<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unsupported cipher. Supported client cipher bitmask: 0x00000000 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/unsupported-cipher-supported-client-cipher-bitmask-0x00000000/m-p/457058#M101784</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/78211"&gt;@Moritz&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;You need to look at the supported cipher suite document that&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11943"&gt;@kiwi&lt;/a&gt;&amp;nbsp;linked and pass that along to the person running your web server or load balancer. The website and the firewall need to have the same ciphers enabled so that the firewall can actually proxy the traffic. There's not a magic solution to this one, you need to work with your web admin.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 05 Jan 2022 19:20:56 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2022-01-05T19:20:56Z</dc:date>
    <item>
      <title>Unsupported cipher. Supported client cipher bitmask: 0x00000000</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unsupported-cipher-supported-client-cipher-bitmask-0x00000000/m-p/456755#M101759</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;have a decryption policies for inbound ssl decryption to a webpage. Therefor I have included the private Certificate.&lt;/P&gt;&lt;P&gt;At decryption monitor there is a message:&lt;/P&gt;&lt;P&gt;( error eq 'Unsupported cipher. Supported client cipher bitmask: 0x00000000. Supported decrypt profile cipher bitmask: 0x00000014.' )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Found this link&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/decryption/troubleshoot-and-monitor-decryption/decryption-troubleshooting-workflow-examples/troubleshoot-unsupported-cipher-suites.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/decryption/troubleshoot-and-monitor-decryption/decryption-troubleshooting-workflow-examples/troubleshoot-unsupported-cipher-suites.html&lt;/A&gt;&amp;nbsp;but my bitmask is 0x00 ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How can I fix it? I chose the strict ssl control decryption profile but no help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jan 2022 20:27:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unsupported-cipher-supported-client-cipher-bitmask-0x00000000/m-p/456755#M101759</guid>
      <dc:creator>Moritz</dc:creator>
      <dc:date>2022-01-04T20:27:28Z</dc:date>
    </item>
    <item>
      <title>Re: Unsupported cipher. Supported client cipher bitmask: 0x00000000</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unsupported-cipher-supported-client-cipher-bitmask-0x00000000/m-p/456988#M101774</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/78211"&gt;@Moritz&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Supported cipher suites will vary depending on your PAN-OS version.&amp;nbsp; What's your current version and how is your decryption profile configured ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As an example, some earlier PAN-OS versions only supported DHE or ECDHE for SSL Forward Proxy (it wasn't not supported for Inbound Inspection).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You might want to do some more debugging and check on which cipher suite client/server agree upon in the SSL handshake and compare that to the compatibility matrix to see if it's actually supported:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/compatibility-matrix/supported-cipher-suites.html" target="_blank"&gt;https://docs.paloaltonetworks.com/compatibility-matrix/supported-cipher-suites.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope it helps&lt;/P&gt;
&lt;P&gt;-Kiwi.&lt;/P&gt;
&lt;DIV id="ConnectiveDocSignExtentionInstalled" data-extension-version="1.0.4"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Wed, 05 Jan 2022 14:47:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unsupported-cipher-supported-client-cipher-bitmask-0x00000000/m-p/456988#M101774</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2022-01-05T14:47:48Z</dc:date>
    </item>
    <item>
      <title>Re: Unsupported cipher. Supported client cipher bitmask: 0x00000000</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unsupported-cipher-supported-client-cipher-bitmask-0x00000000/m-p/457020#M101780</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11943"&gt;@kiwi&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a PA220 with PANOS 10.0.8.&lt;BR /&gt;As Decryption profile I tested none, default and Strict SSL:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Moritz_0-1641402005330.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/38523i01474FB2E1CFF7BF/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Moritz_0-1641402005330.png" alt="Moritz_0-1641402005330.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How can I debug this. Trace a request and look into the SSL header? Have not done anything like this before. No experience with it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jan 2022 17:02:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unsupported-cipher-supported-client-cipher-bitmask-0x00000000/m-p/457020#M101780</guid>
      <dc:creator>Moritz</dc:creator>
      <dc:date>2022-01-05T17:02:28Z</dc:date>
    </item>
    <item>
      <title>Re: Unsupported cipher. Supported client cipher bitmask: 0x00000000</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unsupported-cipher-supported-client-cipher-bitmask-0x00000000/m-p/457058#M101784</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/78211"&gt;@Moritz&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;You need to look at the supported cipher suite document that&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11943"&gt;@kiwi&lt;/a&gt;&amp;nbsp;linked and pass that along to the person running your web server or load balancer. The website and the firewall need to have the same ciphers enabled so that the firewall can actually proxy the traffic. There's not a magic solution to this one, you need to work with your web admin.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jan 2022 19:20:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unsupported-cipher-supported-client-cipher-bitmask-0x00000000/m-p/457058#M101784</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2022-01-05T19:20:56Z</dc:date>
    </item>
    <item>
      <title>Re: Unsupported cipher. Supported client cipher bitmask: 0x00000000</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unsupported-cipher-supported-client-cipher-bitmask-0x00000000/m-p/457211#M101798</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/78211"&gt;@Moritz&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt; said &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; !&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My guess is that the web server offers a cipher suite that the PA doesn't support.&amp;nbsp; If you can run a PCAP you should be able to capture the SSL handshake and get information on the cipher suite being used.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps,&lt;/P&gt;
&lt;P&gt;-Kiwi.&lt;/P&gt;
&lt;DIV id="ConnectiveDocSignExtentionInstalled" data-extension-version="1.0.4"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Thu, 06 Jan 2022 09:30:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unsupported-cipher-supported-client-cipher-bitmask-0x00000000/m-p/457211#M101798</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2022-01-06T09:30:23Z</dc:date>
    </item>
    <item>
      <title>Re: Unsupported cipher. Supported client cipher bitmask: 0x00000000</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unsupported-cipher-supported-client-cipher-bitmask-0x00000000/m-p/596458#M118653</link>
      <description>&lt;P&gt;&lt;SPAN&gt;( error eq 'Unsupported cipher. Supported client cipher bitmask: 0x00000000. Supported decrypt profile cipher bitmask: 0x00000014.' )&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;BR /&gt;According to the reference article linked below, the cipher bitmask: 0x00000000 means that the firewall doesn't support the cipher.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;Reference:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/decryption/troubleshoot-and-monitor-decryption/decryption-logs/decryption-log-errors-and-error-indexes" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/decryption/troubleshoot-and-monitor-decryption/decryption-logs/decryption-log-errors-and-error-indexes&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 31 Aug 2024 03:57:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unsupported-cipher-supported-client-cipher-bitmask-0x00000000/m-p/596458#M118653</guid>
      <dc:creator>William-Wu</dc:creator>
      <dc:date>2024-08-31T03:57:43Z</dc:date>
    </item>
  </channel>
</rss>

