<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: antivirus feature on https in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14576#M10704</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi - did you get a fix for this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the same issue.&amp;nbsp; SSL decryption def works, but when trying to display anything other than the requested page (App/Virus block, Continue page etc, I just get a timeout in the browser).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ta&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 06 Feb 2012 18:51:26 GMT</pubDate>
    <dc:creator>apackard</dc:creator>
    <dc:date>2012-02-06T18:51:26Z</dc:date>
    <item>
      <title>antivirus feature on https</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14569#M10697</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all, i'm currently testing some features of our PA-500, i've activated the antivirus policies and going on eicar i can see it blocks the download of the file, when i try to download from https the download proceed. How i can check and block antivirus threat over https session?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The version of os is 4.1 and i've done all features update.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks to all.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jan 2012 10:56:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14569#M10697</guid>
      <dc:creator>fcellini</dc:creator>
      <dc:date>2012-01-05T10:56:06Z</dc:date>
    </item>
    <item>
      <title>Re: antivirus feature on https</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14570#M10698</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will have to configure ssl decryption for this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jan 2012 12:56:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14570#M10698</guid>
      <dc:creator>Bart_Jocque</dc:creator>
      <dc:date>2012-01-05T12:56:18Z</dc:date>
    </item>
    <item>
      <title>Re: antivirus feature on https</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14571#M10699</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;how exacly? Can you be more explicit in your explaination? I have done a Decrypt policy but it seem not working so i suppose i'm doing it wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jan 2012 13:29:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14571#M10699</guid>
      <dc:creator>fcellini</dc:creator>
      <dc:date>2012-01-05T13:29:12Z</dc:date>
    </item>
    <item>
      <title>Re: antivirus feature on https</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14572#M10700</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check the SSL Decryption technote: &lt;A class="jive-link-external-small" href="https://support.paloaltonetworks.com/index.php?option=com_pan&amp;amp;task=dl_tech_doc&amp;amp;filename=SSL-Decryption-Certificates-TN-revC.pdf"&gt;https://support.paloaltonetworks.com/index.php?option=com_pan&amp;amp;task=dl_tech_doc&amp;amp;filename=SSL-Decryption-Certificates-TN-revC.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you do is basically:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Create a new CA (as a test this can be done with openssl) - set expiration for 10 years or so (if you set for example 1 year you would need to redo this work once a year so its up to any ceritifcation policies at your workplace which expiration times are allowed).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Import this CA cert to your PA device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Setup decryption policy in your PA device (for example if you only want to inspect SSL traffic your clients have towards Internet but not towards your own DMZ).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) Import the public key of the CA into your clients.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The last part is only to make this transparent for the clients - otherwise they will get an warning in their webbrowser that the cert used by the site the client is visiting isnt "trusted". Of course the client could just allow it anyway or for that matter install the cert to avoid get a warning next time - but PA will on the fly generate a new "MITM" cert next time the client visits the particular url.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;A good way to test if your SSL-termination is setup correctly is to visit and download the eicar testfile from (both http and https options are available along with .exe and .txt): &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.eicar.org/85-0-Download.html"&gt;http://www.eicar.org/85-0-Download.html&lt;/A&gt;&lt;SPAN&gt; (for more information: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.eicar.org/86-0-Intended-use.html"&gt;http://www.eicar.org/86-0-Intended-use.html&lt;/A&gt;&lt;SPAN&gt;).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Edit: Point 2 above is the private (and public if im not mistaken) key of the CA.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;That is because the PA will on the fly generate a new "faked" (MITM - Man In The Middle) cert using this CA cert before sending the traffic to the client (who if point 4 above is done will not notice that its being inspected (unless the client manually inspect the cert received and will notice that the issuer is changed and that the fingerprint (compared to the original cert) doesnt match (if the visited site have published their fingerprints online or if the client some other way knows what the correct fingerprint is)).&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Jan 2012 17:03:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14572#M10700</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-01-08T17:03:29Z</dc:date>
    </item>
    <item>
      <title>Re: antivirus feature on https</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14573#M10701</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi i have generated the certificate directly from Paloalto, the problem was that the name of certificate. We have ricreate the certificate with name the ip address of appliance and now it seem's to be working better. Now using the eicar download test, trying to download a file in http i see a blocked response web page, and in https it remain in working and remain in cycling. It doesn't display the response page but don't proceed to download of the file. Have you seen the same behavior ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jan 2012 20:37:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14573#M10701</guid>
      <dc:creator>fcellini</dc:creator>
      <dc:date>2012-01-10T20:37:27Z</dc:date>
    </item>
    <item>
      <title>Re: antivirus feature on https</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14574#M10702</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Visit the url in question and verify that your MITM-cert was being used (check the "issued by" stuff when you click on the cert on clientside - it should read the name you gave the cert (issuer) instead of Verisign or whatever the EICAR-site uses).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also verify in your decoding policy that you decode for all url-categories (the above will verify if you have set this up correctly).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have sometimes noticed that occationally the PA unit will let bad code pass, dunno why as I have not yet setup a testcase for this or even did a tcpdump so see what actually happens - the result was anyway that I got open the EICAR.txt over https instead of getting the blocked virus page.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One theory is that the PA unit will send the TCP-RST (or whatever) just after the first packet passes as with EICAR the EICAR teststring will fit in a single packet. Then based on which browser is being used the browser will try to display whatever it got instead of displaying the block (well antivirus) page generated by the PA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone else who have noticied this behaviour (or now if this have been addressed in 4.x series - I think the box in question is a PA-2050 running either 3.0 or 3.1)?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jan 2012 22:15:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14574#M10702</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-01-10T22:15:40Z</dc:date>
    </item>
    <item>
      <title>Re: antivirus feature on https</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14575#M10703</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In My cases, the download from https was blocked only i don't see the response page as in http, i've tested with facebook and a lot of other app and the decrypt policies work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jan 2012 11:10:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14575#M10703</guid>
      <dc:creator>fcellini</dc:creator>
      <dc:date>2012-01-12T11:10:05Z</dc:date>
    </item>
    <item>
      <title>Re: antivirus feature on https</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14576#M10704</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi - did you get a fix for this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the same issue.&amp;nbsp; SSL decryption def works, but when trying to display anything other than the requested page (App/Virus block, Continue page etc, I just get a timeout in the browser).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ta&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Feb 2012 18:51:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14576#M10704</guid>
      <dc:creator>apackard</dc:creator>
      <dc:date>2012-02-06T18:51:26Z</dc:date>
    </item>
    <item>
      <title>Re: antivirus feature on https</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14577#M10705</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Whats your settings of ssl-decrypt along with decryption?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to choose "trusted root CA" along with "forward-untrust-certificate" and "forward-trust-certificate" if im not mistaken.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then in decryption you can set it up as:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Name: SSL-termination&lt;BR /&gt;Category: any&lt;BR /&gt;Type: ssl-forward-proxy&lt;BR /&gt;from: any&lt;BR /&gt;to: any&lt;BR /&gt;source: any&lt;BR /&gt;destination: any&lt;BR /&gt;source-user: any&lt;BR /&gt;block-if-failed-to-decrypt: yes&lt;BR /&gt;negate-source: no&lt;BR /&gt;negate-destination: no&lt;BR /&gt;action: decrypt&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In from/to/source/destination you will limit for which flows it should step in and do the MITM stuff. It can for example be wise to use client-iprange as source in your case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then regarding current VSYS you can setup:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;allow-forward-decrypted-content: yes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can upload customized block pages but I think you can in the GUI go back to the factory default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also verify that you in the antivirusprofile for this particular rule have setup so "http" is set to "block" (I think this is in the defaultprofile already).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Feb 2012 08:05:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14577#M10705</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-02-07T08:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: antivirus feature on https</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14578#M10706</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For the app, i ve no problem in http or https, example facebook, facebook app or other, but for antivirus features when i try to download the eicar test file in http i see the block page, and in https i see the timeout as you. No news.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Feb 2012 08:09:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14578#M10706</guid>
      <dc:creator>fcellini</dc:creator>
      <dc:date>2012-02-07T08:09:29Z</dc:date>
    </item>
    <item>
      <title>Re: antivirus feature on https</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14579#M10707</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have exactly the same problem. I have configured two ssl forwarding certs (a trusted and a unstrusted cert) and imported both certs into my browsers "Trusted Root Cert. Authorities". Configured the ssl decryption policy and tested a few ssl sites with valid and invalid (self signed) certs. All worked as expected except the Eicar tesfiles with ssl. I can see the block in the Threat log, but no response page being displayed in the browser, just sitting there until it times out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are running 4.1.2 in Vwire mode&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas ? Bug ? At least the problem seems to be reproducible&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rgds Roland&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Feb 2012 09:39:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14579#M10707</guid>
      <dc:creator>gafrol</dc:creator>
      <dc:date>2012-02-08T09:39:12Z</dc:date>
    </item>
    <item>
      <title>Re: antivirus feature on https</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14580#M10708</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Differently from Cisco support Forum, it seem's frequented more from customer who helps each other, and less from Palo Alto Networks tech support. So maybe must be opened a case and after that report on this discusion the solution of the case.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Feb 2012 13:53:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14580#M10708</guid>
      <dc:creator>fcellini</dc:creator>
      <dc:date>2012-02-08T13:53:42Z</dc:date>
    </item>
    <item>
      <title>Re: antivirus feature on https</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14581#M10709</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi - I've found a fix for my issue, hopefully it'll fix yours too.&lt;/P&gt;&lt;P&gt;Basically, my rule matching this traffic was set to 'Application Default' service type and, for whatever reason, the block page traffic was being detected as 'web-browsing' on TCP port 443.&lt;/P&gt;&lt;P&gt;By changing the the rule to web-service ports (80,8080,443) - or whatever is required to match the expected apps on that rule - I now get block pages for both HTTP and HTTPS.&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Feb 2012 18:31:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14581#M10709</guid>
      <dc:creator>apackard</dc:creator>
      <dc:date>2012-02-08T18:31:27Z</dc:date>
    </item>
    <item>
      <title>Re: antivirus feature on https</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14582#M10710</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, that's interesting, I have to try this one tomorrow. Although I doubt this should be like that by design. I remember when I played with the ssl decrypt feature a while ago with a 3.x release when I didn't have to specify any ports in the security policy to get the response pages for ssl working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually my test rulebase is pretty straight forward, (vwire) allow everything inside to outside (internet), any application on any port and applied the security profiles like AV/IPS on top of that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway it might be time to open up a trouble ticket for this one....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Feb 2012 19:04:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14582#M10710</guid>
      <dc:creator>gafrol</dc:creator>
      <dc:date>2012-02-08T19:04:39Z</dc:date>
    </item>
    <item>
      <title>Re: antivirus feature on https</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14583#M10711</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sounds like a good reason to open a supportcase for this &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been behind a 3.x device and there both http and https block/continuepages works so it seems like a bug introduced in 4.x or something that (or in combination with updated appid-db).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Feb 2012 08:22:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14583#M10711</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-02-09T08:22:29Z</dc:date>
    </item>
    <item>
      <title>Re: antivirus feature on https</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14584#M10712</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since I have upgraded to 4.1.3 the problem has gone. Seems to be a 4.1.2 problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SSL response pages are working now.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Feb 2012 08:16:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/antivirus-feature-on-https/m-p/14584#M10712</guid>
      <dc:creator>gafrol</dc:creator>
      <dc:date>2012-02-24T08:16:27Z</dc:date>
    </item>
  </channel>
</rss>

