<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSLlabs test is blocked on decryption with F5 passthrough in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssllabs-test-is-blocked-on-decryption-with-f5-passthrough/m-p/458031#M101874</link>
    <description>&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/extra-certs-inbound-decryption/m-p/457936" target="_blank"&gt;https://live.paloaltonetworks.com/t5/general-topics/extra-certs-inbound-decryption/m-p/457936&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Adding to the previous discussion with same setup where PA is doing decryption and the F5 is doing SSL bridging/offload while proxying for the server behind it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If we do SSL bridging/offload SSLlabs test goes fine with PA doing decryption and F5 will present cert. URLs show as domain.com&lt;/P&gt;&lt;P&gt;If we do SSL passthrough where F5 will not present certificate on server's behalf and server itself is responsible for presenting the cert. SSLlabs test gets blocked by our policy to block medium-risk/unkown category. URLs show as IP x.x.x.x.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Server supports 1.3 and 1.2 while on PA we can only do 1.2..on 9.1&lt;/P&gt;&lt;P&gt;Website did work normally in browser&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wonder why is there a change.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 11 Jan 2022 18:10:34 GMT</pubDate>
    <dc:creator>raji_toor</dc:creator>
    <dc:date>2022-01-11T18:10:34Z</dc:date>
    <item>
      <title>SSLlabs test is blocked on decryption with F5 passthrough</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssllabs-test-is-blocked-on-decryption-with-f5-passthrough/m-p/458031#M101874</link>
      <description>&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/extra-certs-inbound-decryption/m-p/457936" target="_blank"&gt;https://live.paloaltonetworks.com/t5/general-topics/extra-certs-inbound-decryption/m-p/457936&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Adding to the previous discussion with same setup where PA is doing decryption and the F5 is doing SSL bridging/offload while proxying for the server behind it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If we do SSL bridging/offload SSLlabs test goes fine with PA doing decryption and F5 will present cert. URLs show as domain.com&lt;/P&gt;&lt;P&gt;If we do SSL passthrough where F5 will not present certificate on server's behalf and server itself is responsible for presenting the cert. SSLlabs test gets blocked by our policy to block medium-risk/unkown category. URLs show as IP x.x.x.x.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Server supports 1.3 and 1.2 while on PA we can only do 1.2..on 9.1&lt;/P&gt;&lt;P&gt;Website did work normally in browser&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wonder why is there a change.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 18:10:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssllabs-test-is-blocked-on-decryption-with-f5-passthrough/m-p/458031#M101874</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2022-01-11T18:10:34Z</dc:date>
    </item>
    <item>
      <title>Re: SSLlabs test is blocked on decryption with F5 passthrough</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssllabs-test-is-blocked-on-decryption-with-f5-passthrough/m-p/458212#M101885</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56221"&gt;@raji_toor&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;It sounds like your server does not use valid SSL certificate, but rather self-signed cert. As previously discussed with PAN FW Inbound SSL decryption, firewall will setup two encrypted connection. Which means for the connection between the FW and the server, firewall will act ask client and wait for the server to send its certificate in order to establish encrypted connect.&lt;/P&gt;
&lt;P&gt;I am guessing that server is sending self-signed, or invalid certificate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Side question - why would you enable URL filtering for inbound traffic? What do you want to achieve with that?&lt;/P&gt;
&lt;P&gt;Remember that URL filtering is just biig database with URLs and domains categorization, so you can control what web content is accessed by the users. Ususally you will use URL filtering to protect your users when browsing in Internet (because you cannot fully trust it). But for me it doesn't make sense to put URL filtering on inbound rule, this way you protect public users, from potetial bad content on your own server...You don't trust your own server? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jan 2022 08:32:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssllabs-test-is-blocked-on-decryption-with-f5-passthrough/m-p/458212#M101885</guid>
      <dc:creator>A_Astardzhiev</dc:creator>
      <dc:date>2022-01-12T08:32:44Z</dc:date>
    </item>
    <item>
      <title>Re: SSLlabs test is blocked on decryption with F5 passthrough</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssllabs-test-is-blocked-on-decryption-with-f5-passthrough/m-p/458239#M101890</link>
      <description>&lt;P&gt;As&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@A_Astardzhiev&lt;/a&gt;&amp;nbsp;mentioned you may need to import the CA certificate of the servers inside the Palo Alto device for the Palo Alto to trust the servers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can also use the advanced SSL decryption logs that are now available:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClEZCA0" target="_blank"&gt;How to Implement and Test SSL Decryption - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/decryption/troubleshoot-and-monitor-decryption/decryption-logs.html" target="_blank"&gt;Decryption Log (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As I also work with F5 , you can check the setting in the server side SSL profile "&lt;SPAN&gt;Untrusted Certificate Response Control&lt;/SPAN&gt;" and "&lt;SPAN&gt;Expire Certificate Response Control&lt;/SPAN&gt;" as if the F5 is not checking the Server SSL cert then this will explain why it works.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://support.f5.com/csp/article/K14806" target="_blank"&gt;Overview of the Server SSL profile (11.x - 16.x) (f5.com)&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jan 2022 11:14:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssllabs-test-is-blocked-on-decryption-with-f5-passthrough/m-p/458239#M101890</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2022-01-12T11:14:49Z</dc:date>
    </item>
    <item>
      <title>Re: SSLlabs test is blocked on decryption with F5 passthrough</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssllabs-test-is-blocked-on-decryption-with-f5-passthrough/m-p/458827#M101938</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@A_Astardzhiev&lt;/a&gt;&amp;nbsp;We are not using self signed cert. All 3 in the chain Firewall. F5 and Server have public cert on them in this scenario.&lt;/P&gt;&lt;P&gt;And regarding applying URL filtering on own webservers, you can say i am simply satisfying the BPA, but it does provide a good purpose if we donot want our server hit with IP and must be accessed by domain name only..And this is exactly what is happening here.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jan 2022 20:07:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssllabs-test-is-blocked-on-decryption-with-f5-passthrough/m-p/458827#M101938</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2022-01-14T20:07:09Z</dc:date>
    </item>
    <item>
      <title>Re: SSLlabs test is blocked on decryption with F5 passthrough</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssllabs-test-is-blocked-on-decryption-with-f5-passthrough/m-p/458936#M101951</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56221"&gt;@raji_toor&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;And regarding applying URL filtering on own webservers, you can say i am simply satisfying the BPA, but it does provide a good purpose if we donot want our server hit with IP and must be accessed by domain name only..And this is exactly what is happening here.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;And if your website is not that popular and PAN URL database doesn't have proper categorization for it (like unknown) or you introduce new website and it is categorized as newly registered domain, you will block your user to reaching the page.&lt;/P&gt;
&lt;P&gt;BPA should be used to give you directions, it should not be followed blindly.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And what is the problem for accessing the site by IP not by domain name?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Still doesn't make sense for me to use URL filtering for incoming traffic. Again you are trying to protect external users from your own content...&lt;/P&gt;</description>
      <pubDate>Sun, 16 Jan 2022 12:35:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssllabs-test-is-blocked-on-decryption-with-f5-passthrough/m-p/458936#M101951</guid>
      <dc:creator>A_Astardzhiev</dc:creator>
      <dc:date>2022-01-16T12:35:10Z</dc:date>
    </item>
    <item>
      <title>Re: SSLlabs test is blocked on decryption with F5 passthrough</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssllabs-test-is-blocked-on-decryption-with-f5-passthrough/m-p/459058#M101962</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@A_Astardzhiev&lt;/a&gt;&amp;nbsp;I have never come across issue where PA does improper categorization for our subdomains in last 7 years and new do keep popping up every now and then and we have close to 50. Even if it did new subdomains got through testing phase before and it would come to light then and can be resolved. And I see these as someone not following proper channel to come to our websites and thus see no harm in stopping them as in screenshot below.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/38675iBD8279620133C3B4/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;We can agree to disagree on this, but my initial question still remains why changing to SSL passthrough on F5 does PA see them coming as https://x.x.x.x&amp;nbsp;and not https://domain-name,&amp;nbsp;where as traffic from same sources during test with F5 VIP as SSL offload or SSL bridging this is not an issue.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jan 2022 15:29:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssllabs-test-is-blocked-on-decryption-with-f5-passthrough/m-p/459058#M101962</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2022-01-17T15:29:29Z</dc:date>
    </item>
  </channel>
</rss>

