Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

DPI / TLS Scanning exception issue with d1. d2 d3.sophosupd.com when installing Intercept-X for Mac

Hi,

today we're facing something new: issues when rolling out the Sophos Endpoint to Mac Books. Windows Endpoints: no problem.

They fail to install. Workarounds like https://support.sophos.com/support/s/article/KB-000044045?language=en_US were unsuccessful.

When we put them into Guest WiFi with no XG TLS Decryption, they succeed to install immediately.

We could not find something helpful in the install logs - there is nothing logged by the Mac installer in /var/log/install.log /var/log/system.log.

When working in Guest WiFi,

we can see in the Firewall log, they are downloading a bunch of stuff, all over unecrypted http connections:

184.30.25.172,Software Updates,d3.sophosupd.com/.../sdds.ixdata.xml

184.30.25.172,Software Updates,d2.sophosupd.com/.../e7ab79122d4ed04125ffa2d788fad371x000.xml

184.30.25.172,Software Updates,d1.sophosupd.com/.../9e6f799da98647181e68ffd70c4c50e9x000.xml

184.30.25.172,Software Updates,dci.sophosupd.com/.../c593902213ad9c5e6c22aa72ae213505.dat

All from the same IP, with different SNI.

When they fail to install when they're in the corporatre LAN, I can see no blocked firewall packets but in TLS I see errors due to

"Server did not respond to client hello"

I can simulate this. I can browse to that websites and get the Akamai Website content without error but in the XG TLS logs, it shows the same TLS error.

Manual test opening in browser:

Of course those websites are all excluded from TLS / DPI scanning - with the default rule and also the matching firewall rule has no https decryption enabled.


Exception group:

TLS exception:



This thread was automatically locked due to age.
Parents Reply Children
  • Vivek you have the files.

    the Sophos Endpoint is of course also involved. It decrypts and does MIM after the Firewall.

  • The correct filter would be the following: "tcp.stream eq 0 || tcp.stream eq 1"
    You can share the out of the advance firewall from the console !!

    Thanks & Regards,
    _______________________________________________________________

    Vivek Jagad | Team Lead, Global Support & Services 


    Sophos Community | Product Documentation | Sophos Techvids | SMS
    If a post solves your question please use the 'Verify Answer' button.

  • And the following is from the client dump:

    Thanks & Regards,
    _______________________________________________________________

    Vivek Jagad | Team Lead, Global Support & Services 


    Sophos Community | Product Documentation | Sophos Techvids | SMS
    If a post solves your question please use the 'Verify Answer' button.

  • This looks fine. And this is with an error in TLS Logviewer? Or does this work? 

    __________________________________________________________________________________________________________________

  • yes. two for each server connects.

  • Can you share the out of the following:
    console> show advanced-firewall
    ============================
    try toggling the following:
    >  TCP Seq Checking 
    >  TCP Selective Acknowledgements
    >   Midstream Connection Pickup
    See if that makes any difference upon toggling on/off this options !!

    Thanks & Regards,
    _______________________________________________________________

    Vivek Jagad | Team Lead, Global Support & Services 


    Sophos Community | Product Documentation | Sophos Techvids | SMS
    If a post solves your question please use the 'Verify Answer' button.

  • Thank you, I will test changing those options after hours.

            Strict Policy                           : on
            FtpBounce Prevention                    : control
            Tcp Conn. Establishment Idle Timeout    : 10800
            UDP Timeout                             : 30
            UDP Timeout Stream                      : 60
            Fragmented Traffic Policy               : allow
            Midstream Connection Pickup             : off
            TCP Seq Checking                        : on
            TCP Window Scaling                      : on
            TCP Appropriate Byte Count              : off
            TCP Selective Acknowledgements          : on
            TCP Forward RTO-Recovery[F-RTO]         : off
            TCP TIMESTAMPS                          : off
            Strict ICMP Tracking                    : off
            ICMP Error Message                      : allow
            Caching for route lookups               : on
            IPv6 Unknown Extension Header           : deny
    

  • I changed those adv. FW options.

    Toggled them all, toggled a single of them...

    but unfortunately this did not change the behaviour. if accessed, those 4 test FQDN still generate the error in TLS log.

    I believe this is an Intercept-X endpoint https decrypt issue. Will test some more at later time.

  • just a quick info:

    What is common with all failed requests is the cipher suite and that is uses TLS1.3

    There are also successful requests to those sophos servers, but they are all TLS1.2 and have an other cipher suite:

    That one is always failing, no single success in our logs:

    2022-08-04 19:25:36SSL/TLS inspectionmessageid="19017" log_type="SSL" log_component="SSL" log_subtype="Error" severity="Information" user="xxx" src_ip="172.16.xxxxxxx" dst_ip="184.30.25.172" user_group="xxxxx" src_country="R1" dst_country="DEU" src_port="58841" dst_port="443" app_name="" category="Software Updates" con_id="3403381952" rule_id="0" profile_id="1" rule_name="System exclusions" profile_name="Maximum compatibility" bitmask="" key_type="KEY_TYPE__UNKNOWN" key_param="Unknown" fingerprint="" resumed="0" cert_chain_served="TRUE" cipher_suite="TLS_AES_256_GCM_SHA384" sni="cloud-assets.sophos.com" tls_version="TLS1.3" reason="Server did not respond to client hello" exception="" message=""

  • Hey ,

    Can you execute the following commands from the advance shell of the SFOS and from the windows client machine in powershell and check the results:

    #openssl s_client -connect d2.sophosupd.com:443 -tls1
    #openssl s_client -connect d2.sophosupd.com:443  -tls1_1
    #openssl s_client -connect d2.sophosupd.com:443 -tls1_2
    #openssl s_client -connect d2.sophosupd.com:443  -tls1_3

    Based on the reporting you shared, there are chances they you may not see a negotiation established on TLS 1.3

    Thanks & Regards,
    _______________________________________________________________

    Vivek Jagad | Team Lead, Global Support & Services 


    Sophos Community | Product Documentation | Sophos Techvids | SMS
    If a post solves your question please use the 'Verify Answer' button.