Hi, at first a happy new year to all. I have a Problem when i enable ssl deep-Inspection and surfing through the Web. I noticed that some sites loading only if i reload the site twice. Sometimes but not often I get a "ssl_error_bad_mac_read" error in Firefox. It also went gone when I reload the site. It is relative often reproducible when I am surfing through the fortinet forum. I am using the build in fortinet proxy certificate which CA is certainly imported in the browser under trusted ca authorities I have checked this with some other browsers and on other machines to rule out that it is a browser/machine problem only. The goal why i have enabled deep inspection is to use antivirus in https. Allow Invalid SSL Certificates and Log Invalid Certificates are both enabled but I get no errors. Like I said it is not on all sites but when I noticed that and loading process was too long then I reload the site and now it comes up. Then I figured out when deep-inspection is turned off then all runs well. How can I check what happens. Sniffing the traffic gave no usefull hints until now. I see sometimes only the req but no ack. Any hints for cli commands that can help to encircle the problem more precisely? My device is a FGT 60D with V5.2.5 Any help is appreciated.
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
We have the same issue. Working with support on this case.
Hi,
I've a update from Fortinet support.
Info from support:
There is an issue id 0372309 which have the same symptoms as you described. This has been already fixed in latest IPS engine version (v3.00284)
Apart from this, the workaround to the issue is to switch one of the UTM features to proxy mode (all UTM features on the policy will then internally use proxy daemons instead of ipsengine).
So there are two options:
[ul]I've installed the new IPS engine. Looks good so far. We will monitor the behavior the next few days.
What I would do;
1:Isolate a fw-policy with ssl deep-inspection for one site only
2:Run the diag debug app ssl -1 command review the output
3:test using various browser
I can't give you a exact reason for your problem but does it happen with fire-fox, ie and chrome? to the same site ? Chrome seems to exhibit issues that's not seen n IE or Safari or FFOX. It also has better support and security and support SHA256 right out the box.
PCNSE
NSE
StrongSwan
Hi emnoc,
thanks for the hints.
I have enabled deep inspection an runs the debug but I see nothing.
There is no application ssl but only sslvpn which is surely not what we need i think.
Did you run diag debug flow and against the site(s)?
I'm sure that will probably give you some more details.
PCNSE
NSE
StrongSwan
Yes i did. I tried it with debug level -1 and 7 (highest value) diag debug sslvpn -1
diag debug flow tracert start
diag debug flow show console enable
diag debug enable
Fortigate-60D # diag debug info debug output: enable console timestamp: disable console no user log message: disable sslvpn debug level: -1 (0xffffffff) CLI debug level: 3 Notice that there exists only "sslvpn" not ssl. That seems why i see nothing. Surfing through many ssl sites also these which makes trouble but nothing is shown.
I don't see also in the cli manual any references for ssl only sslvpn is described.
The Wiki says something about this in conjunction with SSL/TLS offloading.
Don't know if the 60D has this capability. It has an Asic (CP0) but maybe it is handled by software not Hardware.
By the way i follow also the Thread NOW! Fortios 5.2.5 who it seems to be issues with deep inspection in the same way.
I see i have executed the debug flow trace command wrong. Have found an example for debug flow in another thread. Now i see the traffic. I will now analyse it and see if i can find something
hi i've same problem with deep inspection enabled firmware 5.2.6 the certificate used is a wildicard SHa2 globalsign with other six third-level domains.
-----------------------------------------
IT Security Manager
2 Fortigate 400D (clustered)
2 Fortigate 200D remote Portal
-----------------------------------------
Was this ever resolved - sounds similar to some of the issues we are facing at the moment..
We have the same issue. Working with support on this case.
Willem Bargeman wrote:We have the same issue. Working with support on this case.
Thanks for posting - it would be great if you could update with any progress.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1720 | |
1093 | |
752 | |
447 | |
234 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.