<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Detecting TLS 1.0 and TLS 1.1 Protocol in Custom Signatures</title>
    <link>https://live.paloaltonetworks.com/t5/custom-signatures/detecting-tls-1-0-and-tls-1-1-protocol/m-p/504925#M431</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/223954"&gt;@JTKoris&lt;/a&gt;&amp;nbsp;and&amp;nbsp;@Retired Member&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is KB article&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008UgRCAU" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008UgRCAU&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Himani&lt;/P&gt;</description>
    <pubDate>Mon, 20 Jun 2022 14:35:57 GMT</pubDate>
    <dc:creator>hisingh</dc:creator>
    <dc:date>2022-06-20T14:35:57Z</dc:date>
    <item>
      <title>Detecting TLS 1.0 and TLS 1.1 Protocol</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/detecting-tls-1-0-and-tls-1-1-protocol/m-p/192889#M223</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I working with a customer that needs to detect the usage of SSLv3(already done with ID 36815), TLS 1.0 and TLS 1.1, at some point they may move to blocking this on certain traffic. They don't particularly want decrypt the traffic for this due to complaince and organizational policies, and they want to be able to run reports so doing a No decrypt with a profile isn't exactly helpful either.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems like the best way to accomplish this is through a threat signature that would have either the SSL Client or the Server Hello context which contains the protocal version is 0x030#. This is only 2 of the 7 required bytes so I am not positive what else to match on. Alternatively, with TLS can you still do an equal to match on SSL-rsp-version and if so what values to the TLS versions much against? Would it be 4,5,6?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;</description>
      <pubDate>Fri, 22 Dec 2017 16:04:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/detecting-tls-1-0-and-tls-1-1-protocol/m-p/192889#M223</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2017-12-22T16:04:29Z</dc:date>
    </item>
    <item>
      <title>Re: Detecting TLS 1.0 and TLS 1.1 Protocol</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/detecting-tls-1-0-and-tls-1-1-protocol/m-p/194404#M232</link>
      <description>&lt;P&gt;As an update to this, it can be accomplished using a custom Threat and the equal to operate to match against the Context of SSL-RSP-version. The values that are needed to match against&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;TLS 1.0 is decimal 769&amp;nbsp; (0x030&lt;/LI&gt;&lt;LI&gt;TLS 1.1 is decimal 770&lt;/LI&gt;&lt;LI&gt;TLS 1.2 is decimal 771&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Example TLS 1.0" style="width: 381px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13180i47C3AB5CC761B218/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="image.png" alt="Example TLS 1.0" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Example TLS 1.0&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I &lt;U&gt;&lt;STRONG&gt;do not&lt;/STRONG&gt;&lt;/U&gt; recommend leaving the TLS 1.2 threat in an alert mode if you create it but instead change it to allow as it will be extremely noisy. It is however useful if you need to verify the functionality&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;These 3 custom vulnerabilities will allow you the capability of alerting or blocking lower level TLS encryption if areas that might require it for complaince such as PCI zones.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Alternatively you can also use decryption profiles to force the traffic to the high level, but it does not produce the same logs for visibility.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The attatched XML is the example threat signature to look for TLS1.0 responses.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2018 15:23:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/detecting-tls-1-0-and-tls-1-1-protocol/m-p/194404#M232</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2018-01-09T15:23:12Z</dc:date>
    </item>
    <item>
      <title>Re: Detecting TLS 1.0 and TLS 1.1 Protocol</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/detecting-tls-1-0-and-tls-1-1-protocol/m-p/504898#M430</link>
      <description>&lt;P&gt;Hi Ben,&lt;BR /&gt;&lt;BR /&gt;A couple of years behind but appear to be faced with a similar query from a customer I am currently working with.&lt;BR /&gt;&lt;BR /&gt;Essentially wanting to go about achieving the same - creating a log entry of each time TLS 1.0 or 1.1 is used by clients accessing their domain.&lt;BR /&gt;&lt;BR /&gt;With your suggestion, could you clarify what area of configuration you are going into in order to apply this or better yet, a resource of which shows how to go about this step by step?&lt;BR /&gt;&lt;BR /&gt;Essentially want to go about the same idea suggested just not wholly confident on where in the Palo Alto you would do this - any pointers would be greatly appreciated.&lt;BR /&gt;&lt;BR /&gt;Kind regards,&lt;BR /&gt;&lt;BR /&gt;JT&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2022 11:06:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/detecting-tls-1-0-and-tls-1-1-protocol/m-p/504898#M430</guid>
      <dc:creator>JTKoris</dc:creator>
      <dc:date>2022-06-20T11:06:31Z</dc:date>
    </item>
    <item>
      <title>Re: Detecting TLS 1.0 and TLS 1.1 Protocol</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/detecting-tls-1-0-and-tls-1-1-protocol/m-p/504925#M431</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/223954"&gt;@JTKoris&lt;/a&gt;&amp;nbsp;and&amp;nbsp;@Retired Member&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is KB article&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008UgRCAU" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008UgRCAU&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Himani&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2022 14:35:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/detecting-tls-1-0-and-tls-1-1-protocol/m-p/504925#M431</guid>
      <dc:creator>hisingh</dc:creator>
      <dc:date>2022-06-20T14:35:57Z</dc:date>
    </item>
  </channel>
</rss>

