<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Decryption bug in PAN-OS 9.1.14 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/500060#M105198</link>
    <description>&lt;P&gt;It looks like that a workaround has been published or am I wrong?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;PAN-194395&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV&gt;The firewall drops all decrypted outbound (SSL Forward Proxy) HTTP/2 traffic after you upgrade to PAN-OS 9.1.14. Dropping this traffic prevents users from loading HTTP/2 web pages and accessing websites that use HTTP/2.&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV&gt;Workaround&lt;SPAN&gt;: On the SSL Forward Proxy tab in the Decryption profile attached to the Decryption Policy rule that controls the HTTP/2 traffic, select&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Strip ALPN&lt;SPAN&gt;. When you&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Strip ALPN&lt;SPAN&gt;, the firewall negotiates HTTP/1.1 instead of HTTP/2.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;It seems working in my environment.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
    <pubDate>Mon, 06 Jun 2022 09:08:27 GMT</pubDate>
    <dc:creator>N2Z2</dc:creator>
    <dc:date>2022-06-06T09:08:27Z</dc:date>
    <item>
      <title>SSL Decryption bug in PAN-OS 9.1.14</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/489882#M104894</link>
      <description>&lt;P&gt;I recently upgraded from panos 9.1.13-h3 to 9.1.14 then SSL decryption stopped working, in the traffic monitor there wasn't any decryption error but when i excluded a PC the internet worked&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;and it seams other people are also having the same issue (&lt;A href="https://www.reddit.com/r/paloaltonetworks/comments/usyh86/panos_9114_out/" target="_blank" rel="noopener"&gt;Reddit&lt;/A&gt;&amp;nbsp;), but its not in the known issue list until now&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;so i had to revert to the previous version and its working now fine&lt;/P&gt;</description>
      <pubDate>Mon, 23 May 2022 17:58:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/489882#M104894</guid>
      <dc:creator>LAS</dc:creator>
      <dc:date>2022-05-23T17:58:45Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption bug in PAN-OS 9.1.14</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/489914#M104895</link>
      <description>&lt;P&gt;I don't know if this is your exact issue, but it seems as if we are tracking something internally. PAN-194219, the software packet buffers are depleting erroneously during HTTP/2 inspection only post 9.1.14 upgrade, and subsequently not decrypting.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am now following the issue and will post updates / workarounds.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 May 2022 18:55:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/489914#M104895</guid>
      <dc:creator>LAYER_8</dc:creator>
      <dc:date>2022-05-23T18:55:44Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption bug in PAN-OS 9.1.14</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/490378#M104907</link>
      <description>&lt;P&gt;Ok thank you, will not update until the issue is resolved&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2022 10:06:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/490378#M104907</guid>
      <dc:creator>LAS</dc:creator>
      <dc:date>2022-05-24T10:06:53Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption bug in PAN-OS 9.1.14</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/490565#M104909</link>
      <description>&lt;P&gt;Same here. Rolling back now....I wonder why there is not any statement by PA. Or is it and I didn't find it?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2022 13:54:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/490565#M104909</guid>
      <dc:creator>joergriether</dc:creator>
      <dc:date>2022-05-24T13:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption bug in PAN-OS 9.1.14</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/490842#M104923</link>
      <description>&lt;P&gt;The issue is escalated to the senior support queue, they've successfully recreated it in a lab and are now identifying root cause.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2022 17:32:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/490842#M104923</guid>
      <dc:creator>LAYER_8</dc:creator>
      <dc:date>2022-05-24T17:32:27Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption bug in PAN-OS 9.1.14</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/495075#M105072</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;could you confirm that the problem is present in both RSA and ECDSA algorithm?&lt;/P&gt;&lt;P&gt;There's a know issue (PAN-83215) for ECDSA but I got the error with RSA.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 31 May 2022 07:39:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/495075#M105072</guid>
      <dc:creator>N2Z2</dc:creator>
      <dc:date>2022-05-31T07:39:42Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption bug in PAN-OS 9.1.14</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/495092#M105073</link>
      <description>&lt;P&gt;The certificate that i use is also RSA&lt;/P&gt;</description>
      <pubDate>Tue, 31 May 2022 07:50:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/495092#M105073</guid>
      <dc:creator>LAS</dc:creator>
      <dc:date>2022-05-31T07:50:07Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption bug in PAN-OS 9.1.14</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/497361#M105123</link>
      <description>&lt;P&gt;Good news! Root cause identified, yes, RSA will get stumped here, too:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;NGFW&amp;gt; debug dataplane show ssl-decrypt session 321122

Session 321122(local 321122), 1.0.0.2[50393]--&amp;gt;2.0.0.2[443]
Proxy Flow
        Index: 721716, Type: proxy, Tag: 321122, Dir: cts
        Rule: CRPNY-Decrypt
        Profile: 18F-Outbound-Decrypt-Office
        4 Packets Pending &lt;SPAN class=""&gt;for&lt;/SPAN&gt; L7 Proc
        TCP state
                Server Established
                MSS 1460
                DELACK timer is not on, RXMT timer is not on
                Recv Next:  581584158, Window: 49152, Scale: 0
                Send Next:  590184458, Window:  5792, Scale: 0
                Send Max :  590184458, Send Unack:  590184458
                Slow Start Threshold: 1073725440
                Congestion Window: 17520, RTT: 0 ticks
                # of Out-of-Order Pkts: 0
                # of Retrans: 0, # of DupAcks: 0
                # of Unsent Pkts: 0, # of Unacked Pkts: 0
        SSL State
                Protocol Version: TLS1.2
                Cipher : TLS_RSA_WITH_AES_256_GCM_SHA384

Peer Flow
        Index: 721703, Type: proxy, Tag: 321122, Dir: stc
        Rule: CRPNY-Decrypt
        Profile: 18F-Outbound-Decrypt-Office
        Is Closed
        4 Packets Pending &lt;SPAN class=""&gt;for&lt;/SPAN&gt; L7 Proc
        TCP state
                Client Closed Wait
                Can't recv
                MSS 1460
                DELACK timer is not on, RXMT timer is not on
                Recv Next:  590184464, Window: 49152, Scale: 0
                Send Next:  581583672, Window:  5792, Scale: 0
                Send Max :  581583672, Send Unack:  581583672
                Slow Start Threshold: 1073725440
                Congestion Window: 17520, RTT: 0 ticks
                # of Out-of-Order Pkts: 0
                # of Retrans: 0, # of DupAcks: 0
                # of Unsent Pkts: 0, # of Unacked Pkts: 0
        SSL State
                Protocol Version: TLS1.2
                Cipher : TLS_RSA_WITH_AES_256_GCM_SHA384&lt;/PRE&gt;&lt;P&gt;It appears we are seeing upgrade requests from servers through a TLS session, TLS1.1 requests to 1.2 or in some cases 1.3, this is not allowed per RFC. The firewall reads the request as a header frame, and then tries to extract sequential data from the incoming packets of the session. Since the session isn't terminated, the bogus packet(s) aren't dropped, session depletion happens.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are currently researching how to terminate the session when this type of request comes in out of order.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jun 2022 16:58:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/497361#M105123</guid>
      <dc:creator>LAYER_8</dc:creator>
      <dc:date>2022-06-01T16:58:50Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption bug in PAN-OS 9.1.14</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/499136#M105174</link>
      <description>&lt;P&gt;Yep, we just had to roll our HA environment back to 9.1.13-h3 because of this issue (RSA certs). Too bad it wasn't listed in the Known Issues.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jun 2022 12:45:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/499136#M105174</guid>
      <dc:creator>LCMember4169</dc:creator>
      <dc:date>2022-06-03T12:45:23Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption bug in PAN-OS 9.1.14</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/500060#M105198</link>
      <description>&lt;P&gt;It looks like that a workaround has been published or am I wrong?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;PAN-194395&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV&gt;The firewall drops all decrypted outbound (SSL Forward Proxy) HTTP/2 traffic after you upgrade to PAN-OS 9.1.14. Dropping this traffic prevents users from loading HTTP/2 web pages and accessing websites that use HTTP/2.&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV&gt;Workaround&lt;SPAN&gt;: On the SSL Forward Proxy tab in the Decryption profile attached to the Decryption Policy rule that controls the HTTP/2 traffic, select&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Strip ALPN&lt;SPAN&gt;. When you&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Strip ALPN&lt;SPAN&gt;, the firewall negotiates HTTP/1.1 instead of HTTP/2.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;It seems working in my environment.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 06 Jun 2022 09:08:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/500060#M105198</guid>
      <dc:creator>N2Z2</dc:creator>
      <dc:date>2022-06-06T09:08:27Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption bug in PAN-OS 9.1.14</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/500267#M105199</link>
      <description>&lt;P&gt;i will wait then for when its fixed, as i don't want to downgrade HTTP/2 connections to HTTP/1.1 as a workaround&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2022 14:15:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/500267#M105199</guid>
      <dc:creator>LAS</dc:creator>
      <dc:date>2022-06-06T14:15:15Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption bug in PAN-OS 9.1.14</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/500915#M105209</link>
      <description>&lt;P&gt;Indeed, it is now &lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-release-notes/pan-os-9-1-release-information/known-issues/known-issues-related-to-pan-os-9-1-releases/pan-os-9-1-14-known-issues" target="_self"&gt;documented in the known issues&lt;/A&gt;. If your security requirements allow for HTTP1.1 / strip ALPN workaround that will suffice. If not, we are still researching the TLS upgrade requests and out of order queue.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2022 00:02:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/500915#M105209</guid>
      <dc:creator>LAYER_8</dc:creator>
      <dc:date>2022-06-07T00:02:06Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption bug in PAN-OS 9.1.14</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/503285#M105412</link>
      <description>&lt;P&gt;Root cause identified, the fix is coming in 9.1.15-h1. Your choices are upgrade (when available), strip ALPN (if allowed), downgrade/stay on 9.1.13-h3. Final answer &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jun 2022 00:59:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/503285#M105412</guid>
      <dc:creator>LAYER_8</dc:creator>
      <dc:date>2022-06-14T00:59:13Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption bug in PAN-OS 9.1.14</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/503546#M105428</link>
      <description>&lt;P&gt;What is your TLS version? can you show the profile you are using this recommendation did not work. I will attached my profile here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jpan123_0-1655216655552.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/41790iAF5310E0E8658351/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="jpan123_0-1655216655552.png" alt="jpan123_0-1655216655552.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jun 2022 14:24:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/503546#M105428</guid>
      <dc:creator>jpan123</dc:creator>
      <dc:date>2022-06-14T14:24:24Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption bug in PAN-OS 9.1.14</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/503549#M105429</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Min 1.0, max version "Max"&lt;/P&gt;&lt;P&gt;The configuration is the same as in your screenshot&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jun 2022 14:29:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/503549#M105429</guid>
      <dc:creator>N2Z2</dc:creator>
      <dc:date>2022-06-14T14:29:36Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption bug in PAN-OS 9.1.14</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/503550#M105430</link>
      <description>&lt;P&gt;Not working to me. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jun 2022 14:34:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/503550#M105430</guid>
      <dc:creator>jpan123</dc:creator>
      <dc:date>2022-06-14T14:34:30Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption bug in PAN-OS 9.1.14</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/503579#M105433</link>
      <description>&lt;P&gt;Any recommendation that I can try?&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jun 2022 16:17:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/503579#M105433</guid>
      <dc:creator>jpan123</dc:creator>
      <dc:date>2022-06-14T16:17:24Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption bug in PAN-OS 9.1.14</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/503583#M105434</link>
      <description>&lt;P&gt;Have you both enabled strip ALPN?&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jun 2022 16:25:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/503583#M105434</guid>
      <dc:creator>LAYER_8</dc:creator>
      <dc:date>2022-06-14T16:25:29Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption bug in PAN-OS 9.1.14</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/503585#M105435</link>
      <description>&lt;P&gt;In my case yes&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jun 2022 16:29:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/503585#M105435</guid>
      <dc:creator>N2Z2</dc:creator>
      <dc:date>2022-06-14T16:29:21Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption bug in PAN-OS 9.1.14</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/503586#M105436</link>
      <description>&lt;P&gt;What do you mean both enabled?&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jun 2022 16:36:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-bug-in-pan-os-9-1-14/m-p/503586#M105436</guid>
      <dc:creator>jpan123</dc:creator>
      <dc:date>2022-06-14T16:36:57Z</dc:date>
    </item>
  </channel>
</rss>

