<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: intermediate certificates in Custom Signatures</title>
    <link>https://live.paloaltonetworks.com/t5/custom-signatures/intermediate-certificates/m-p/595485#M511</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/764"&gt;@smledv&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;As described here - &lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/decryption/troubleshoot-and-monitor-decryption/decryption-logs/repair-incomplete-certificate-chains" target="_blank"&gt;Repair Incomplete Certificate Chains (paloaltonetworks.com)&lt;/A&gt; the RFC standard requires the server to send the full chain of trust. Unfortunately it is very common to not follow the RFC, which prevent the firewall to verify the root CA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So in one perfect world we should expect server administrators to fix their servers instead of importing intermediate certificates to the network devices/firewalls.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I know the reality is far for that...Unfortunately I am not aware of any automated solution that could solve this.&lt;/P&gt;
&lt;P&gt;If you are not afraid to get your hands dirty with scripting, you may be able to achieve something with the steps described in the above link and some XML API calls to the firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The problem I am having with such automated approach is the lack of review from the administrator. I would personally prefer person to review the blocked page and verify if the intermediate certificate needs to be imported, or user is trying to access something that is potentially &lt;SPAN&gt;dangerous&lt;/SPAN&gt;.&lt;/P&gt;</description>
    <pubDate>Wed, 21 Aug 2024 14:41:24 GMT</pubDate>
    <dc:creator>aleksandar.astardzhiev</dc:creator>
    <dc:date>2024-08-21T14:41:24Z</dc:date>
    <item>
      <title>intermediate certificates</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/intermediate-certificates/m-p/592999#M508</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there a solution other than manually importing intermediate certificates into the Palo Alto Firewall (PAN-OS10.2.9-h1)?&lt;/P&gt;
&lt;P&gt;Since there are weekly a few websites with this problem popping up.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I already know the import procedure that is described in the knowledge base.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm66CAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm66CAC&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;for example:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.deepl.com" target="_blank"&gt;www.deepl.com &lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.i-doit.com/en/" target="_blank"&gt;https://www.i-doit.com/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;&lt;A class="fui-Link ___1rxvrpe f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1hu3pq6 f11qmguv f19f4twv f1tyq0we f1g0x7ka fhxju0i f1qch9an f1cnd47f fqv5qza f1vmzxwi f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://www.fabrilscavone.com.br/" href="https://www.fabrilscavone.com.br/" target="_blank" rel="noreferrer noopener" aria-label="Link www.fabrilscavone.com.br"&gt;www.fabrilscavone.com.br&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;(Deepl.com on Second DNS IP)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks in advance&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2024 13:17:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/intermediate-certificates/m-p/592999#M508</guid>
      <dc:creator>smledv</dc:creator>
      <dc:date>2024-07-25T13:17:53Z</dc:date>
    </item>
    <item>
      <title>Re: intermediate certificates</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/intermediate-certificates/m-p/595485#M511</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/764"&gt;@smledv&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;As described here - &lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/decryption/troubleshoot-and-monitor-decryption/decryption-logs/repair-incomplete-certificate-chains" target="_blank"&gt;Repair Incomplete Certificate Chains (paloaltonetworks.com)&lt;/A&gt; the RFC standard requires the server to send the full chain of trust. Unfortunately it is very common to not follow the RFC, which prevent the firewall to verify the root CA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So in one perfect world we should expect server administrators to fix their servers instead of importing intermediate certificates to the network devices/firewalls.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I know the reality is far for that...Unfortunately I am not aware of any automated solution that could solve this.&lt;/P&gt;
&lt;P&gt;If you are not afraid to get your hands dirty with scripting, you may be able to achieve something with the steps described in the above link and some XML API calls to the firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The problem I am having with such automated approach is the lack of review from the administrator. I would personally prefer person to review the blocked page and verify if the intermediate certificate needs to be imported, or user is trying to access something that is potentially &lt;SPAN&gt;dangerous&lt;/SPAN&gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 14:41:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/intermediate-certificates/m-p/595485#M511</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2024-08-21T14:41:24Z</dc:date>
    </item>
  </channel>
</rss>

