Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

SSL Warnings

I hace an SFTP server in my DMZ. There's a DNAT entry and firewall policy allowing access from Internet IPV4 using port 22 to the server. No other ports are open. No SSL cert is installed on the server.

When we run a Pen test from outside the company, it's throwing a bunch of SSL errors. 

SSL Certificate Cannot Be Trusted, SSL Certificate with Wrong Hostname, SSL Self-Signed Certificate

Turns out, the scanner is returning info from the UTM's SSL cert. How do I fix this?

 



This thread was automatically locked due to age.
Parents
  • PCI tests are all automated and no human at your testing service looks at anything closely enough other than to say, "It looks like you have some things to work on."  It's a pet peeve of mine that they don't even keep track of your responses to the same issues at the prior test - you just need to keep that ready for them for the next time...

    I've seen the argument made that the RED connection is actually more secure with a self-signed cert as that actually makes it more difficult for someone to gain access for nefarious purposes.  After all, it's not like this is something open to the public or that there is anything that the tester could see - their tests are not that sophisticated.

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Why is the UTM responding to port 3400 on all IPs?

  • It would be a feature request to be able to limit that as one can limit User Portal access.  The workaround is a blackhole DNAT for such traffic arriving on the "(Address)" objects you don't want to respond (see #2 in Rulz).

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
Reply
  • It would be a feature request to be able to limit that as one can limit User Portal access.  The workaround is a blackhole DNAT for such traffic arriving on the "(Address)" objects you don't want to respond (see #2 in Rulz).

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
Children