Attempting to log into Skype for Business (Skype) or join meetings fails when the following conditions are true:
Various Microsoft clients, such as Skype for Business, now strictly enforce the Online Certificate Status Protocol (OCSP) or Certificate Revocation List (CRL) checks. OCSP, CRL checks are performed during the SSL handshake between a client and server. ProxySG and Advanced Secure Gateway appliance did not include a CRL Distribution point extension or Authority Information Access (for OCSP) extension on the emulated certificates. This lack caused these Microsoft clients to abruptly conclude SSL or TLS handshakes and generate exceptions.
In addition to having a requirement for OCSP or CRL, Skype also uses Session Initiation Protocol (SIP) as part of the meeting join process. SIP uses SSL as its transport but after the appliance decrypts the traffic, the underlying SIP protocol is not understood, and an error occurs.
A new feature has been added to ProxySG and ASG. The feature allows for proper OCSP or CRL check processing by clients and servers. It also includes processing of SIP when SSL interception occurs. With this feature logging into Skype and joining meetings work when a ProxySG or Advanced Secure Gateway appliance processes the traffic. This feature is available starting in SGOS 6.5.10.1.
Note:
After upgrading the appliance to a release with the new feature, configure the appliance to process client and server OCSPor CRL checks correctly.
Next, modify services to enable protocol detection. This modification is needed so that SIPS and MS-TURN traffic passing through those services can be detected.
Add and modify a policy that triggers protocol detection for SSL interception. Optionally, block unknown protocols using SSL.
When a policy includes the object that was configured in Step 2, the appliance STunnels unknown protocols using SSL. This behavior is different from using the HTTPS interception object which responds with an error when an unknown protocol uses SSL. To emulate the HTTPS interception object behavior while still being able to use SSL interception with automatic protocol detection, add the CPL in this step.
DENY client.protocol=!ssl tunneled=yes
This CPL ensures that unknown protocols using SSL are denied. The only caveat to using the previous steps is for explicit transactions with protocol detection disabled. If an explicit proxy is used and certain traffic has protocol detection disabled, ensure that the rules to disable protocol detection occur within the CPL. Example if example.com has protocol detection disabled:
url.domain=example.com detect_protocol(none)
DENY client.protocol=!ssl tunneled=yes
With a supported release installed and policy configured, users should be able to log into Skype and join meetings.
If you are running a release that does not support CRL Distribution point extension, or Authority Information Access (for OCSP) extension on the emulated certificates. Refer to the following workaround:
Install SNI-based bypass policy with SSL intercept (SGOS 6.5.6.1 and later):
url.host.substring=url_substring ssl.forward_proxy(no)
ssl.forward_proxy(https)
Where url_substring is: