<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ERR_HTTP2_PROTOCOL_ERROR in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/err-http2-protocol-error/m-p/447072#M100652</link>
    <description>&lt;P&gt;I would reach out to the service provider and ask them about &lt;A href="https://letsencrypt.org/certificates/" target="_self"&gt;this&lt;/A&gt;&amp;nbsp;on their server:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"Having cross-signatures means that each of our RSA intermediates has two certificates representing the same signing key. One is signed by DST Root CA X3 and the other is signed by ISRG Root X1. The easiest way to distinguish the two is by looking at their Issuer field.&lt;/P&gt;&lt;P&gt;When configuring a web server, the server operator configures not only the end-entity certificate, but also a list of intermediates to help browsers verify that the end-entity certificate has a trust chain leading to a trusted root certificate. Almost all server operators will choose to serve a chain including the intermediate certificate with Subject “R3” and Issuer “ISRG Root X1”. The recommended Let’s Encrypt client software,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://certbot.org/" target="_blank" rel="noopener"&gt;Certbot&lt;/A&gt;, will make this configuration seamlessly."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The DST root is allegedly expiring and being retired (haven't verified this myself), cross-signing isn't something the networking teams adopted at scale, &lt;STRONG&gt;so in the event you don't have the full chain of certificates in your PAN-OS store &lt;/STRONG&gt;(please go verify), the service will always show as unreachable as it will never present as valid because the firewall sees an expired intermediate when there's a valid co-signed path in parallel where the trust store chain lookup didn't follow.&amp;nbsp; Same is true of any device without all certificates (browsers, servers, etc.).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've also attached a screenshot of which browsers (mixed bag) support cross-signing natively as well. Ultimately, decryption is hard but I think your answer lies in ensuring a full certificate chain is fully imported, trusted, etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not convinced it's a remote service, nor am I unconvinced it's the firewall, in either case hope this context helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Screen Shot 2021-11-11 at 11.29.17 AM.png" style="width: 868px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/37595i35125F8AB186BA84/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2021-11-11 at 11.29.17 AM.png" alt="Screen Shot 2021-11-11 at 11.29.17 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 11 Nov 2021 18:56:28 GMT</pubDate>
    <dc:creator>LAYER_8</dc:creator>
    <dc:date>2021-11-11T18:56:28Z</dc:date>
    <item>
      <title>ERR_HTTP2_PROTOCOL_ERROR</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/err-http2-protocol-error/m-p/446163#M100544</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We have recently upgraded our PA3200 to 10.1.2 and while we try to access a few sites are not accessible. SSL Decryption has been disabled globally. Still, while we access the URL from our network on any browser we get the above error. I have tried adding the URL in the SSL Decryption exclusion list to see if that resolve the issue it did not work. Any help would be appreciated.&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Pradeep&lt;/P&gt;</description>
      <pubDate>Mon, 08 Nov 2021 15:09:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/err-http2-protocol-error/m-p/446163#M100544</guid>
      <dc:creator>prad4ever</dc:creator>
      <dc:date>2021-11-08T15:09:09Z</dc:date>
    </item>
    <item>
      <title>Re: ERR_HTTP2_PROTOCOL_ERROR</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/err-http2-protocol-error/m-p/446321#M100557</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Do you have Strip ALPN enabled? This article will show you how to disable it, so if your settings are similar, its disabled globally.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PLpSCAW" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PLpSCAW&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 08 Nov 2021 21:48:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/err-http2-protocol-error/m-p/446321#M100557</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-11-08T21:48:22Z</dc:date>
    </item>
    <item>
      <title>Re: ERR_HTTP2_PROTOCOL_ERROR</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/err-http2-protocol-error/m-p/446442#M100571</link>
      <description>&lt;P&gt;Hi Otakarklier,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The article is showing how to disable HTTP2 inspection when the decryption profile is enabled but in our case, we have disabled the SSL decryption globally.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Br,&lt;/P&gt;&lt;P&gt;Pradeep&lt;/P&gt;</description>
      <pubDate>Tue, 09 Nov 2021 12:49:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/err-http2-protocol-error/m-p/446442#M100571</guid>
      <dc:creator>prad4ever</dc:creator>
      <dc:date>2021-11-09T12:49:50Z</dc:date>
    </item>
    <item>
      <title>Re: ERR_HTTP2_PROTOCOL_ERROR</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/err-http2-protocol-error/m-p/446647#M100605</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/146111"&gt;@prad4ever&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Are you 100% sure that you aren't decrypting the traffic and have you verified that in your traffic logs on the firewall? The only reason I'm really bringing it up again is because&amp;nbsp;&lt;EM&gt;without&amp;nbsp;&lt;/EM&gt;decryption the firewall&amp;nbsp;shouldn't be causing any disruption with your HTTP/2 traffic at all. Outside of a website rightly having issues with HTTP/2, I've never seen that error on a firewall that isn't actively decrypting traffic.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Nov 2021 03:10:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/err-http2-protocol-error/m-p/446647#M100605</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-11-10T03:10:27Z</dc:date>
    </item>
    <item>
      <title>Re: ERR_HTTP2_PROTOCOL_ERROR</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/err-http2-protocol-error/m-p/446717#M100619</link>
      <description>&lt;P&gt;Hi BPry,&lt;/P&gt;&lt;P&gt;Thanks for the reply. I have checked the traffic logs and the URL filter logs both traffic is passing the firewall and there is no decryption profile applied as SSL decryption is disabled globally. Also, we did a pcap on the firewall and found only http1.1 traffic passing at that instance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Br,&lt;/P&gt;&lt;P&gt;Pradeep&lt;/P&gt;</description>
      <pubDate>Wed, 10 Nov 2021 12:50:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/err-http2-protocol-error/m-p/446717#M100619</guid>
      <dc:creator>prad4ever</dc:creator>
      <dc:date>2021-11-10T12:50:42Z</dc:date>
    </item>
    <item>
      <title>Re: ERR_HTTP2_PROTOCOL_ERROR</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/err-http2-protocol-error/m-p/447072#M100652</link>
      <description>&lt;P&gt;I would reach out to the service provider and ask them about &lt;A href="https://letsencrypt.org/certificates/" target="_self"&gt;this&lt;/A&gt;&amp;nbsp;on their server:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"Having cross-signatures means that each of our RSA intermediates has two certificates representing the same signing key. One is signed by DST Root CA X3 and the other is signed by ISRG Root X1. The easiest way to distinguish the two is by looking at their Issuer field.&lt;/P&gt;&lt;P&gt;When configuring a web server, the server operator configures not only the end-entity certificate, but also a list of intermediates to help browsers verify that the end-entity certificate has a trust chain leading to a trusted root certificate. Almost all server operators will choose to serve a chain including the intermediate certificate with Subject “R3” and Issuer “ISRG Root X1”. The recommended Let’s Encrypt client software,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://certbot.org/" target="_blank" rel="noopener"&gt;Certbot&lt;/A&gt;, will make this configuration seamlessly."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The DST root is allegedly expiring and being retired (haven't verified this myself), cross-signing isn't something the networking teams adopted at scale, &lt;STRONG&gt;so in the event you don't have the full chain of certificates in your PAN-OS store &lt;/STRONG&gt;(please go verify), the service will always show as unreachable as it will never present as valid because the firewall sees an expired intermediate when there's a valid co-signed path in parallel where the trust store chain lookup didn't follow.&amp;nbsp; Same is true of any device without all certificates (browsers, servers, etc.).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've also attached a screenshot of which browsers (mixed bag) support cross-signing natively as well. Ultimately, decryption is hard but I think your answer lies in ensuring a full certificate chain is fully imported, trusted, etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not convinced it's a remote service, nor am I unconvinced it's the firewall, in either case hope this context helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Screen Shot 2021-11-11 at 11.29.17 AM.png" style="width: 868px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/37595i35125F8AB186BA84/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2021-11-11 at 11.29.17 AM.png" alt="Screen Shot 2021-11-11 at 11.29.17 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Nov 2021 18:56:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/err-http2-protocol-error/m-p/447072#M100652</guid>
      <dc:creator>LAYER_8</dc:creator>
      <dc:date>2021-11-11T18:56:28Z</dc:date>
    </item>
  </channel>
</rss>

