Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
MikePruett
Valued Contributor

SSL Intercept Breaking Skype

You guys have any experience with SSL Intercept breaking Skype? I have been testing it on my home computer with my FortiWIFI 60D and it seems that skype dies when I enable SSL Intercept.

 

Please advise

Mike Pruett Fortinet GURU | Fortinet Training Videos
3 REPLIES 3
Christopher_McMullan

Skype has the certificate it expects to be presented from the application servers built into the software. When deep inspection is imposed, and the FortiGate re-writes the server certificate signed on its own authority in order to impersonate the server and decrypt the client traffic, it causes the certificate to fail the client's check, and further traffic will not proceed.

 

Unfortunately, since the client does not have a web browser interface, it is harder to notify end users exactly why their login attempt failed, whether due to deep inspection breaking otherwise allowed traffic, or else when traffic is actually denied by policy: the user just sees it as a timeout issue.

Regards, Chris McMullan Fortinet Ottawa

MikePruett

Christopher McMullan_FTNT wrote:

Skype has the certificate it expects to be presented from the application servers built into the software. When deep inspection is imposed, and the FortiGate re-writes the server certificate signed on its own authority in order to impersonate the server and decrypt the client traffic, it causes the certificate to fail the client's check, and further traffic will not proceed.

 

Unfortunately, since the client does not have a web browser interface, it is harder to notify end users exactly why their login attempt failed, whether due to deep inspection breaking otherwise allowed traffic, or else when traffic is actually denied by policy: the user just sees it as a timeout issue.

 

I suppose the best thing to do then would be to make a policy to allow skype out and place it above the SSL Intercept policy

Mike Pruett Fortinet GURU | Fortinet Training Videos
Christopher_McMullan

With apps, it's tricky:

-You can't reliably use FQDN address objects to define firewall policy destinations when the name can resolve to more than 32 IP addresses

-There may not be a traditional certificate exchange which would allow the FortiGate to at least review the CN or SNI fields for the server hostname the client is contacting

 

In OS 5.2, you can use an FQDN address object specifically when defining destinations to exempt from deep inspection - this may work. If the servers contacted are at least known to fall under Skype's FortiGuard categories, you could exempt the category, although obviously the FQDN exemption would be much more surgically precise.

Regards, Chris McMullan Fortinet Ottawa

Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors