<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: RCS Chats from iPhone (IOS 18) broken in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/rcs-chats-from-iphone-ios-18-broken/m-p/1002084#M5355</link>
    <description>&lt;P&gt;In the event that anyone stumbles on this post here is what you need to know:&lt;BR /&gt;RCS uses 5223 than 443.&amp;nbsp; If your internet data is going straight out the firewall that's fine you can get it working with SSL on those ports.&amp;nbsp; If your org has some sort of proxy or other internet filtering service or split NATing that will send the data out for TCP 5223 via one Public IP and then something (like a proxy) grabs the TCP 443 and send it out a different way via different public IP it breaks.&amp;nbsp; Solution is to fully bypass anything that makes these who data streams from the iPhone appear different.&lt;BR /&gt;&lt;BR /&gt;destinations are *.rcs.telephony.goog &amp;amp;&amp;nbsp;216.239.36.131 - 134&lt;/P&gt;</description>
    <pubDate>Thu, 09 Jan 2025 19:52:07 GMT</pubDate>
    <dc:creator>DrewNumberTwo</dc:creator>
    <dc:date>2025-01-09T19:52:07Z</dc:date>
    <item>
      <title>RCS Chats from iPhone (IOS 18) broken</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/rcs-chats-from-iphone-ios-18-broken/m-p/999996#M5315</link>
      <description>&lt;P&gt;A fun problem got brought up that now that Apple surprisingly supports RCS (Google's SMS replacement) and for some reason it does not function on our networks.&lt;BR /&gt;&lt;BR /&gt;I can see in our internet firewall that there is a TCP 5223 session to&amp;nbsp;&lt;SPAN&gt;us.verizon.rcs.telephony.goog (216.239.36.131) from our test client.&amp;nbsp; That session is valid, I have a 3way handshake, I can see the Server/Client Hello and it would appear from every piece of info I can see this should be working - yet it seems to not be able to send or receive RCS messages.&amp;nbsp; There is no SSL decryption at play here.&lt;BR /&gt;&lt;BR /&gt;Anyone seem this or dealt with it previously to have any clues about why this might be failing?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jan 2025 19:11:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/rcs-chats-from-iphone-ios-18-broken/m-p/999996#M5315</guid>
      <dc:creator>DrewNumberTwo</dc:creator>
      <dc:date>2025-01-02T19:11:02Z</dc:date>
    </item>
    <item>
      <title>Re: RCS Chats from iPhone (IOS 18) broken</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/rcs-chats-from-iphone-ios-18-broken/m-p/1000131#M5328</link>
      <description>&lt;P&gt;Yep, i'm seeing this as well. Its being denied ( interzone-default)&amp;nbsp; The RCS is indeed on TCP&amp;nbsp; 5223 SSL for Iphone but appears only for initial handshake or something. Once rcs communication is successful, it then uses 443 for all communication thereafter.&amp;nbsp; i'm going to assume you have a basic rule for internet outgoing with "application default" &amp;nbsp; I believe this will block 5223 on ssl.&amp;nbsp; Create a new rule allow tcp 5223 / ssl&amp;nbsp; going to the noted IP.&amp;nbsp; ((216.239.36.131)&amp;nbsp; and for the devices required.&amp;nbsp; I've tested this on my 440 and confirmed working.&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2025 02:49:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/rcs-chats-from-iphone-ios-18-broken/m-p/1000131#M5328</guid>
      <dc:creator>NeilG</dc:creator>
      <dc:date>2025-01-06T02:49:33Z</dc:date>
    </item>
    <item>
      <title>Re: RCS Chats from iPhone (IOS 18) broken</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/rcs-chats-from-iphone-ios-18-broken/m-p/1000299#M5339</link>
      <description>&lt;P&gt;We have a proxy in play which complicates things.&amp;nbsp; We know there is SSL on 5223 and on 443 but are unsure which happens first.&amp;nbsp; I theorize that the fact that the two ports would exit our network as two different public NATs may be the root of the issue at present.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jan 2025 19:12:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/rcs-chats-from-iphone-ios-18-broken/m-p/1000299#M5339</guid>
      <dc:creator>DrewNumberTwo</dc:creator>
      <dc:date>2025-01-07T19:12:15Z</dc:date>
    </item>
    <item>
      <title>Re: RCS Chats from iPhone (IOS 18) broken</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/rcs-chats-from-iphone-ios-18-broken/m-p/1002084#M5355</link>
      <description>&lt;P&gt;In the event that anyone stumbles on this post here is what you need to know:&lt;BR /&gt;RCS uses 5223 than 443.&amp;nbsp; If your internet data is going straight out the firewall that's fine you can get it working with SSL on those ports.&amp;nbsp; If your org has some sort of proxy or other internet filtering service or split NATing that will send the data out for TCP 5223 via one Public IP and then something (like a proxy) grabs the TCP 443 and send it out a different way via different public IP it breaks.&amp;nbsp; Solution is to fully bypass anything that makes these who data streams from the iPhone appear different.&lt;BR /&gt;&lt;BR /&gt;destinations are *.rcs.telephony.goog &amp;amp;&amp;nbsp;216.239.36.131 - 134&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2025 19:52:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/rcs-chats-from-iphone-ios-18-broken/m-p/1002084#M5355</guid>
      <dc:creator>DrewNumberTwo</dc:creator>
      <dc:date>2025-01-09T19:52:07Z</dc:date>
    </item>
  </channel>
</rss>

