<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Decryption Certificate Self-Signed vs Public Trusted CA in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555729#M112864</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/311804"&gt;@Shahlar&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You said, "we just obtained CA certificate&amp;nbsp;for SSL decryption for testing purposes".&amp;nbsp; Was this a public certificate and did you also get the private key?&amp;nbsp; I have never heard of a public certificate authority issuing a CA certificate to a user.&amp;nbsp; Then the user could issue certificates on their behalf, defeating the whole purpose of a trusted CA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The issue is not that there is no point to using public CAs for SSL Forward Proxy.&amp;nbsp; You can't get a public CA certificate and private key.&amp;nbsp; If you have one, I am very curious how you got it.&amp;nbsp; Maybe I am missing something.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
    <pubDate>Tue, 29 Aug 2023 16:11:40 GMT</pubDate>
    <dc:creator>TomYoung</dc:creator>
    <dc:date>2023-08-29T16:11:40Z</dc:date>
    <item>
      <title>SSL Decryption Certificate Self-Signed vs Public Trusted CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555280#M112781</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I searched and read a lot about it, but the more I read the more I get confused. I would appreciate, if someone explain me the difference between self-signed and public trusted certificates for SSL Decryption. As I understand, I need to import it into endpoints machines anyway to make decryption work. Then what is the point of public trusted certificate then?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2023 12:44:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555280#M112781</guid>
      <dc:creator>Shahlar</dc:creator>
      <dc:date>2023-08-25T12:44:38Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Certificate Self-Signed vs Public Trusted CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555293#M112785</link>
      <description>&lt;P&gt;Are you referring to inbound or outbound ssl inspection? For forward proxy (outbound) I dont believe you can use a public certificate, you can use either a self-signed certificate or a cert signed by your internal CA (if applicable). Clients would need to trust the forward trust certificate.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/decryption/configure-ssl-forward-proxy" target="_blank"&gt;Configure SSL Forward Proxy (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/decryption/configure-ssl-inbound-inspection" target="_blank"&gt;Configure SSL Inbound Inspection (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2023 13:31:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555293#M112785</guid>
      <dc:creator>Claw4609</dc:creator>
      <dc:date>2023-08-25T13:31:03Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Certificate Self-Signed vs Public Trusted CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555295#M112787</link>
      <description>&lt;P&gt;I am talking about outbound inspection. But I can buy and install third party issued certificate. Like in this article:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClV8CAK" target="_blank"&gt;Difference Between SSL Forward-Proxy and Inbound Inspection Dec... - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Here is the quote:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;""Note:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;If you want to use a certificate issued by third party, it needs to be a CA certificate and you will have to import public AND private key (Key Pair).&lt;/SPAN&gt;&amp;nbsp;""&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Plus, we just obtained CA certificate for SSL decryption for testing purposes. The point of this was to avoid manual import to any device/software but seems like even in this case we still need manual import.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2023 13:42:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555295#M112787</guid>
      <dc:creator>Shahlar</dc:creator>
      <dc:date>2023-08-25T13:42:46Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Certificate Self-Signed vs Public Trusted CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555299#M112790</link>
      <description>&lt;P&gt;You would effectively just need a certificate that your clients trust and can sign certificates on the fly.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2023 14:04:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555299#M112790</guid>
      <dc:creator>Claw4609</dc:creator>
      <dc:date>2023-08-25T14:04:09Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Certificate Self-Signed vs Public Trusted CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555301#M112791</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Its how the clients behind the firewall with their traffic flowing out through the firewall see the certificate. If its 'self-signed', then the client will not trust the certificate and the end user will get the "This is not a trusted site" warning.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OtakarKlier_0-1692972316543.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/53136i79EC40473C429360/image-size/medium?v=v2&amp;amp;px=400" role="button" title="OtakarKlier_0-1692972316543.png" alt="OtakarKlier_0-1692972316543.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;In order to get the client to trust the certificate, you have to install the root certificate onto all the clients.&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2023 14:05:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555301#M112791</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-08-25T14:05:54Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Certificate Self-Signed vs Public Trusted CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555302#M112792</link>
      <description>&lt;P&gt;yes, and my question was is there any benefit to buy third party certificate for outbound decryption? If I need manually import Root CA to my endpoints anyway (would it be self-signed or third party issued like from Digicert).&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2023 14:16:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555302#M112792</guid>
      <dc:creator>Shahlar</dc:creator>
      <dc:date>2023-08-25T14:16:37Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Certificate Self-Signed vs Public Trusted CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555305#M112793</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;With a paid public certificate, the client already has the root certificate installed and you dont have to deploy it. If you have active directory in your internal network, you can use a subordinate certificate and your windows client will automatically trust it.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClWOCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClWOCA0&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2023 14:20:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555305#M112793</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-08-25T14:20:28Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Certificate Self-Signed vs Public Trusted CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555432#M112821</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/311804"&gt;@Shahlar&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could you show us the public CA certificate you bought? Because I think there is no way to get a public CA certificate that you can use for outbound decryption and the only way to do this is with a locally self signed cert or with a CA cert from an already existing internal CA. Public certificates (no CA certs) you can use for inbound decryption - so to decrypt specific traffic to one or a few webservers (for example with a wildcard certificate).&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 27 Aug 2023 06:51:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555432#M112821</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2023-08-27T06:51:34Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Certificate Self-Signed vs Public Trusted CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555642#M112859</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is a snapshot from Palo Alto. Plus in certificate itself the field: Subject Type=CA.&lt;/P&gt;
&lt;P&gt;Btw, I have one Root CA, one Intermediate CA and one ICA. And as I mentioned earlier, even though it's from DigiCert, I still need to import Root CA on my endpoints, so that they can trust to my Intermediate CA. Which leads to my original topic question: why I should play money to Digicert? I see no difference in their and mine self-signed.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Web capture_29-8-2023_102914_10.50.0.7.jpeg" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/53220iD05DCD224FC7C0F9/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Web capture_29-8-2023_102914_10.50.0.7.jpeg" alt="Web capture_29-8-2023_102914_10.50.0.7.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 08:41:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555642#M112859</guid>
      <dc:creator>Shahlar</dc:creator>
      <dc:date>2023-08-29T08:41:42Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Certificate Self-Signed vs Public Trusted CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555716#M112862</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/311804"&gt;@Shahlar&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Digicert isn't going to sell you a subordinate CA certificate that is actually trusted by the default root and intermediate certificates, if they did they'd quickly become an untrusted certificate authority like Symantec. They'd essentially be selling certificates with the ability to MITM every single major operating system and browser used by normal individuals.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I&amp;nbsp;&lt;EM&gt;think&amp;nbsp;&lt;/EM&gt;you may have purchased a dedicated intermediate from Digicert, and in the process of using it for this massively violated ToS of the product. In the event that this was what you did, then the behavior is actually expected&lt;/P&gt;
&lt;P&gt;behavior with how you would have been using the certificate.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'd highly recommend getting an actual SubCA certificate generated if you have your own in-house PKI system so that your clients automatically trust the generated certificates. If you don't have your own PKI system, just generate a certificate on the firewall and feed it out to all connected clients. This can be done through GPO and most MDMs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the event that you don't have Group Policy to fall back on and you don't have an MDM, you can actually get the certificate deployed through GlobalProtect upon connection easily. Under your Portal Agent configurations add the certificate as a 'Trusted Root CA' and ensure that you have the box checked for 'INSTALL IN LOCAL ROOT CERTIFICATE STORE'. Anyone connecting to GlobalProtect will now have those certificates installed automatically the next time they connect.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 13:43:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555716#M112862</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2023-08-29T13:43:48Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Certificate Self-Signed vs Public Trusted CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555718#M112863</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for the detailed answer. What do you mean by violating ToS? How having third party SSL Decryption certificate violates the ToS?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I see, so in general there is no point to use third party certificate for SSL Decryption, unless it's from you own PKI (which may be on outsource)&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 14:00:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555718#M112863</guid>
      <dc:creator>Shahlar</dc:creator>
      <dc:date>2023-08-29T14:00:10Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Certificate Self-Signed vs Public Trusted CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555729#M112864</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/311804"&gt;@Shahlar&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You said, "we just obtained CA certificate&amp;nbsp;for SSL decryption for testing purposes".&amp;nbsp; Was this a public certificate and did you also get the private key?&amp;nbsp; I have never heard of a public certificate authority issuing a CA certificate to a user.&amp;nbsp; Then the user could issue certificates on their behalf, defeating the whole purpose of a trusted CA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The issue is not that there is no point to using public CAs for SSL Forward Proxy.&amp;nbsp; You can't get a public CA certificate and private key.&amp;nbsp; If you have one, I am very curious how you got it.&amp;nbsp; Maybe I am missing something.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 16:11:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555729#M112864</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-08-29T16:11:40Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Certificate Self-Signed vs Public Trusted CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555817#M112873</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I cleared that out already for myself. So it's not public trusted CA, its CA from public trusted authority. But CA itself is private and acts the same way as self-signed(import root CA into endpoint, so they wlll trust your private CA on Palo Alto). Which confuses me, then why should I use that private certificate and if there any benefits.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2023 08:19:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-certificate-self-signed-vs-public-trusted-ca/m-p/555817#M112873</guid>
      <dc:creator>Shahlar</dc:creator>
      <dc:date>2023-08-30T08:19:27Z</dc:date>
    </item>
  </channel>
</rss>

