used by more.  Google/Apple really want to keep normal users away from installing CAs on their devices, but recognize that company-managed devices may need company CAs installed.

Children
No Data