<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Dell Root Certificate &amp;quot;eDellRoot&amp;quot; in Custom Signatures</title>
    <link>https://live.paloaltonetworks.com/t5/custom-signatures/dell-root-certificate-quot-edellroot-quot/m-p/68567#M15</link>
    <description>&lt;P&gt;Good afternoon, all!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Researchers have discovered a trusted root certificate being deployed by Dell on some newer laptops. For reference, see &lt;A href="http://en.community.dell.com/dell-blogs/direct2dell/b/direct2dell/archive/2015/11/23/response-to-concerns-regarding-edellroot-certificate" target="_self"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;While an official signature from Palo Alto Networks is&amp;nbsp;likely not forthcoming due to legitimate usage of the certificate, customers who do wish to alert when this certificate is detected by their PAN-OS appliance&amp;nbsp;can use the exposed custom signature context "SSL-RSP-CERTIFICATE" to check for it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The attached signature, exported from a 7.0.3 PAN-OS device, does just that.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please note that this signature is:&lt;BR /&gt;&lt;BR /&gt;A) Not supported by Palo Alto Networks&lt;/P&gt;
&lt;P&gt;B) Just an example to show what can be done with our exposed custom signature contexts, and can definitely be improved upon.&lt;/P&gt;
&lt;P&gt;C) This signature was tested by visiting the site researcher Kenn White stood up to show what kind of security concerns may arise by this certificate being trusted. I will not provide the URL here, but it can quickly be found in Google, and is referenced in the Ars Technica article written about the issue.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Additionally, and I cannot stress this enough,&amp;nbsp;&lt;EM&gt;it is not a solution for the security vulnerability exposed by the presence of this certificate.&lt;/EM&gt; Please follow Dell's guidance on the issue.&lt;/P&gt;</description>
    <pubDate>Thu, 26 Nov 2015 17:08:46 GMT</pubDate>
    <dc:creator>rcole</dc:creator>
    <dc:date>2015-11-26T17:08:46Z</dc:date>
    <item>
      <title>Dell Root Certificate "eDellRoot"</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/dell-root-certificate-quot-edellroot-quot/m-p/68567#M15</link>
      <description>&lt;P&gt;Good afternoon, all!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Researchers have discovered a trusted root certificate being deployed by Dell on some newer laptops. For reference, see &lt;A href="http://en.community.dell.com/dell-blogs/direct2dell/b/direct2dell/archive/2015/11/23/response-to-concerns-regarding-edellroot-certificate" target="_self"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;While an official signature from Palo Alto Networks is&amp;nbsp;likely not forthcoming due to legitimate usage of the certificate, customers who do wish to alert when this certificate is detected by their PAN-OS appliance&amp;nbsp;can use the exposed custom signature context "SSL-RSP-CERTIFICATE" to check for it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The attached signature, exported from a 7.0.3 PAN-OS device, does just that.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please note that this signature is:&lt;BR /&gt;&lt;BR /&gt;A) Not supported by Palo Alto Networks&lt;/P&gt;
&lt;P&gt;B) Just an example to show what can be done with our exposed custom signature contexts, and can definitely be improved upon.&lt;/P&gt;
&lt;P&gt;C) This signature was tested by visiting the site researcher Kenn White stood up to show what kind of security concerns may arise by this certificate being trusted. I will not provide the URL here, but it can quickly be found in Google, and is referenced in the Ars Technica article written about the issue.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Additionally, and I cannot stress this enough,&amp;nbsp;&lt;EM&gt;it is not a solution for the security vulnerability exposed by the presence of this certificate.&lt;/EM&gt; Please follow Dell's guidance on the issue.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Nov 2015 17:08:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/dell-root-certificate-quot-edellroot-quot/m-p/68567#M15</guid>
      <dc:creator>rcole</dc:creator>
      <dc:date>2015-11-26T17:08:46Z</dc:date>
    </item>
  </channel>
</rss>

