Solved

ISA Server changes HTTPS requests to HTTP://mydomain.com:443 requests when SSL bridging. Urgent help needed to stop this.

Posted on 2006-11-20
10
779 Views
Last Modified: 2008-03-17
I have had an existing SSL bridge working. I have just changed the certificate and the rule has stopped functioning.
I believe the cause to be that the url is being translated to a HTTP://mydomain.com:443 format from a standard HTTPS://mydomain.com type url.
I really need to make sure that ISA 2004 passes on the HTTPS in the URL. If not I get the following probs...

I get the following error in IE:
=====================
Bad Request
Your browser sent a request that this server could not understand.
Request header field is missing colon separator.

iewslive/fwivhor.fwwp_main.show HTTP/1.1
--------------------------------------------------------------------------------
Oracle HTTP Server Powered by Apache/1.3.19 Server at propman.thecrownestate.co.uk Port 443
=====================

and the following error on my SSL Apache server.
====================
ssl_engine_log
------------------
[20/Nov/2006 10:43:00 02040] [error] SSL handshake failed: HTTP spoken on HTTPS port; trying to send HTML error page (OpenSSL library error follows)
[20/Nov/2006 10:43:00 02040] [error] OpenSSL: error:1407609C:SSL routines:SSL23_GET_CLIENT_HELLO:http request [Hint: speaking HTTP to HTTPS port!?]
====================
0
Comment
Question by:ner_1808
  • 5
  • 3
10 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17978826
have you got all of the isa2004 service packs and rollup patches installed? There were a couple of issues 'fixed' by SP2 then corrected again by the follow up patches.

How are you bridging? https - https?
Have you tried backuping up the config then deleting the publishing rule then recreating it? has anything changed in the config/status recently beside the change of certificates?

If you open the ISA gui, select monitoring - logging - click on start query, what do you see in the log? it won't be much as obviously ISA cannot determine what is in the encrypted pipes but you should see any failures or translations at the point ISA tries to create the bridged connection.

If you view the certificates themselves, any issues seen with them? ISA may revert to http if the certificate is not validated as the environment for SSL would not be met.

Regards
keith



0
 
LVL 2

Author Comment

by:ner_1808
ID: 17979304
I can browse from the ISA server to the offending Web server using the HTTPS:// url format.
However I get as above when using the HTTP://www.mydomain.com:443/ url format, which is what is logged in ISA as the URL when attempting an external connection.
The error returned to the browser is
Error Code:500 Internal Server Error. The target principal name is incorrect (-2146893022)

However I think this is misleading as I can use the exact url from the ISA machine itself going direct to the web server. We have partitioned the DNS internally and externally.

When I browse to the server from the ISA machine the Certificate loads up fine. It is a wildcard certificate so is used fo several other HTTPS to HTTP bridging and works fine externally.

As far as changes go, other than replacing the certificate on one of the listeners I have now attempted to create new rules using the wizard, but the result is the same.
Thanks
Nicholas
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17980506
Can you give details on the certificate that has been placed on the ISA server? Creating the connection from the ISA directly will initiate a single-hop connection and will not use the ISA's certificate as an authenticator. Also, generating the connection from the ISA server is a different scenario; the source will be the internal nic of the ISA server and therefore does not use the pass-through/bridging elements that are contained within the rule.

Regards
K
0
 
LVL 2

Author Comment

by:ner_1808
ID: 17997979
I have finally solved this problem. Much wasted time with erroneous error messages. It turns out that ISA Server 2004 is designed to NOT accept wildcard certificates used internally. Only external wildcard certificates allowed and internal ones must be single host named ones. It would be nice if the ISA logs indicated that this might be the issue and I could have saved about 15 hours of research and attempted fixing.

Thanks for your help anyway.
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17998576
Your info is correct hence the direction of my questions to you

<< Can you give details on the certificate that has been placed on the ISA server >>
<< If you view the certificates themselves, any issues seen with them? ISA may revert to http if the certificate is not validated as the environment for SSL would not be met.  >>

This position is stated on a number of Microsoft forums and is also mentioned on a number of ISA questions I have resolved in the past here on Experts-Exchange. Probably my fault, I should have asked 'what is the difference between the certificate that worked and now?'.

0
 
LVL 2

Author Comment

by:ner_1808
ID: 18001614
I should have mentioned that I was using wildcard certificates! I probably would have if any of the errors or logs had indicated that there was an issue with the cert. Live and learn!
Thanks for your help anyway. Much appreciated.
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 18004386
:)
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 18012134
OK with me
Keith
0
 
LVL 1

Accepted Solution

by:
DarthMod earned 0 total points
ID: 18046638
Closed, 500 points refunded.
DarthMod
Community Support Moderator
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now