<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: possibility of secure MQTT's decryption at Palo alto firewall in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/possibility-of-secure-mqtt-s-decryption-at-palo-alto-firewall/m-p/1241076#M6421</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/217294"&gt;@NetSecFirewall&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The answer is nuanced because you don't provide a lot of info.&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="N9Q8Lc"&gt;As far as I know MQTT can be decrypted normally on PANW in its default setup.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="N9Q8Lc"&gt;&amp;nbsp;Secure communication is enabled by using Transport Layer Security (TLS), which can then be enhanced with certificate pinning (or fingerprint validation) for additional security against man-in-the-middle attacks (in which case decryption will not be possible).&lt;/SPAN&gt;&lt;SPAN class="uJ19be notranslate" data-wiz-uids="nzf2E_a,nzf2E_b"&gt;&lt;SPAN class="vKEkVd" data-animation-atomic=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uJ19be notranslate" data-wiz-uids="nzf2E_a,nzf2E_b"&gt;&lt;SPAN class="vKEkVd" data-animation-atomic=""&gt;&lt;SPAN&gt;Some websites are misconfigured and will not send complete certificate chains (up to root) which is according to RFC standard. The firewall has only root certificates in its "Default Trusted Certificate Authorities" store. In case an intermediate certificate is missing from the certificate list presented by the server, the firewall will not be able to construct the chain to the root and will present the "Forward Untrust Certificate" to the client when decryption is enabled &lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/decryption/troubleshoot-and-monitor-decryption/decryption-logs/repair-incomplete-certificate-chains" target="_blank" rel="noopener" data-aura-rendered-by="162:70487;a"&gt;https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/decryption/troubleshoot-and-monitor-decryption/decryption-logs/repair-incomplete-certificate-chains&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uJ19be notranslate" data-wiz-uids="nzf2E_a,nzf2E_b"&gt;&lt;SPAN class="vKEkVd" data-animation-atomic=""&gt;&lt;SPAN&gt;As per the DOC above there are some steps you can perform to resolve that problem.&lt;BR /&gt;&lt;BR /&gt;1.Filter the Decryption log to identify Decryption sessions that failed because of an incomplete certificate chain. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uJ19be notranslate" data-wiz-uids="nzf2E_a,nzf2E_b"&gt;&lt;SPAN class="vKEkVd" data-animation-atomic=""&gt;&lt;SPAN&gt;2.Copy and paste the URI into your browser and then press Enter to download the missing intermediate certificate. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uJ19be notranslate" data-wiz-uids="nzf2E_a,nzf2E_b"&gt;&lt;SPAN class="vKEkVd" data-animation-atomic=""&gt;&lt;SPAN&gt;3.Import the certificate into the firewall. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uJ19be notranslate" data-wiz-uids="nzf2E_a,nzf2E_b"&gt;&lt;SPAN class="vKEkVd" data-animation-atomic=""&gt;&lt;SPAN&gt;4.Select Trusted Root CA to mark the certificate as a Trusted Root CA on the firewall. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uJ19be notranslate" data-wiz-uids="nzf2E_a,nzf2E_b"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uJ19be notranslate" data-wiz-uids="nzf2E_a,nzf2E_b"&gt;Kind regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uJ19be notranslate" data-wiz-uids="nzf2E_a,nzf2E_b"&gt;-Kim.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 31 Oct 2025 17:08:52 GMT</pubDate>
    <dc:creator>kiwi</dc:creator>
    <dc:date>2025-10-31T17:08:52Z</dc:date>
    <item>
      <title>possibility of secure MQTT's decryption at Palo alto firewall</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/possibility-of-secure-mqtt-s-decryption-at-palo-alto-firewall/m-p/1240723#M6410</link>
      <description>&lt;P&gt;how can we decrypt MQTT's port 8883 traffic at palo alto firewall, or is it possible.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Oct 2025 20:12:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/possibility-of-secure-mqtt-s-decryption-at-palo-alto-firewall/m-p/1240723#M6410</guid>
      <dc:creator>NetSecFirewall</dc:creator>
      <dc:date>2025-10-25T20:12:27Z</dc:date>
    </item>
    <item>
      <title>Re: possibility of secure MQTT's decryption at Palo alto firewall</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/possibility-of-secure-mqtt-s-decryption-at-palo-alto-firewall/m-p/1241076#M6421</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/217294"&gt;@NetSecFirewall&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The answer is nuanced because you don't provide a lot of info.&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="N9Q8Lc"&gt;As far as I know MQTT can be decrypted normally on PANW in its default setup.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="N9Q8Lc"&gt;&amp;nbsp;Secure communication is enabled by using Transport Layer Security (TLS), which can then be enhanced with certificate pinning (or fingerprint validation) for additional security against man-in-the-middle attacks (in which case decryption will not be possible).&lt;/SPAN&gt;&lt;SPAN class="uJ19be notranslate" data-wiz-uids="nzf2E_a,nzf2E_b"&gt;&lt;SPAN class="vKEkVd" data-animation-atomic=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uJ19be notranslate" data-wiz-uids="nzf2E_a,nzf2E_b"&gt;&lt;SPAN class="vKEkVd" data-animation-atomic=""&gt;&lt;SPAN&gt;Some websites are misconfigured and will not send complete certificate chains (up to root) which is according to RFC standard. The firewall has only root certificates in its "Default Trusted Certificate Authorities" store. In case an intermediate certificate is missing from the certificate list presented by the server, the firewall will not be able to construct the chain to the root and will present the "Forward Untrust Certificate" to the client when decryption is enabled &lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/decryption/troubleshoot-and-monitor-decryption/decryption-logs/repair-incomplete-certificate-chains" target="_blank" rel="noopener" data-aura-rendered-by="162:70487;a"&gt;https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/decryption/troubleshoot-and-monitor-decryption/decryption-logs/repair-incomplete-certificate-chains&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uJ19be notranslate" data-wiz-uids="nzf2E_a,nzf2E_b"&gt;&lt;SPAN class="vKEkVd" data-animation-atomic=""&gt;&lt;SPAN&gt;As per the DOC above there are some steps you can perform to resolve that problem.&lt;BR /&gt;&lt;BR /&gt;1.Filter the Decryption log to identify Decryption sessions that failed because of an incomplete certificate chain. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uJ19be notranslate" data-wiz-uids="nzf2E_a,nzf2E_b"&gt;&lt;SPAN class="vKEkVd" data-animation-atomic=""&gt;&lt;SPAN&gt;2.Copy and paste the URI into your browser and then press Enter to download the missing intermediate certificate. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uJ19be notranslate" data-wiz-uids="nzf2E_a,nzf2E_b"&gt;&lt;SPAN class="vKEkVd" data-animation-atomic=""&gt;&lt;SPAN&gt;3.Import the certificate into the firewall. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uJ19be notranslate" data-wiz-uids="nzf2E_a,nzf2E_b"&gt;&lt;SPAN class="vKEkVd" data-animation-atomic=""&gt;&lt;SPAN&gt;4.Select Trusted Root CA to mark the certificate as a Trusted Root CA on the firewall. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uJ19be notranslate" data-wiz-uids="nzf2E_a,nzf2E_b"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uJ19be notranslate" data-wiz-uids="nzf2E_a,nzf2E_b"&gt;Kind regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uJ19be notranslate" data-wiz-uids="nzf2E_a,nzf2E_b"&gt;-Kim.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 31 Oct 2025 17:08:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/possibility-of-secure-mqtt-s-decryption-at-palo-alto-firewall/m-p/1241076#M6421</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2025-10-31T17:08:52Z</dc:date>
    </item>
  </channel>
</rss>

