Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Web filtering https option in UTM console possibly mislabeled.

Is it possible that the check box that I have outlined in red below is labeled backwards:

Just as a matter of opinion, good UI should NOT include the word 'not' in the description of a check box.  Additionally, I think this box should be labeled 'Proxy https  traffic in transparent mode' anyway, because that is the way the UTM is acting, i.e. with the box checked https traffic is being proxied by the UTM in transparent mode and with the box unchecked https traffic is NOT being proxied in transparent mode.  If the box is indeed labeled backwards it can cause a great deal of confusion.

thanks,

Richard



This thread was automatically locked due to age.
Parents
  • Hi Richard,

    It is not a typo, this option does indeed provide you the ability to disable web filtering for all HTTPS traffic when on Transparent Mode. 

    Could you confirm what you mean when you say that "with the box checked https traffic is being proxied by the UTM in transparent mode and with the box unchecked https traffic is NOT being proxied in transparent mode"

    If you mean that with this option enabled, you are able to reach https sites with no problems and with it disabled, you are unable to. That is simply due to the proxy being disabled, so all https traffic is just allowed to flow. To transparently filter HTTPS traffic, you must enable Decrypt & Scan which requires deploying the Proxy CA: Sophos UTM: How to Deploy the Web Protection Proxy CA

    Please let me know if you have any questions.

    Thanks,
    Karlos

    Karlos
    Community Support Engineer | Sophos Technical Support

    Knowledge Base  |  @SophosSupport  | Sign up for SMS Alerts
    If a post solves your question use the 'This helped me' link.
  • Hi Karlos,

    Thanks for your explanation, but I still think that check box is mislabeled and your last paragraph helps me confirm it.  Here's what I have going on, I am using a commercial application that uses HTTPS and it has been working for years with that check box checked, i.e. if we assume the box is currently labeled correctly, having the check box checked means "Do not proxy HTTPS traffic in transparent mode" implying that the proxy will NOT be involved in HTTPS.  I know the application's destination server is AWS (Amazon Web Services).  The application broke on it's own on approximately 1/18/2018 which I believe coincided with Amazon removing support for flawed security protocol TLS 1.1 (the server at Amazon is currently ONLY supporting TLS 1.2).

    I believe there are some community requests and articles indicating that the Sophos Web proxy is NOT yet supporting TLS 1.2.  So, what I know is I can un-check this box, which to me means disable this option (but, the option is described with the word 'not' in it, so un-checking this box would mean to enable the proxy for HTTPS.  As of 1/18/2018, un-checking this box makes the application work, not the other way around.   I can simply check the box and the application will NOT work, un-check the box and the application works again.  If anyone is having trouble following this paragraph it's likely because the check box was labeled with the word 'not' in it which I think is not the best practice.  Contrast to if the check box was labeled 'Proxy HTTPS traffic in transparent mode' versus how it is currently labeled, checking the box would clearly mean the proxy would be involved in HTTPS, un-checking, i.e. disabling the option, would mean the proxy would NOT be involved in HTTPS traffic.  I am confident the application works with TLS 1.2 and confirmed this by temporarily putting a very old OTS router temporarily in place (a router that would not have provided a Web proxy) and the application worked.

    In summary, I have an application that has worked for years with this box checked, now I have to un-check the box for the application to work.  Just the opposite case of what you described in your last paragraph.

    thanks,

    Richard

  • Hi Richard,

    Thanks for providing the details. UTM 9.5 does offer TLS 1.2 support. This KB is dated, and RC4 should now be removed from the cipher list but follow for commands to display cipher list and to manually set TLS 1.2: HTTPS Encryption for HTTP Proxy 

    P.S. note that a "!" before a cipher, means it's not being used.

    Also, do you have HTTPS scanning enabled or just URL filtering? If the latter, then it will only check the domain against blocked categories or blacklist. If it is not found in either, it should let your application through, hence why it works with the option not checked. As per why the application stops working when the option is checked, maybe you can look through your firewall logs using the destination IP for any blocks. You can also look through your Application Control logs if it is enabled.

    Thanks,

    Karlos

    Karlos
    Community Support Engineer | Sophos Technical Support

    Knowledge Base  |  @SophosSupport  | Sign up for SMS Alerts
    If a post solves your question use the 'This helped me' link.
Reply
  • Hi Richard,

    Thanks for providing the details. UTM 9.5 does offer TLS 1.2 support. This KB is dated, and RC4 should now be removed from the cipher list but follow for commands to display cipher list and to manually set TLS 1.2: HTTPS Encryption for HTTP Proxy 

    P.S. note that a "!" before a cipher, means it's not being used.

    Also, do you have HTTPS scanning enabled or just URL filtering? If the latter, then it will only check the domain against blocked categories or blacklist. If it is not found in either, it should let your application through, hence why it works with the option not checked. As per why the application stops working when the option is checked, maybe you can look through your firewall logs using the destination IP for any blocks. You can also look through your Application Control logs if it is enabled.

    Thanks,

    Karlos

    Karlos
    Community Support Engineer | Sophos Technical Support

    Knowledge Base  |  @SophosSupport  | Sign up for SMS Alerts
    If a post solves your question use the 'This helped me' link.
Children
  • Hi Karlos, 

    Thank you for the link to the updated Ciphers tip to support TLS 1.2.  But the plot thickens, I have the radio button 'URL filtering only' selected and I updated the ciphers as follows:

    # cc get http tlsciphers_server
    TLSv1.2:HIGH:!MD5:!aNULL:!EDH

    When the check box labeled 'Do not proxy HTTPS traffic in transparent mode' is checked then the application still does not work.  I'm kinda at a loss.

    Richard

  • What application doesn't work, Richard, what do you see when it doesn't work and what do you see in the Web Filtering log?

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Hi Bob,

    The application is BlinkForHome.  Each camera has it's own internal IP address and the camera communicates with via https to an AWS (Amazon Web Services) local region server.  I have used Sophos UTM since it was Astaro and I have had the camera system for at least three years.  All have worked very well together, but something broke the app on approximately 1/18.  I conjecture, but do not know for sure that Amazon improved security by dropping a cipher that the UTM proxy was using.  I have set both of the following confd settings:

     

    # cc get http | grep -i cipher

              'tlsciphers_client' => 'TLSv1.2:HIGH:!MD5:!aNULL:!EDH',

              'tlsciphers_server' => 'TLSv1.2:HIGH:!MD5:!aNULL:!EDH',

    And, while I think this cipher list is improved over the outdated one, it has not done anything for resolving this issue.  I'm not even sure these settings have anything to do with the proxy.  There are reverseproxy settings, but I didn't see any config item under there that contained ciphers.

    In summary, for years I have had the box labeled 'Do not proxy https in transparent mode' checked and the cameras were fully functional.  Now, I have to uncheck that box to make them work.  I assumed the box was labeled backwards.  To test my theory, I removed the Sophos UTM and my normal wireless Access Points and temporarily replaced my entire network with a very old Engenius router with wireless that would have not provided a Web proxy, i.e. straight NAT and the cameras worked.  That tells me the cameras have no problem uploading to AWS directly without a proxy.  Back to the UTM, uncheck the box, cameras work.  Check the box, they do not.  However, if we take the check box as it is currently labeled, unchecking would mean that the proxy is involved, while checking it would mean that the proxy is NOT involved.  Seems to me to be too much evidence that this is completely backwards.

    Also, I would be glad to check logs if I knew what to look for.

    thanks,

    Richard

  • Bob,

    Wanted to add one more interesting detail, the LAN (internal) IP address of the camera doesn't appear in any of the logs in /var/log; that's why I haven't been that interested in searching http.log.  I can of course glean a few things from tcpdump.

    thanks,

    Richard

  • What are you seeing that leads you to conclude the cameras aren't functional?  Does anything work with them?

    If there's no evidence of the traffic in the Web Filtering log, I don't understand why unchecking the box made any difference.

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Bob,

    Exactly and me either.  But, unchecking the box fixes the issue.  The camera is partially functional, it has a live view capability which works with or without the box checked.  However, it has two upload capabilities, take a photo and upload it, or take a video clip and upload it.  Upload to AWS does not work at all with the box checked.  I can pick any camera's IP, and watch/capture the traffic flow from the UTM.  There is definitely attempted traffic from the camera through the UTM to AWS, but when the box is checked I can tell that the communication aborts before finishing.  The way I can tell is that I can find IP address of the AWS server in the packetfilter.log where it is dropped with fwrule=60001 (i think is the correct number).  Anyhow, it's the fwrule that indicates this is attempted unsolicited input, i.e. the firewall has nowhere to direct the last packet received to since the connection has been torn down.

    Since we're on the topic, I made a post a while pack about this stealthiness of the UTM.  I could do a 'netstat -an' on the UTM and there would be no connections for a specific internal IP address even though I know the internal IP had connections through the router.  I don't know if something similar is going on here, but it is very strange to me, box checked or not, the internal IP address of the camera does not appear in any of the logs, much less http.log.

    I don't know whether this may help you pinpoint it or not, but I have a more complex environment than most.  I put my IOT devices off on their on VLAN (interface eth0.3).  Wonder does that have anything to do with the IPs on that VLAN not showing in the logs?  You are exactly correct though, in a perfect world unchecking or checking that box shouldn't make any difference for this application.  But, I am telling you as of like 1/18/2018 it most certainly does.  I almost never found the workaround for this issue because strangely, going to the first tab and turning off the green switch on the top right had no bearing on the this problem. No matter whether the switch on the first tab is on or off, if that box on the second tab is checked the uploads fail. That was misleading at best.

    thanks,

    Richard

  • "60001" means that's it's a default drop out of the INPUT chain, Richard.  Read #1 in Rulz and try looking at the Intrusion Prevention log.  Also, show us the related "60001" line from the full Firewall log file.

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Bob,

    I appreciate that and I know what 60001 means.  With the box unchecked the 60001 does not occur.  With the box checked the 60001 does occur somewhere in the middle of the communication; I conjecture connection has broken down, i.e. the UTM sees it as unsolicited traffic.  It was just something I noticed when I was debugging this problem.

    Back on topic, uncheck the box the application works, check the box, it does not.  Ideally, the application should work with or without proxy, unless of course it is purposely configured to be filtered by the proxy.  Since I am still convinced that the box labeled 'Do not proxy https in transparent mode' is labeled backwards.  Can you point me to an easy test/example to convince me otherwise?  I assume I should be able to see something from a 'tail -f http.log'.

    thanks,

    Richard

  • Yes, tail -f /var/log/http.log would indeed do the trick, Richard.

    I still think there' something else going on.

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Bob,
     
    I don’t mind collecting and sharing a tail of the http.log. However, isn’t it wasting our time since I mentioned that the internal IP address of the camera doesn’t appear in any of the logs?  I only mentioned the tail so you could help show me when the proxy is getting involved in https and when it is not. Is it documented anywhere?
     
    Thanks again,
    Richard
Share Feedback
×

Submitted a Tech Support Case lately from the Support Portal?