Curl failure 35 → SSL connect error Curl failure 3 → URL malformation
search cancel

Curl failure 35 → SSL connect error Curl failure 3 → URL malformation

book

Article ID: 391367

calendar_today

Updated On:

Products

CAS-S400

Issue/Introduction

Having turned on Symantec Cloud Sandboxing. there has been no information on whether it works or not.

How do we make sure that the Cloud Sandboxing works, and where can we check for the outward requests on CAS.

We tried Packet Capture for Cloud Sandbox URLs/IPs, but there isn't any traffic.

Environment

CAS 3.2.x.x

Cause

With a Proxy integration:

SSL interception should be bypassed for all cloud-related Symantec Malware Analysis (sandboxing) traffic, especially for Symantec Content Analysis System (CAS) communicating with Symantec Cloud Sandboxing.

Analyzing the log with that in mind:

WARNING : xxxxxxxApi::catch_xxxxxxx - Curl failure 35 DEBUGGING: xxxxxxxApi::setup_curl - error while setting up curl for /1/hash WARNING : xxxxxxxApi::catch_xxxxxxx - Curl failure 3 ERROR : Sandboxingxxxxxxx::Submit xxxxxxxxxxxxxx_yyyyyyy.xlsx - query_hash failed ERROR : Sandboxes::Submit: failed to submit xxxxxxxxxxxxxx_yyyyyyy.xlsx for Symantec Cloud Sandboxing
 
Curl Error Breakdown (with SSL Interception Context)
  • Curl failure 35 – SSL connect error

Usually indicates TLS handshake failure due to:

    • Man-in-the-middle SSL interception, which breaks the chain of trust.
    • The CAS appliance expecting a valid Symantec server certificate but getting a proxy-signed/intercepted cert instead.

  • Curl failure 3 – URL malformation

Can be a secondary error caused when initial HTTPS connection setup (like hash query) fails.

 

Without a Proxy integration

If there is no proxy in the deployment, then SSL interception is not occurring, and the recommendation to bypass SSL interception becomes irrelevant in this context.

That said, the core issue still remains:

Curl failure 35 → SSL connect error Curl failure 3 → URL malformation (likely secondary)

So let's reevaluate what could cause this in a no-proxy environment.

Updated Root Cause Analysis (No Proxy in Path)

Curl failure 35 - SSL Connect Error:

This still indicates that CAS is unable to establish a valid SSL/TLS session with the Symantec Cloud Sandboxing endpoint.

 

With no proxy in place, the most likely causes are:

Potential Causes & Checks:

1. Firewall Blocking or Interference

  • Is there an external firewall, security appliance, or upstream router doing deep packet inspection (DPI), SSL inspection, or blocking outbound ports?
  • Port 443 (HTTPS) must be allowed from CAS to the Symantec Cloud sandboxing endpoints.

2. Invalid or Missing CA Certificates on CAS

  • The CAS appliance uses internal root/intermediate certificates to validate Symantec’s cloud endpoints.
  • If these are outdated or missing, SSL handshakes will fail.

3. DNS Issues

  • If CAS resolves <you_custom_domain_1> or *.<you_custom_domain_2> to a wrong IP or fails to resolve it at all, the HTTPS request can fail.
  • ➤ Check /var/log/messages or equivalent DNS logs.
  • ➤ Use diagnostic tools on CAS to test DNS resolution.

4. Incorrect System Time on CAS

  • If the CAS system time is skewed, SSL certificates will appear as "not yet valid" or "expired".
  • ➤ Ensure NTP is configured and functioning correctly.

5. MTU/MSS/Path MTU Discovery Issues

  • In rare network setups, TLS handshakes fail if MTU or fragmentation isn't handled properly.
  • ➤ A packet capture would help diagnose this if basic checks fail.

Resolution

With a Proxy integration:

Why Bypassing SSL Interception is Crucial

When CAS connects to Symantec Cloud Sandboxing (e.g., https://<you_custom_domain_1>*.<you_custom_domain_2>), it performs strict certificate validation. If a proxy like the Edge SWG (ProxySG) is intercepting and re-signing this traffic:

  • CAS will reject the connection due to an untrusted certificate, leading to Curl error 35.
  • This prevents malware samples from being submitted to the sandbox.

 

Recommended Action (Resolution):

On your ProxySG (or any upstream SSL intercepting device):

==> Create an SSL Bypass rule for the following domains/IPs used by CAS for Cloud Sandboxing:

  • Recommended Domains to Bypass:
*.<you_custom_domain_1> *.<you_custom_domain_3> *.<you_custom_domain_4> *.<you_custom_domain_6>
    • You may also consider bypassing:
      • https://<you_URL_1>
      • https://<you_URL_2>
      • https://<you_URL_3>
      • All relevant IPs (check live connections or support documentation for updated ranges)

See sample SSL Bypass CLP script below. Replace x.x.x.x/y with the actual IP/mask, and add more lines, if there are more.

;===========For Explicit Deployments ===========================================
<proxy>
condition=cloud_sandbox_Allow detect_protocol(no) authenticate(no) ALLOW

define condition cloud_sandbox_Allow
url.domain=<domain_1>
url.domain=<domain_2>
url.domain=<domain_3>
url.domain=<domain_4>
url.domain=<domain_5>
url.domain=<domain_6>
url.domain=<domain_7>
url.address=x.x.x.x/y

end

;===============================================================================

 

After Bypassing:

  1. Restart the AV service or CAS appliance (optional but may help).
  2. Re-test file submission to Cloud Sandboxing.
  3. Check logs again - Curl failure 35 should disappear if interception is bypassed properly.

 

Verification Test:

If you're unsure whether SSL interception is causing this:

  • Perform a packet capture on CAS & the proxy.
  • Look at the SSL cert presented to CAS during the handshake.
    • If it’s not signed by Symantec/DigiCert and is instead re-signed by your proxy, it confirms interception.

 

Without a Proxy integration:

Recommended Actions (Summarized)

Action Command / Interface Notes
Test connectivity to cloud sandbox endpoint From CAS CLI: curl -Iv https://<you_custom_domain> or equivalent tool See if TLS handshake succeeds
     
Verify DNS resolution on CAS nslookup <you_custom_domain> or check DNS logs Must resolve correctly
Verify time sync (NTP) Admin Console → System → Time Settings Time skew breaks SSL
Check firewall or perimeter filtering Firewall config Make sure nothing inspects or blocks outbound TLS

 

To double check the integration on CAS side, please refer to the Tech. Docs with the URLs below, as reference.

Integrate Content Analysis with Symantec Messaging Gateway