<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL routines::unsafe legacy renegotiation disabled in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-routines-unsafe-legacy-renegotiation-disabled/m-p/561497#M113772</link>
    <description>&lt;P&gt;UPDATE: Per case&amp;nbsp;&lt;SPAN&gt;02716405,&amp;nbsp;&lt;/SPAN&gt;Prisma Access has&amp;nbsp;&lt;SPAN&gt;PAN-184630&lt;/SPAN&gt;&amp;nbsp;integrated into&amp;nbsp;&lt;SPAN&gt;4.0.0-Preferred dataplane version &lt;/SPAN&gt;&lt;STRONG&gt;10.2.4-ch171.&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Will be testing this at the end of this week.&lt;/P&gt;</description>
    <pubDate>Thu, 12 Oct 2023 16:23:42 GMT</pubDate>
    <dc:creator>jjhernandez</dc:creator>
    <dc:date>2023-10-12T16:23:42Z</dc:date>
    <item>
      <title>SSL routines::unsafe legacy renegotiation disabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-routines-unsafe-legacy-renegotiation-disabled/m-p/520652#M107912</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are getting an increasing number of users reporting issues connecting through the Palo Altos when using OpenSSL3. Here is the information I have:&lt;/P&gt;
&lt;P&gt;"We've got someone working on moving to Node-18 from 14. We're getting issues in the build pipeline where OpenSSL3 is failing to connect through the proxy. We get the error unsafe legacy renegotiation disabled - google says the proxy box needs to support RFC 5746. Is there any information on the proxy box and who manages it so we can investigate/come up with a workaround?"&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;And&lt;/P&gt;
&lt;P&gt;"We have reproduced this issue while working to build new ADO agent images - Ubuntu 22.04's version of openssl3 also blocks all outbound ssl connections with the same error:&lt;BR /&gt;1$ curl &lt;A href="https://google.com" target="_blank"&gt;https://google.com&lt;/A&gt;&lt;BR /&gt;2curl: (35) error:0A000152:SSL routines::unsafe legacy renegotiation disabled&lt;BR /&gt;We obviously do not wish to enable the UnsafeLegacyRenegotiation option."&lt;/P&gt;
&lt;P&gt;I see this has also been reporting on the Palo Alto forums at &lt;A href="https://live.paloaltonetworks.com/t5/globalprotect-discussions/rfc5746-issue-with-ssl-decryption-openssl3-0-unsafe-legacy/td-p/511171" target="_blank"&gt;https://live.paloaltonetworks.com/t5/globalprotect-discussions/rfc5746-issue-with-ssl-decryption-openssl3-0-unsafe-legacy/td-p/511171&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Is there a solution to this issue please?&lt;BR /&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;(not sure if this is the right board-please redirect if not-thanks)&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2022 14:39:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-routines-unsafe-legacy-renegotiation-disabled/m-p/520652#M107912</guid>
      <dc:creator>CraigAddison</dc:creator>
      <dc:date>2022-11-08T14:39:32Z</dc:date>
    </item>
    <item>
      <title>Re: SSL routines::unsafe legacy renegotiation disabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-routines-unsafe-legacy-renegotiation-disabled/m-p/520728#M107928</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/198708"&gt;@CraigAddison&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is SSL Decryption enabled on the firewalls?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2022 00:31:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-routines-unsafe-legacy-renegotiation-disabled/m-p/520728#M107928</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2022-11-09T00:31:51Z</dc:date>
    </item>
    <item>
      <title>Re: SSL routines::unsafe legacy renegotiation disabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-routines-unsafe-legacy-renegotiation-disabled/m-p/520755#M107936</link>
      <description>&lt;P&gt;Hi JayGolf,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes&amp;nbsp;&lt;SPAN&gt;SSL Decryption is enabled on the firewalls.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2022 07:58:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-routines-unsafe-legacy-renegotiation-disabled/m-p/520755#M107936</guid>
      <dc:creator>CraigAddison</dc:creator>
      <dc:date>2022-11-09T07:58:14Z</dc:date>
    </item>
    <item>
      <title>Re: SSL routines::unsafe legacy renegotiation disabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-routines-unsafe-legacy-renegotiation-disabled/m-p/520896#M107970</link>
      <description>&lt;P&gt;Hi JayGolf,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did you have any follow up to this please?&lt;/P&gt;</description>
      <pubDate>Thu, 10 Nov 2022 09:47:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-routines-unsafe-legacy-renegotiation-disabled/m-p/520896#M107970</guid>
      <dc:creator>CraigAddison</dc:creator>
      <dc:date>2022-11-10T09:47:52Z</dc:date>
    </item>
    <item>
      <title>Re: SSL routines::unsafe legacy renegotiation disabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-routines-unsafe-legacy-renegotiation-disabled/m-p/520933#M107981</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/198708"&gt;@CraigAddison&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would recommend reaching out to TAC for this issue as there doesn't appear to be any documentation regarding this. Please share any details you discover with TAC.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Nov 2022 19:14:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-routines-unsafe-legacy-renegotiation-disabled/m-p/520933#M107981</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2022-11-10T19:14:51Z</dc:date>
    </item>
    <item>
      <title>Re: SSL routines::unsafe legacy renegotiation disabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-routines-unsafe-legacy-renegotiation-disabled/m-p/521372#M108047</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;does anyone have an idea / updates on this issue ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are seeing the same Problems when using OS/Tools with openssl 3.x there is no connection via SSL working.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Many thanks for keeping this thread alive.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Nov 2022 07:07:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-routines-unsafe-legacy-renegotiation-disabled/m-p/521372#M108047</guid>
      <dc:creator>itadmin777</dc:creator>
      <dc:date>2022-11-16T07:07:48Z</dc:date>
    </item>
    <item>
      <title>Re: SSL routines::unsafe legacy renegotiation disabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-routines-unsafe-legacy-renegotiation-disabled/m-p/521376#M108048</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have had a reply from Palo Alto TAC-&lt;/P&gt;
&lt;P&gt;'This is kb article, and I confirmed that PA does not support SSL/TLS Renegotiation.'&lt;BR /&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000POJ0CAO&amp;amp;lang=en_US%E2%80%A9" target="_blank" rel="noopener noreferrer nofollow"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000POJ0CAO&amp;amp;lang=en_US%E2%80%A9&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Workaround:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;Create Decryption exception for the HTTPS sites that fail due to SSL renegotiation.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Nov 2022 09:09:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-routines-unsafe-legacy-renegotiation-disabled/m-p/521376#M108048</guid>
      <dc:creator>CraigAddison</dc:creator>
      <dc:date>2022-11-16T09:09:58Z</dc:date>
    </item>
    <item>
      <title>Re: SSL routines::unsafe legacy renegotiation disabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-routines-unsafe-legacy-renegotiation-disabled/m-p/559414#M113444</link>
      <description>&lt;P&gt;This has been fixed in "PAN-184630:&amp;nbsp;Fixed an issue where TLS clients, such as those using OpenSSL 3.0, enforced the TLS renegotiation extension (RFC 5746)." Target releases:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;11.0.2 - ETA July 2023&lt;/LI&gt;
&lt;LI&gt;10.2.5 - ETA&amp;nbsp; August 2023&lt;/LI&gt;
&lt;LI&gt;10.1.11 - ETA - September 2023&lt;/LI&gt;
&lt;LI&gt;9.1.17 - ETA October 2023&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/globalprotect-discussions/rfc5746-issue-with-ssl-decryption-openssl3-0-unsafe-legacy/m-p/549471#M4212" target="_self"&gt;https://live.paloaltonetworks.com/t5/globalprotect-discussions/rfc5746-issue-with-ssl-decryption-openssl3-0-unsafe-legacy/m-p/549471#M4212&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Sep 2023 21:15:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-routines-unsafe-legacy-renegotiation-disabled/m-p/559414#M113444</guid>
      <dc:creator>jjhernandez</dc:creator>
      <dc:date>2023-09-25T21:15:52Z</dc:date>
    </item>
    <item>
      <title>Re: SSL routines::unsafe legacy renegotiation disabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-routines-unsafe-legacy-renegotiation-disabled/m-p/561497#M113772</link>
      <description>&lt;P&gt;UPDATE: Per case&amp;nbsp;&lt;SPAN&gt;02716405,&amp;nbsp;&lt;/SPAN&gt;Prisma Access has&amp;nbsp;&lt;SPAN&gt;PAN-184630&lt;/SPAN&gt;&amp;nbsp;integrated into&amp;nbsp;&lt;SPAN&gt;4.0.0-Preferred dataplane version &lt;/SPAN&gt;&lt;STRONG&gt;10.2.4-ch171.&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Will be testing this at the end of this week.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Oct 2023 16:23:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-routines-unsafe-legacy-renegotiation-disabled/m-p/561497#M113772</guid>
      <dc:creator>jjhernandez</dc:creator>
      <dc:date>2023-10-12T16:23:42Z</dc:date>
    </item>
    <item>
      <title>Re: SSL routines::unsafe legacy renegotiation disabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-routines-unsafe-legacy-renegotiation-disabled/m-p/562482#M113927</link>
      <description>&lt;P&gt;UPDATE: Testing of&amp;nbsp;&lt;SPAN&gt;PAN-184630&amp;nbsp;&lt;/SPAN&gt;was successful with Prisma Access&amp;nbsp;&lt;SPAN&gt;4.0.0-Preferred dataplane version&amp;nbsp;&lt;/SPAN&gt;10.2.4-ch171. Having the rest of our gateways upgraded in next available change window.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 20:56:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-routines-unsafe-legacy-renegotiation-disabled/m-p/562482#M113927</guid>
      <dc:creator>jjhernandez</dc:creator>
      <dc:date>2023-10-19T20:56:13Z</dc:date>
    </item>
  </channel>
</rss>

