<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What is Certificate Pinning and how to deal with SSL Decryption in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/what-is-certificate-pinning-and-how-to-deal-with-ssl-decryption/m-p/1236714#M6241</link>
    <description>&lt;P&gt;We shall see what vendor comes to surface with a solution for this in the future. Unfortunately, now you cannot see any malicious content in encrypted ssl packets.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 26 Aug 2025 12:59:22 GMT</pubDate>
    <dc:creator>S_Williams901</dc:creator>
    <dc:date>2025-08-26T12:59:22Z</dc:date>
    <item>
      <title>What is Certificate Pinning and how to deal with SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/what-is-certificate-pinning-and-how-to-deal-with-ssl-decryption/m-p/571722#M2362</link>
      <description>&lt;P&gt;Certificate pinning was developped to help prevent man in the middle attack.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But what is the Certificate Pinning?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Traditionally, SSL Handshake consists on the validation of the server’s certificate, let’s say collab.com. The validation is done using the CA’s certificate located in the certificate store of the web browser.&lt;/P&gt;
&lt;P&gt;The certificate store contains several CA Certificates, may be more than 100.&lt;/P&gt;
&lt;P&gt;If at least one CA delivers by mistake or more likely to conduct an attack a valid certificate for example *.collab.com, attackers are able to launch a Man In The Middle Attack.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;in order to prevent this attack, it is possible to use the SSL protocol in another way, by creating an association between the domain name of a site (&lt;A href="http://www.collab.com" target="_blank" rel="noopener"&gt;www.collab.com&lt;/A&gt;) and the certificate or certification authority expected. Thus, only the a certificate (of collab.com) signed by one of the specific certification authorities will be accepted and if the certificate of collab.com signed by another CA is presented, it is not trusted.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Certificate pinning can be explained with a simple words: Is this connection secure with a valid certificate and is it signed by the CA I’m expecting?.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Some applications use a technique referred to as TLS/SSL pinning or certificate pinning, which embeds the fingerprint of the original server certificate in the application itself. As a result, if you configured a TLS/SSL rule with a SSL Forward Proxy action, and this rule matches this traffic, when the application receives a resigned certificate from Palo Alto Firewall the validation fails and the connection is aborted.&lt;/P&gt;
&lt;P&gt;In the capture wireshark from the client side connection or the application you can detect this failed validation with the TLS alert message , The Alert Message indicates the spoofed re-signed certificate is not recognized by the application because the application is expecting to receive and validate only server certificate signed by a specific CA (Certification Authority) but it is receiving the server certificate signed by the Firewall, finally a TCP Reset is sent by the application to close the TCP connection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Capture d'écran 2024-05-02 171322.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59472i29F861D99DA4137C/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Capture d'écran 2024-05-02 171322.png" alt="Capture d'écran 2024-05-02 171322.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If your browsers or your applications uses certificate pinning to verify a server certificate, you cannot decrypt this traffic by re-signing the server certificate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To allow access to the website that uses a certificate pinning, you can add the hostname of the server in the SSL Decryption Exclusion List. The hostname is compared to the SNI in the Client Hello Message and the Common Name in the Server Certificate, if a match is found the firewall excludes the traffic from decryption.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SSL Decryption exclude.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56263i19F4AC3B0592F279/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="SSL Decryption exclude.png" alt="SSL Decryption exclude.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 16:16:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/what-is-certificate-pinning-and-how-to-deal-with-ssl-decryption/m-p/571722#M2362</guid>
      <dc:creator>rmeddane</dc:creator>
      <dc:date>2024-05-02T16:16:36Z</dc:date>
    </item>
    <item>
      <title>Re: What is Certificate Pinning and how to deal with SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/what-is-certificate-pinning-and-how-to-deal-with-ssl-decryption/m-p/585657#M3102</link>
      <description>&lt;P&gt;What does cert pinning on a global scale do to ssl inspection for the future?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 15:36:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/what-is-certificate-pinning-and-how-to-deal-with-ssl-decryption/m-p/585657#M3102</guid>
      <dc:creator>S_Williams901</dc:creator>
      <dc:date>2024-05-02T15:36:11Z</dc:date>
    </item>
    <item>
      <title>Re: What is Certificate Pinning and how to deal with SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/what-is-certificate-pinning-and-how-to-deal-with-ssl-decryption/m-p/1232784#M6040</link>
      <description>&lt;P&gt;Make it non-functional. SSL Inspection is essentially a sanctioned man-in-the-middle attack.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jun 2025 20:29:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/what-is-certificate-pinning-and-how-to-deal-with-ssl-decryption/m-p/1232784#M6040</guid>
      <dc:creator>ThomasObarowski</dc:creator>
      <dc:date>2025-06-27T20:29:13Z</dc:date>
    </item>
    <item>
      <title>Re: What is Certificate Pinning and how to deal with SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/what-is-certificate-pinning-and-how-to-deal-with-ssl-decryption/m-p/1236714#M6241</link>
      <description>&lt;P&gt;We shall see what vendor comes to surface with a solution for this in the future. Unfortunately, now you cannot see any malicious content in encrypted ssl packets.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Aug 2025 12:59:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/what-is-certificate-pinning-and-how-to-deal-with-ssl-decryption/m-p/1236714#M6241</guid>
      <dc:creator>S_Williams901</dc:creator>
      <dc:date>2025-08-26T12:59:22Z</dc:date>
    </item>
  </channel>
</rss>

