<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PCI Compliance - Weak SSL/TLS Key Exchange - 443 / tcp over ssl in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pci-compliance-weak-ssl-tls-key-exchange-443-tcp-over-ssl/m-p/520730#M107929</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/105884"&gt;@jwise&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I recently fix same issue in 9.1.X.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;First yo need to use a Certificate custom ( Self Signed or issue from a internal C.A ).&lt;/P&gt;
&lt;P&gt;Then create SSL/TLS profile minimoum TLS 1.2, maximium Max.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now from CLI you need to disable the weka algortims using in the SSL/TLS profile:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Like this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Disable 3des&lt;BR /&gt;• #set shared ssl-tls-service-profile TLSprofileTest protocol-settings enc-algo-3des no&lt;BR /&gt;• Disable SHA1:&lt;BR /&gt;• #set shared ssl-tls-service-profile TLSprofileTest protocol-settings auth-algo-sha1 no&lt;BR /&gt;disable RC4:&lt;BR /&gt;• #set ssl-tls-service-profile TLSprofileTestprotocol-settings enc-algo-rc4 no&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then you need yo assing the TLS Profile to Managment Web-Gui, en Devece-Setup.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now for SSH you need to do it this:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;• # set deviceconfig system ssh ciphers mgmt aes256-ctr&lt;BR /&gt;• # set deviceconfig system ssh ciphers mgmt aes256-gcm&lt;BR /&gt;• # set deviceconfig system ssh default-hostkey mgmt key-type ECDSA 256&lt;BR /&gt;• # set deviceconfig system ssh regenerate-hostkeys mgmt key-type ECDSA key-length 256&lt;BR /&gt;• # set deviceconfig system ssh session-rekey mgmt interval 3600&lt;BR /&gt;• # set deviceconfig system ssh mac mgmt hmac-sha2-256&lt;BR /&gt;• # set deviceconfig system ssh mac mgmt hmac-sha2-512&lt;BR /&gt;• # delete deviceconfig system ssh kex mgmt&lt;BR /&gt;• # set deviceconfig system ssh kex mgmt ecdh-sha2-nistp521&lt;BR /&gt;• # commit&lt;/P&gt;
&lt;P&gt;Then restart the service SSH:&lt;/P&gt;
&lt;P&gt;# set ssh service restart&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Important&lt;/STRONG&gt;: Always as a good practice, generate a Backup of your config.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;</description>
    <pubDate>Wed, 09 Nov 2022 00:37:15 GMT</pubDate>
    <dc:creator>Metgatz</dc:creator>
    <dc:date>2022-11-09T00:37:15Z</dc:date>
    <item>
      <title>PCI Compliance - Weak SSL/TLS Key Exchange - 443 / tcp over ssl</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-compliance-weak-ssl-tls-key-exchange-443-tcp-over-ssl/m-p/520653#M107913</link>
      <description>&lt;P&gt;We have been having the same issue with PCI compliance scans with two different companies.&lt;/P&gt;
&lt;P&gt;After scanning, they come back with the following error:&lt;/P&gt;
&lt;P&gt;Weak SSL/TLS Key Exchange&lt;/P&gt;
&lt;P&gt;-------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;Change the SSL/TLS server configuration to only allow strong key exchanges. Key exchanges should provide at least 112 bits of security, which translates to a minimum key size of 2048 bits for Diffie Hellman and RSA key exchanges&lt;/P&gt;
&lt;P&gt;-------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;This error is on 443 / tcp over ssl&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have been working with a MSP to try and resolve this, by disabling weak ciphers and such, to no avail.&lt;/P&gt;
&lt;P&gt;We are using a&amp;nbsp;PA-3020, with the latest OS (9.1.14-h4). This device does not support OS 10.x&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any help would be greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2022 14:48:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-compliance-weak-ssl-tls-key-exchange-443-tcp-over-ssl/m-p/520653#M107913</guid>
      <dc:creator>jwise</dc:creator>
      <dc:date>2022-11-08T14:48:14Z</dc:date>
    </item>
    <item>
      <title>Re: PCI Compliance - Weak SSL/TLS Key Exchange - 443 / tcp over ssl</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-compliance-weak-ssl-tls-key-exchange-443-tcp-over-ssl/m-p/520730#M107929</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/105884"&gt;@jwise&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I recently fix same issue in 9.1.X.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;First yo need to use a Certificate custom ( Self Signed or issue from a internal C.A ).&lt;/P&gt;
&lt;P&gt;Then create SSL/TLS profile minimoum TLS 1.2, maximium Max.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now from CLI you need to disable the weka algortims using in the SSL/TLS profile:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Like this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Disable 3des&lt;BR /&gt;• #set shared ssl-tls-service-profile TLSprofileTest protocol-settings enc-algo-3des no&lt;BR /&gt;• Disable SHA1:&lt;BR /&gt;• #set shared ssl-tls-service-profile TLSprofileTest protocol-settings auth-algo-sha1 no&lt;BR /&gt;disable RC4:&lt;BR /&gt;• #set ssl-tls-service-profile TLSprofileTestprotocol-settings enc-algo-rc4 no&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then you need yo assing the TLS Profile to Managment Web-Gui, en Devece-Setup.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now for SSH you need to do it this:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;• # set deviceconfig system ssh ciphers mgmt aes256-ctr&lt;BR /&gt;• # set deviceconfig system ssh ciphers mgmt aes256-gcm&lt;BR /&gt;• # set deviceconfig system ssh default-hostkey mgmt key-type ECDSA 256&lt;BR /&gt;• # set deviceconfig system ssh regenerate-hostkeys mgmt key-type ECDSA key-length 256&lt;BR /&gt;• # set deviceconfig system ssh session-rekey mgmt interval 3600&lt;BR /&gt;• # set deviceconfig system ssh mac mgmt hmac-sha2-256&lt;BR /&gt;• # set deviceconfig system ssh mac mgmt hmac-sha2-512&lt;BR /&gt;• # delete deviceconfig system ssh kex mgmt&lt;BR /&gt;• # set deviceconfig system ssh kex mgmt ecdh-sha2-nistp521&lt;BR /&gt;• # commit&lt;/P&gt;
&lt;P&gt;Then restart the service SSH:&lt;/P&gt;
&lt;P&gt;# set ssh service restart&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Important&lt;/STRONG&gt;: Always as a good practice, generate a Backup of your config.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2022 00:37:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-compliance-weak-ssl-tls-key-exchange-443-tcp-over-ssl/m-p/520730#M107929</guid>
      <dc:creator>Metgatz</dc:creator>
      <dc:date>2022-11-09T00:37:15Z</dc:date>
    </item>
  </channel>
</rss>

