<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to allow only X.509 related cert validation traffic from trust to Untrust in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-allow-only-x-509-related-cert-validation-traffic-from/m-p/478460#M103761</link>
    <description>&lt;P&gt;It you are able to take a wireshark trace and capture the data that is transmitted by the servers, it is possible for customers to create a custom application that will parse your traffic and if you deny the traffic, then yes, it can be done... It is all up to you, as the end customer, to put the work into determining what that traffic signature would look like.&amp;nbsp;&lt;BR /&gt;Share with us what you find out, as you are probably not the only one who would want to do this.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;BTW, does the traffic show up in the Traffic Logs as ssl on port 443, or some other way to identify it.&amp;nbsp; You seemed to know exactly what you are looking for, so I am curious did you do previous packet captures in the past.&amp;nbsp; I have not seen anyone get to this level of granularity, as cert validation is very important, as someone could attempt to spoof a trusted root CA.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you attempted to contact&amp;nbsp; MS to see if they have any mechanism in place to reduce the amount of "check-in" traffic that their OS is configured to use? May be another way to do it.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 05 Apr 2022 19:53:13 GMT</pubDate>
    <dc:creator>S.Cantwell</dc:creator>
    <dc:date>2022-04-05T19:53:13Z</dc:date>
    <item>
      <title>How to allow only X.509 related cert validation traffic from trust to Untrust</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-allow-only-x-509-related-cert-validation-traffic-from/m-p/478020#M103718</link>
      <description />
      <pubDate>Mon, 04 Apr 2022 16:49:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-allow-only-x-509-related-cert-validation-traffic-from/m-p/478020#M103718</guid>
      <dc:creator>Ismail2017</dc:creator>
      <dc:date>2022-04-04T16:49:01Z</dc:date>
    </item>
    <item>
      <title>Re: How to allow only X.509 related cert validation traffic from trust to Untrust</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-allow-only-x-509-related-cert-validation-traffic-from/m-p/478445#M103759</link>
      <description>&lt;P&gt;Please provide additional detail/context.&amp;nbsp; Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Apr 2022 18:22:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-allow-only-x-509-related-cert-validation-traffic-from/m-p/478445#M103759</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2022-04-05T18:22:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to allow only X.509 related cert validation traffic from trust to Untrust</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-allow-only-x-509-related-cert-validation-traffic-from/m-p/478446#M103760</link>
      <description>&lt;P&gt;Hi Steve,&amp;nbsp;&lt;/P&gt;&lt;P&gt;We like to block as much as outbound traffic. we noted that most of windows servers are reaching to Internet to validate the certificate and digital signature.&amp;nbsp; my question is that At PAN level, is there any way to identify such traffic and block or allow it.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Apr 2022 18:31:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-allow-only-x-509-related-cert-validation-traffic-from/m-p/478446#M103760</guid>
      <dc:creator>Ismail2017</dc:creator>
      <dc:date>2022-04-05T18:31:36Z</dc:date>
    </item>
    <item>
      <title>Re: How to allow only X.509 related cert validation traffic from trust to Untrust</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-allow-only-x-509-related-cert-validation-traffic-from/m-p/478460#M103761</link>
      <description>&lt;P&gt;It you are able to take a wireshark trace and capture the data that is transmitted by the servers, it is possible for customers to create a custom application that will parse your traffic and if you deny the traffic, then yes, it can be done... It is all up to you, as the end customer, to put the work into determining what that traffic signature would look like.&amp;nbsp;&lt;BR /&gt;Share with us what you find out, as you are probably not the only one who would want to do this.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;BTW, does the traffic show up in the Traffic Logs as ssl on port 443, or some other way to identify it.&amp;nbsp; You seemed to know exactly what you are looking for, so I am curious did you do previous packet captures in the past.&amp;nbsp; I have not seen anyone get to this level of granularity, as cert validation is very important, as someone could attempt to spoof a trusted root CA.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you attempted to contact&amp;nbsp; MS to see if they have any mechanism in place to reduce the amount of "check-in" traffic that their OS is configured to use? May be another way to do it.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Apr 2022 19:53:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-allow-only-x-509-related-cert-validation-traffic-from/m-p/478460#M103761</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2022-04-05T19:53:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to allow only X.509 related cert validation traffic from trust to Untrust</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-allow-only-x-509-related-cert-validation-traffic-from/m-p/478477#M103766</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/60225"&gt;@Ismail2017&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Maybe I'm missing something, but all of this should just be straightforward OCSP traffic that happens over tcp/80. The firewall should be identifying all of that traffic properly, so you should be able to just allow OCSP traffic under application-default and that would allow for revocation checks to complete without issue.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Apr 2022 20:10:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-allow-only-x-509-related-cert-validation-traffic-from/m-p/478477#M103766</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2022-04-05T20:10:52Z</dc:date>
    </item>
    <item>
      <title>Re: How to allow only X.509 related cert validation traffic from trust to Untrust</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-allow-only-x-509-related-cert-validation-traffic-from/m-p/478797#M103808</link>
      <description>&lt;P&gt;Hi SteveCantwell and Bpry,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I&amp;nbsp; performed the below test but no conclusion yet.&amp;nbsp; At server , I initiated traffic using IE ( proxy disabled status)&amp;nbsp; to&amp;nbsp;&lt;A href="https://www.verizon.com" target="_blank"&gt;https://www.verizon.com&lt;/A&gt;&amp;nbsp;( example) , I checked the Firewall log i do not see any traffic related to OCSP.&amp;nbsp; In fact i saw the below info the Verizon cert, But&amp;nbsp;I do not see any traffic to *.digicert.com&amp;nbsp;@ PAN.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My goal is to only allow X.509 related traffic &lt;SPAN&gt;from trust to Untrust&lt;/SPAN&gt;, the problem is unable to identify these traffic in PAN. can you share your suggestion&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE width="276"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="276"&gt;[1]CRL Distribution Point&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Distribution Point Name:&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Full Name:&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; URL=&lt;A href="http://crl3.digicert.com/sha2-ev-server-g3.crl" target="_blank"&gt;http://crl3.digicert.com/sha2-ev-server-g3.crl&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;[2]CRL Distribution Point&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Distribution Point Name:&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Full Name:&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; URL=&lt;A href="http://crl4.digicert.com/sha2-ev-server-g3.crl" target="_blank"&gt;http://crl4.digicert.com/sha2-ev-server-g3.crl&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Apr 2022 00:50:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-allow-only-x-509-related-cert-validation-traffic-from/m-p/478797#M103808</guid>
      <dc:creator>Ismail2017</dc:creator>
      <dc:date>2022-04-07T00:50:31Z</dc:date>
    </item>
  </channel>
</rss>

