<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL inspection issues with PAN-OS 10.2.3 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-pan-os-10-2-3/m-p/538653#M110569</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/283870"&gt;@itassetbenilde&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Can you clarify if you're talking about SSL forward proxy (traditional decryption) or SSL inbound inspection? You're initial post makes me thing that you're talking about inbound inspection, and the issue that you're describing would have me looking at cipher suites and algorithms and make sure that you don't have a mismatch in what the firewall supports and what's being offered by the server.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 13 Apr 2023 21:07:42 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2023-04-13T21:07:42Z</dc:date>
    <item>
      <title>SSL inspection issues with PAN-OS 10.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-pan-os-10-2-3/m-p/538540#M110556</link>
      <description>&lt;P&gt;Good day,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hoping to get some insights on a particular issue we're having.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've managed to get SSL inspection running using a test server:&lt;/P&gt;
&lt;P&gt;- uploaded the private key and certificate, and the CA's public certificate&lt;/P&gt;
&lt;P&gt;- created a decryption profile and decryption policy&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;While it tested OK, i can't seem to get it running on our production servers. The symptoms are:&lt;/P&gt;
&lt;P&gt;- on the client side, the server seems to just hang when GET'ing the / page&lt;/P&gt;
&lt;P&gt;- no decryption errors registered&lt;/P&gt;
&lt;P&gt;- upon checking the packet capture, it seems that the TLS communication stops after the Client Hello phase - no Server Hello packet received.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- already tried using the private key and certificate from the production server to the test server, and it worked just fine.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am fairly sure about my security policies -- the production server splash page loads up immediately after disabling the decryption policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any suggestions on what the problem might be? To mention, the production server is running IIS. tia&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Apr 2023 23:46:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-pan-os-10-2-3/m-p/538540#M110556</guid>
      <dc:creator>itassetbenilde</dc:creator>
      <dc:date>2023-04-12T23:46:51Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inspection issues with PAN-OS 10.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-pan-os-10-2-3/m-p/538616#M110566</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;The server has to trust the certificate that you are using for ssl decryption. If this is an AD certificate, you'll need a subordinate certificate, or install the certificate you are using for ssl decryption on each server.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2023 15:38:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-pan-os-10-2-3/m-p/538616#M110566</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-04-13T15:38:43Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inspection issues with PAN-OS 10.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-pan-os-10-2-3/m-p/538653#M110569</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/283870"&gt;@itassetbenilde&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Can you clarify if you're talking about SSL forward proxy (traditional decryption) or SSL inbound inspection? You're initial post makes me thing that you're talking about inbound inspection, and the issue that you're describing would have me looking at cipher suites and algorithms and make sure that you don't have a mismatch in what the firewall supports and what's being offered by the server.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2023 21:07:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-pan-os-10-2-3/m-p/538653#M110569</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2023-04-13T21:07:42Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inspection issues with PAN-OS 10.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-pan-os-10-2-3/m-p/538727#M110577</link>
      <description>&lt;P&gt;Thanks for the replies&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To clarify:&lt;/P&gt;
&lt;P&gt;1. i don't think it's a certificate issue -- i used the same set of key/certificate on my test server and it worked just fine.&lt;/P&gt;
&lt;P&gt;2. Yes, i am trying to get SSL inbound inspection to work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Some updates:&lt;/P&gt;
&lt;P&gt;1. The problem seems to be tied to the DHE/ECDHE key exchange algorithm in the decryption profile. When i set it to just RSA it works just fine.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. On wireshark it's clear that client and server are able to establish a TLS connection, and i can see the ECDHE settings. i can also see the server sending "application data" back to the client, then it just hangs until the client sends a reset.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3. Curious thing is that the page doesn't load when i use browsers, but i can access the page using curl and/or python requests. The only difference i could spot is that traffic is detected(on wireshark) as "Hypertext Transfer Protocol 2" when i used the browser, and "Hypertext Transfer Protocol" when&amp;nbsp; i used curl.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Apr 2023 07:18:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-pan-os-10-2-3/m-p/538727#M110577</guid>
      <dc:creator>itassetbenilde</dc:creator>
      <dc:date>2023-04-14T07:18:12Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inspection issues with PAN-OS 10.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-pan-os-10-2-3/m-p/538966#M110596</link>
      <description>&lt;P&gt;Am starting to suspect this is an IIS configuration thing. i've managed to get it working on a second server running Apache.&lt;/P&gt;
&lt;P&gt;i've already tried to set the SSL cipher suite via group policy settings to match the SSL decryption policy, still no go.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any suggestions on what to check next?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 10:16:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-pan-os-10-2-3/m-p/538966#M110596</guid>
      <dc:creator>itassetbenilde</dc:creator>
      <dc:date>2023-04-17T10:16:06Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inspection issues with PAN-OS 10.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-pan-os-10-2-3/m-p/541159#M110949</link>
      <description>&lt;P&gt;I dug a little deeper into the matter. While investigating a different issue, i came across a suggestion to enable the "Strip ALPN" feature in the SSL Forward Proxy settings. SSL inbound inspection worked with DHE and ECDHE key algos enabled.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This seems to be an issue with HTTP/2. When HTTP/2 is enabled on both IIS and Apache, the connection hangs unless i enable "Strip ALPN" and force the connection down to HTTP/1.1.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the upside, glad to have DHE/ECDHE key algos enabled...but are there any risks to forcing HTTP/1.1 ? Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2023 02:29:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-pan-os-10-2-3/m-p/541159#M110949</guid>
      <dc:creator>itassetbenilde</dc:creator>
      <dc:date>2023-05-05T02:29:22Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inspection issues with PAN-OS 10.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-pan-os-10-2-3/m-p/542143#M111064</link>
      <description>&lt;P&gt;Just to give this issue some closure.&lt;/P&gt;
&lt;P&gt;It turns out there is a known bug with PANOS 10.2.3 regarding HTTP/2 streams(PAN-&lt;SPAN&gt;PAN-206005), and we've been advised to upgrade.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 07:54:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-pan-os-10-2-3/m-p/542143#M111064</guid>
      <dc:creator>itassetbenilde</dc:creator>
      <dc:date>2023-05-15T07:54:51Z</dc:date>
    </item>
  </channel>
</rss>

