<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect appliance PCI Compliance in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-appliance-pci-compliance/m-p/510116#M3037</link>
    <description>&lt;P&gt;It seems to have been an issue with the PCI compliance scanner.&lt;/P&gt;
&lt;P&gt;We submitted the ssllabs.com report to them and they accepted it and passed.&lt;/P&gt;</description>
    <pubDate>Thu, 28 Jul 2022 02:03:09 GMT</pubDate>
    <dc:creator>wholetthedogsout</dc:creator>
    <dc:date>2022-07-28T02:03:09Z</dc:date>
    <item>
      <title>GlobalProtect appliance PCI Compliance</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-appliance-pci-compliance/m-p/509870#M3029</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;We're trying to get our VPN appliance PCI compliant and not sure what is going on, as it's automatically failing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Minimum TLS is 1.2 and have disabled all the weak key exchanges. This was done prior to any PCI compliance requirement.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When we run the SSL test on ssllabs.com, we're getting an A-.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The PCI report contains the below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;THREAT:&lt;BR /&gt;QID Detection Logic:&lt;BR /&gt;For a SSL enabled port, the scanner probes and maintains a list of supported SSL/TLS versions. For each supported version, the scanner does a SSL handshake to get a &lt;BR /&gt;list of KEX methods supported by the server. It reports all KEX methods that are considered weak. The criteria of a weak KEX method is as follows:&lt;BR /&gt;The SSL/TLS server supports key exchanges that are cryptographically weaker than recommended. Key exchanges should provide at least 112 bits of security, which &lt;BR /&gt;translates to a minimum key size of 2048 bits for Diffie Hellman and RSA key exchanges.&lt;/P&gt;
&lt;P&gt;IMPACT:&lt;BR /&gt;An attacker with access to sufficient computational power might be able to recover the session key and decrypt session content.&lt;/P&gt;
&lt;P&gt;SOLUTION:&lt;BR /&gt;Change the SSL/TLS server configuration to only allow strong key exchanges. Key exchanges should provide at least 112 bits of security, which translates to a minimum &lt;BR /&gt;key size of 2048 bits for Diffie Hellman and RSA key exchanges.&lt;/P&gt;
&lt;P&gt;RESULT:&lt;BR /&gt;PROTOCOL NAME GROUP KEY-SIZE FORWARD-SECRET CLASSICAL-STRENGTH QUANTUM&amp;#2;STRENGTH&lt;BR /&gt;TLSv1.2 ECDHE secp192r1 192 yes 96 low&lt;BR /&gt;TLSv1.2 ECDHE secp192k1 192 yes 96 low&lt;BR /&gt;TLSv1.2 ECDHE secp160r2 160 yes 80 low&lt;BR /&gt;TLSv1.2 ECDHE secp160r1 160 yes 80 low&lt;BR /&gt;TLSv1.2 ECDHE secp160k1 160 yes 80 low&lt;BR /&gt;TLSv1.2 ECDHE sect193r2 193 yes 96 low&lt;BR /&gt;TLSv1.2 ECDHE sect193r1 193 yes 96 low&lt;BR /&gt;TLSv1.2 ECDHE sect163r2 163 yes 81 low&lt;BR /&gt;TLSv1.2 ECDHE sect163r1 163 yes 81 low&lt;BR /&gt;TLSv1.2 ECDHE sect163k1 163 yes 81 low&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The appliance is running 9.1.8.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any ideas on how to resolve it?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2022 03:54:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-appliance-pci-compliance/m-p/509870#M3029</guid>
      <dc:creator>wholetthedogsout</dc:creator>
      <dc:date>2022-07-26T03:54:49Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect appliance PCI Compliance</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-appliance-pci-compliance/m-p/510049#M3032</link>
      <description>&lt;P&gt;Me too! Have you figured it out yet?&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2022 13:26:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-appliance-pci-compliance/m-p/510049#M3032</guid>
      <dc:creator>PatrickMurphy</dc:creator>
      <dc:date>2022-07-27T13:26:14Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect appliance PCI Compliance</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-appliance-pci-compliance/m-p/510066#M3035</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Feature Request ID:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;19980. Customer is requesting the ability to individually select which Elliptical Curves are used with ECDHA on sessions. Currently several easily broken curves are in use and undocumented, however, vulnerability scanners such as Qualys has discovered this weakness. The ability for a customer to select which curves are available for use provides a simple mechanism to alleviate this issue.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Currently it is unresolved. We have no CVE indicating vulnerability. Please reach out to your SE to be added to the FR.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2022 17:17:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-appliance-pci-compliance/m-p/510066#M3035</guid>
      <dc:creator>jmora</dc:creator>
      <dc:date>2022-07-27T17:17:06Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect appliance PCI Compliance</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-appliance-pci-compliance/m-p/510116#M3037</link>
      <description>&lt;P&gt;It seems to have been an issue with the PCI compliance scanner.&lt;/P&gt;
&lt;P&gt;We submitted the ssllabs.com report to them and they accepted it and passed.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jul 2022 02:03:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-appliance-pci-compliance/m-p/510116#M3037</guid>
      <dc:creator>wholetthedogsout</dc:creator>
      <dc:date>2022-07-28T02:03:09Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect appliance PCI Compliance</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-appliance-pci-compliance/m-p/510768#M3053</link>
      <description>&lt;P&gt;Have we had any movement on this? Or any solution? Got quite a few customers complaining about this at the moment.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Aug 2022 11:42:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-appliance-pci-compliance/m-p/510768#M3053</guid>
      <dc:creator>AlexHepworth</dc:creator>
      <dc:date>2022-08-04T11:42:01Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect appliance PCI Compliance</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-appliance-pci-compliance/m-p/511086#M3055</link>
      <description>&lt;P&gt;if you want to customise the ssl-tls-profile to get an A or A+&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;create a new ssl/tls profile for globalprotect then using the cli modify the globalprotect profile to remove the unwanted combinations&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;see example below&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;TestSSL {&lt;BR /&gt;protocol-settings {&lt;BR /&gt;min-version tls1-2;&lt;BR /&gt;max-version tls1-2;&lt;BR /&gt;auth-algo-sha1 no;&lt;BR /&gt;auth-algo-sha256 no;&lt;BR /&gt;auth-algo-sha384 yes;&lt;BR /&gt;enc-algo-3des no;&lt;BR /&gt;enc-algo-aes-128-cbc no;&lt;BR /&gt;enc-algo-aes-128-gcm no;&lt;BR /&gt;enc-algo-aes-256-cbc yes;&lt;BR /&gt;enc-algo-aes-256-gcm yes;&lt;BR /&gt;enc-algo-rc4 no;&lt;BR /&gt;keyxchg-algo-dhe yes;&lt;BR /&gt;keyxchg-algo-ecdhe yes;&lt;BR /&gt;keyxchg-algo-rsa no;&lt;BR /&gt;}&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;set shared ssl-tls-service-profile protocol-settings auth-algo-sha1 no&lt;BR /&gt;set shared ssl-tls-service-profile protocol-settings keyxchg-algo-rsa no&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Aug 2022 04:26:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-appliance-pci-compliance/m-p/511086#M3055</guid>
      <dc:creator>JeremyD</dc:creator>
      <dc:date>2022-08-05T04:26:32Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect appliance PCI Compliance</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-appliance-pci-compliance/m-p/513394#M3118</link>
      <description>&lt;P&gt;Unfortunately, this still fails for our scan. ECDHE needs to be disabled for ours to pass.&lt;/P&gt;
&lt;P&gt;However setting&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;set shared ssl-tls-service-profile protocol-settings keyxchg-algo-rsa yes&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;set shared ssl-tls-service-profile protocol-settings keyxchg-algo-ecdhe no&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;passes PCI scans, but then users with apple devices (and some windows) cannot connect. It will not proceed past the pre-auth stage, even though the last log entry is "success".&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Aug 2022 19:54:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-appliance-pci-compliance/m-p/513394#M3118</guid>
      <dc:creator>JamesPlonsky</dc:creator>
      <dc:date>2022-08-30T19:54:32Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect appliance PCI Compliance</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-appliance-pci-compliance/m-p/513408#M3120</link>
      <description>&lt;P&gt;looking at the supported release guidance post - 9.1.8, it might be worth upgrading the appliance past 9.1.8.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/customer-resources/support-pan-os-software-release-guidance/ta-p/258304" target="_blank"&gt;https://live.paloaltonetworks.com/t5/customer-resources/support-pan-os-software-release-guidance/ta-p/258304&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2022 00:15:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-appliance-pci-compliance/m-p/513408#M3120</guid>
      <dc:creator>JeremyD</dc:creator>
      <dc:date>2022-08-31T00:15:12Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect appliance PCI Compliance</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-appliance-pci-compliance/m-p/513418#M3121</link>
      <description>&lt;P&gt;We're having the exact same problem as well and an ssllabs.com report was not accepted.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2022 03:18:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-appliance-pci-compliance/m-p/513418#M3121</guid>
      <dc:creator>BradVC</dc:creator>
      <dc:date>2022-08-31T03:18:11Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect appliance PCI Compliance</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-appliance-pci-compliance/m-p/513552#M3124</link>
      <description>&lt;P&gt;We are on the latest release of the 9.1.x code. There is no fix for this.&lt;/P&gt;
&lt;P&gt;The only workaround we have is to disable the ECDHE key exchange, and all the weak RSA ciphers. This does give us an approved scan.&lt;/P&gt;
&lt;P&gt;However, this breaks the application for Apple devices (and any others) that look for the ECDHE keys almost exclusively. In GlobalProtect, the user is left with a blank white box, and cannot enter credentials.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2022 15:33:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-appliance-pci-compliance/m-p/513552#M3124</guid>
      <dc:creator>JamesPlonsky</dc:creator>
      <dc:date>2022-08-31T15:33:49Z</dc:date>
    </item>
  </channel>
</rss>

