<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TLS Renegotiation in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/tls-renegotiation/m-p/453392#M2222</link>
    <description>&lt;P&gt;Following - this is definitely a short-coming for a security vendor&lt;/P&gt;</description>
    <pubDate>Wed, 15 Dec 2021 17:34:16 GMT</pubDate>
    <dc:creator>David.Boggs</dc:creator>
    <dc:date>2021-12-15T17:34:16Z</dc:date>
    <item>
      <title>TLS Renegotiation</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/tls-renegotiation/m-p/351286#M432</link>
      <description>&lt;P&gt;I work for a DoD agency and they are starting to really crack down on TLS Renegotiation.&amp;nbsp; They are stating that we need to "disable insecure renegotiation: Secure Server not supported" or the offending application will be shutdown.&amp;nbsp; Our GlobalProtect VPN would be denied access from clients&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have opened a case with tech support and they are stating that TLS renegotiation is not a feature of Palo Alto.&amp;nbsp; They are not able to produce any documents supporting that argument so I can present it to the DoD agency threatening to turn off what would be our GlobalProtect VPN.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have run packet captures and I see the client hello with "Cipher Suite: TLS_EMPTY_RENEGOTIATION_INFO_SCSV (0x00ff)" and "Extension: renegotiation_info (len=1)".&amp;nbsp; This means the client is requesting a secure renegotiation.&amp;nbsp; Per RFC 5746, the server should or Palo Alto should abort the handshake if it is not capable of secure renegotiation.&amp;nbsp; I do not see the Palo Alto trying to abort the handshake but possibly ignoring it since the conversations keep going.&amp;nbsp; My assumption is that if it does not understand renegotiation, it would not know what to do with the flag.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am under the gun to find out since we would need to look for another VPN solution if Palo Alto does allow TLS renegotiation.&amp;nbsp; In addition, it is unknown when they implement TLS 1.3 for GlobalProtect.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone have an idea on what to look for in a packet capture or what they did to overcome this problem with TLS renegotiation and GlobalProtect?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Sep 2020 21:27:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/tls-renegotiation/m-p/351286#M432</guid>
      <dc:creator>ChrisCampbell1</dc:creator>
      <dc:date>2020-09-22T21:27:30Z</dc:date>
    </item>
    <item>
      <title>Re: TLS Renegotiation</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/tls-renegotiation/m-p/443534#M1933</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/115833"&gt;@ChrisCampbell1&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did you get your answer regarding secure renegotiation ?&lt;/P&gt;&lt;P&gt;Are there any current versions of PAN-OS that support secure renegotiation?&lt;BR /&gt;Inbound decryption SERVER-INITIATED Secure Renegotiation IS NOT supported.&lt;BR /&gt;Secure Renegotiatio----&amp;gt;Not supported ACTION NEEDED (more info)&lt;BR /&gt;Secure Client-Initiated Renegotiation---- &amp;gt;No&lt;/P&gt;&lt;P&gt;From palo alto side is it&amp;nbsp; possible to configure support secure renegotiation ?&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;if it is feature request then can you please provide me FR numbe&lt;/P&gt;</description>
      <pubDate>Tue, 26 Oct 2021 18:56:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/tls-renegotiation/m-p/443534#M1933</guid>
      <dc:creator>bit_byte</dc:creator>
      <dc:date>2021-10-26T18:56:29Z</dc:date>
    </item>
    <item>
      <title>Re: TLS Renegotiation</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/tls-renegotiation/m-p/453392#M2222</link>
      <description>&lt;P&gt;Following - this is definitely a short-coming for a security vendor&lt;/P&gt;</description>
      <pubDate>Wed, 15 Dec 2021 17:34:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/tls-renegotiation/m-p/453392#M2222</guid>
      <dc:creator>David.Boggs</dc:creator>
      <dc:date>2021-12-15T17:34:16Z</dc:date>
    </item>
    <item>
      <title>Re: TLS Renegotiation</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/tls-renegotiation/m-p/530893#M3687</link>
      <description>&lt;P&gt;Still nothing. Seems this would be a bigger issue to fix for them.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Feb 2023 16:08:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/tls-renegotiation/m-p/530893#M3687</guid>
      <dc:creator>CFedson</dc:creator>
      <dc:date>2023-02-13T16:08:45Z</dc:date>
    </item>
    <item>
      <title>Re: TLS Renegotiation</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/tls-renegotiation/m-p/534331#M3785</link>
      <description>&lt;P&gt;Same Issue for my Rocky9 Client with Openssl v3&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/268250"&gt;@CFedson&lt;/a&gt;&amp;nbsp;did u try the new PAN-OS 11 that was launched on 1th March? I will give it a try and give u an update if this fixed it.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Mar 2023 08:51:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/tls-renegotiation/m-p/534331#M3785</guid>
      <dc:creator>Melvin</dc:creator>
      <dc:date>2023-03-14T08:51:51Z</dc:date>
    </item>
    <item>
      <title>Re: TLS Renegotiation</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/tls-renegotiation/m-p/534344#M3786</link>
      <description>&lt;P&gt;We are still on 10.1 but if it is fixed on 11, that might be a good reason to push. Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 14 Mar 2023 14:17:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/tls-renegotiation/m-p/534344#M3786</guid>
      <dc:creator>CFedson</dc:creator>
      <dc:date>2023-03-14T14:17:36Z</dc:date>
    </item>
    <item>
      <title>Re: TLS Renegotiation</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/tls-renegotiation/m-p/538399#M3925</link>
      <description>&lt;P&gt;Any findings so far on it?&lt;/P&gt;</description>
      <pubDate>Wed, 12 Apr 2023 07:58:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/tls-renegotiation/m-p/538399#M3925</guid>
      <dc:creator>Aworriors</dc:creator>
      <dc:date>2023-04-12T07:58:58Z</dc:date>
    </item>
    <item>
      <title>Re: TLS Renegotiation</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/tls-renegotiation/m-p/538400#M3926</link>
      <description>&lt;P&gt;So we didn't update to the 11 OS. what i did is to use the openconnect Client for Linux with the Network Manager extension.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would come back when we have updated to 11 OS.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Apr 2023 08:03:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/tls-renegotiation/m-p/538400#M3926</guid>
      <dc:creator>Melvin</dc:creator>
      <dc:date>2023-04-12T08:03:38Z</dc:date>
    </item>
  </channel>
</rss>

