<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic [RFC5746] issue with ssl decryption: openssl3.0 unsafe legacy renegotiation disabled in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/rfc5746-issue-with-ssl-decryption-openssl3-0-unsafe-legacy/m-p/511171#M3058</link>
    <description>&lt;P&gt;Since I upgraded to the lastest fedora, all of my python/ansible script failed when they are decrypted by our palo alto ssl outbound policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After some diging, fedora 35 was using openssl 1.1.1 and fedora 36 switched to openssl 3.0: &lt;A href="https://fedoraproject.org/wiki/Changes/OpenSSL3.0" target="_blank"&gt;https://fedoraproject.org/wiki/Changes/OpenSSL3.0&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the openssl 3.0 changelog, we can find this:&lt;/P&gt;
&lt;P&gt;OPENSSL changelog between 1.1.1 and 3.0.0 [7 sep 2021] contains:&lt;/P&gt;
&lt;P&gt;* Support for RFC 5746 secure renegotiation is now required by default for SSL or TLS connections to succeed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I found &lt;A href="https://stackoverflow.com/questions/71603314/ssl-error-unsafe-legacy-renegotiation-disabled" target="_self"&gt;a post on a stackoverflow&amp;nbsp;&lt;/A&gt;that explain how to reenable unsecure renegociation to have a quick fix. This won't be a good solution when all our devs will be using linux and dockers with openssl 3.0 installed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there a way to configure ssl decryption on the palo alto to enable secure renegociation ? &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 07 Aug 2022 23:22:25 GMT</pubDate>
    <dc:creator>VincentCollier</dc:creator>
    <dc:date>2022-08-07T23:22:25Z</dc:date>
    <item>
      <title>[RFC5746] issue with ssl decryption: openssl3.0 unsafe legacy renegotiation disabled</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/rfc5746-issue-with-ssl-decryption-openssl3-0-unsafe-legacy/m-p/511171#M3058</link>
      <description>&lt;P&gt;Since I upgraded to the lastest fedora, all of my python/ansible script failed when they are decrypted by our palo alto ssl outbound policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After some diging, fedora 35 was using openssl 1.1.1 and fedora 36 switched to openssl 3.0: &lt;A href="https://fedoraproject.org/wiki/Changes/OpenSSL3.0" target="_blank"&gt;https://fedoraproject.org/wiki/Changes/OpenSSL3.0&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the openssl 3.0 changelog, we can find this:&lt;/P&gt;
&lt;P&gt;OPENSSL changelog between 1.1.1 and 3.0.0 [7 sep 2021] contains:&lt;/P&gt;
&lt;P&gt;* Support for RFC 5746 secure renegotiation is now required by default for SSL or TLS connections to succeed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I found &lt;A href="https://stackoverflow.com/questions/71603314/ssl-error-unsafe-legacy-renegotiation-disabled" target="_self"&gt;a post on a stackoverflow&amp;nbsp;&lt;/A&gt;that explain how to reenable unsecure renegociation to have a quick fix. This won't be a good solution when all our devs will be using linux and dockers with openssl 3.0 installed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there a way to configure ssl decryption on the palo alto to enable secure renegociation ? &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 07 Aug 2022 23:22:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/rfc5746-issue-with-ssl-decryption-openssl3-0-unsafe-legacy/m-p/511171#M3058</guid>
      <dc:creator>VincentCollier</dc:creator>
      <dc:date>2022-08-07T23:22:25Z</dc:date>
    </item>
    <item>
      <title>Re: [RFC5746] issue with ssl decryption: openssl3.0 unsafe legacy renegotiation disabled</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/rfc5746-issue-with-ssl-decryption-openssl3-0-unsafe-legacy/m-p/549471#M4212</link>
      <description>&lt;P&gt;This will be supported natively in the following versions:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;11.0.2 - ETA July 2023&lt;/DIV&gt;
&lt;DIV&gt;10.2.5 - ETA&amp;nbsp; August 2023&lt;/DIV&gt;
&lt;DIV&gt;10.1.11 - ETA - September 2023&lt;/DIV&gt;
&lt;DIV&gt;9.1.17 - ETA October 2023&lt;/DIV&gt;</description>
      <pubDate>Mon, 17 Jul 2023 02:25:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/rfc5746-issue-with-ssl-decryption-openssl3-0-unsafe-legacy/m-p/549471#M4212</guid>
      <dc:creator>JC_PANW</dc:creator>
      <dc:date>2023-07-17T02:25:16Z</dc:date>
    </item>
    <item>
      <title>Re: [RFC5746] issue with ssl decryption: openssl3.0 unsafe legacy renegotiation disabled</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/rfc5746-issue-with-ssl-decryption-openssl3-0-unsafe-legacy/m-p/563103#M4561</link>
      <description>&lt;P&gt;Looks like it's there now:&lt;/P&gt;
&lt;P&gt;10.2.5 and 10.1.10&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-release-notes/pan-os-10-2-5-known-and-addressed-issues/pan-os-10-2-5-addressed-issues" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-release-notes/pan-os-10-2-5-known-and-addressed-issues/pan-os-10-2-5-addressed-issues&lt;/A&gt;&lt;/P&gt;
&lt;TABLE class="table colsep rowsep  table-striped"&gt;
&lt;TBODY class="tbody"&gt;
&lt;TR class="row rowsep"&gt;
&lt;TD class="entry"&gt;
&lt;DIV&gt;
&lt;DIV class="p"&gt;
&lt;DIV&gt;
&lt;DIV&gt;PAN-184630&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD class="entry relcol"&gt;
&lt;DIV&gt;
&lt;DIV class="p"&gt;
&lt;DIV&gt;Fixed an issue where TLS clients, such as those using OpenSSL 3.0, enforced the TLS renegotiation extension (RFC 5746).&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Wed, 25 Oct 2023 11:31:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/rfc5746-issue-with-ssl-decryption-openssl3-0-unsafe-legacy/m-p/563103#M4561</guid>
      <dc:creator>Will_Embrey</dc:creator>
      <dc:date>2023-10-25T11:31:27Z</dc:date>
    </item>
  </channel>
</rss>

