<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: LDAPS TLS Handshake Failure in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ldaps-tls-handshake-failure/m-p/553784#M1730</link>
    <description>&lt;P&gt;Hello Oliver,&lt;/P&gt;
&lt;P&gt;Thank you for advice.&lt;/P&gt;
&lt;P&gt;I've already checked the cert on the DC and also tried to replace it by stronger cert (RSA3072 | SHA384), but with no luck.Your advice I checked too. There is a difference: in case the DC uses RSA2048 or RSA3072 cert, the NGFW sends RST packet right after "Server Hello" message, in other case when it uses RSA4096 - the DC sends RST packet right after Client Hello message. I'm going to check if it related on Microsoft OS version.&lt;/P&gt;
&lt;P&gt;DM&lt;/P&gt;</description>
    <pubDate>Tue, 15 Aug 2023 14:18:28 GMT</pubDate>
    <dc:creator>m0tash</dc:creator>
    <dc:date>2023-08-15T14:18:28Z</dc:date>
    <item>
      <title>LDAPS TLS Handshake Failure</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ldaps-tls-handshake-failure/m-p/553634#M1718</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I upgraded one of our PA devices from 10.1.9 to 10.2.4-h4. LDAPS was configured to access and gather user's info from DC. But it stoped working after upgrade. I captured traffic and saw following error - TLS Handshake Failure. I know that starting version 10.2 Palo Alto Networks has changed requrements for certificates. I checked ours and looks like it meets minimal certifcate requerements (RSA2048, SHA256). Currently we use LDAP but I'd like to switch back to LDAPS.&lt;/P&gt;
&lt;P&gt;I appreciate any help.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Aug 2023 10:13:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ldaps-tls-handshake-failure/m-p/553634#M1718</guid>
      <dc:creator>m0tash</dc:creator>
      <dc:date>2023-08-14T10:13:54Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS TLS Handshake Failure</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ldaps-tls-handshake-failure/m-p/553725#M1726</link>
      <description>&lt;P&gt;Hello M0tash,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you check the parameters of the certificate on the server side (LDAP server)?&lt;BR /&gt;Increase the security level of the certificate (for instance : number of bits to 4096 bits // digest SHA512) and check if this works.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Olivier&lt;/P&gt;</description>
      <pubDate>Tue, 15 Aug 2023 03:29:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ldaps-tls-handshake-failure/m-p/553725#M1726</guid>
      <dc:creator>ozheng</dc:creator>
      <dc:date>2023-08-15T03:29:45Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS TLS Handshake Failure</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ldaps-tls-handshake-failure/m-p/553784#M1730</link>
      <description>&lt;P&gt;Hello Oliver,&lt;/P&gt;
&lt;P&gt;Thank you for advice.&lt;/P&gt;
&lt;P&gt;I've already checked the cert on the DC and also tried to replace it by stronger cert (RSA3072 | SHA384), but with no luck.Your advice I checked too. There is a difference: in case the DC uses RSA2048 or RSA3072 cert, the NGFW sends RST packet right after "Server Hello" message, in other case when it uses RSA4096 - the DC sends RST packet right after Client Hello message. I'm going to check if it related on Microsoft OS version.&lt;/P&gt;
&lt;P&gt;DM&lt;/P&gt;</description>
      <pubDate>Tue, 15 Aug 2023 14:18:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ldaps-tls-handshake-failure/m-p/553784#M1730</guid>
      <dc:creator>m0tash</dc:creator>
      <dc:date>2023-08-15T14:18:28Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS TLS Handshake Failure</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ldaps-tls-handshake-failure/m-p/553872#M1736</link>
      <description>&lt;P&gt;Hello M0tash,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I did not ask, but your management interface is initiating the traffic to the LDAPS servers or you are using a service route?&lt;/P&gt;
&lt;P&gt;If you use the management interface, is the traffic passing through a firewall doing some decryption?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It can be interesting to capture the communication if you're opening a case to TAC (or the TAC engineer can also do the capture too).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Olivier&lt;/P&gt;</description>
      <pubDate>Wed, 16 Aug 2023 01:55:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ldaps-tls-handshake-failure/m-p/553872#M1736</guid>
      <dc:creator>ozheng</dc:creator>
      <dc:date>2023-08-16T01:55:47Z</dc:date>
    </item>
    <item>
      <title>Re: LDAPS TLS Handshake Failure</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ldaps-tls-handshake-failure/m-p/553912#M1737</link>
      <description>&lt;P&gt;Hello Oliver,&lt;/P&gt;
&lt;P&gt;I checked it on my test enviroment too. Mgmt interface is used for communication to DC, there is no configured service route for that. Mgmt interface and DC are in same subnet, there is no additional FWs between devices. Ok, I'll try to open TAC.&lt;/P&gt;
&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Wed, 16 Aug 2023 07:12:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ldaps-tls-handshake-failure/m-p/553912#M1737</guid>
      <dc:creator>m0tash</dc:creator>
      <dc:date>2023-08-16T07:12:59Z</dc:date>
    </item>
  </channel>
</rss>

