- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
SSL inbound deep inspection for mail not working
Hello,
I have a SSL indound inspection that is not working for email traffic. The action is "Bypassed"
"Message SSL connection is bypassed" says on the SSL logs....
does anyone know what cold be the case?
On SSL profile we are inspecting ALL ports.
Thank you.
- Labels:
-
SSL SSH inspection
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi
Is the issue for SMTPS or SMTP with STARTTLS?
Are you using proxy based inspection mode?
Can you share a screenshot of the rule?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello AEK.
It is SMTP with STARTTLS.
The policy is in proxy-based mode. It is a classic policy only allowing port 25 to the destination server.
Thank you!
Regards
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Kamarale
Please share the following screenshots:
- The ssl inspection profile
- Double-click on the related SSL log, the reason for bypass should be shown in the detailed logs
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello AEK.
The detailed logs does not say any Reason. I search for reason and does not appear.
Screenshots:
And logs:
Thank you!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Actually I have some doubt.
As connection to port 25 starts by unencrypted communication then switches to TLS (via STARTTLS), it is possible that the message "SSL connection is bypassed" is generated at the first step (clear), not following STARTTLS.
To make things clear, I think more tests are required, e.g.: you may send mail containing a malware test file (eicar) through a STARTTLS communication and see the behavior of your FGT's antispam. If it can catch it then your deep inspection is working properly once STARTTLS is initiated.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello,
We have tried that with openssl sending eicar and it passes. FGT does not see/block it....
Thank you.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi
Please have a look at this example and see if you didn't forget anything in your config.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Kamarale
I made a test and it works as expected.
The AV has scanned the attached file (my AV policy is just to reject encrypted archives, for test purpose).
FG's AV logs below:
And the session from gmail was STARTTLS (confirmed from in gmail headers, as I have opened port 25 only).
Can you test with "Fortinet_SSL" cert in your inspection profile? (just like I did in my test)
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello AEK,
thank you for your time.
Now is working, the action is "inspect" and not "bypassed" in the SSL logs.
In the SSL profile I disabled "Inspect all ports" and that was it basically.....
Dont know why but this fixed it.
Regards
