<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SHA256 forward decryption on Palo Alto Networks Firewall PanOS 5.0.15 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/sha256-forward-decryption-on-palo-alto-networks-firewall-panos-5/m-p/15980#M11668</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI &lt;A href="https://live.paloaltonetworks.com/u1/10575"&gt;EdwinD&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure if you already have an answer, if not, here you go -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately, no.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is supported only starting 6.1 as described in release notes -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configurable Key Size for SSL Forward Proxy Server Certificates The firewall now supports both 2048-bit RSA keys (with SHA-256 hashing) and 1024-bit RSA keys (with SHA-1 hashing) for generating the certificates it uses to establish the SSL Forward Proxy session between itself and the client. This is an extension of the 2048-bit key support that was already available with SSL decryption. In previous releases, 2048-bit keys were supported in SSL Inbound Inspection sessions as well as in SSL Forward Proxy sessions between the firewall and the destination server. As part of the extended support for 2048-bit keys, the firewall will now by default dynamically choose the key size to use to establish SSL Forward Proxy sessions with clients, based on the key size used by the destination server. You can optionally configure a static key size for SSL Forward Proxy sessions between the firewall and clients regardless of the key size used by the destination server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can configure the setting under,&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;CLI:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b; text-indent: 0in;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 8pt; font-family: 'courier new', courier;"&gt;&amp;nbsp; &lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10.6666679382324px; font-family: inherit; color: #595959;"&gt;deviceconfig&lt;/SPAN&gt; &lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10.6666679382324px; font-family: inherit; color: #595959;"&gt;{&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b; text-indent: 0in;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 8pt; font-family: 'courier new', courier; color: #595959;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; setting {&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b; text-indent: 0in;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 8pt; font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10.6666679382324px; font-family: inherit; color: #595959;"&gt;ssl&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10.6666679382324px; font-family: inherit; color: #595959;"&gt;-decrypt &lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10.6666679382324px; font-family: inherit; color: #595959;"&gt;{&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b; text-indent: 0in;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 8pt; font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10.6666679382324px; font-family: inherit; color: #595959;"&gt;fwd&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10.6666679382324px; font-family: inherit; color: #595959;"&gt;-proxy-server-cert-key-size {0 | 1024 | 2048};&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b; text-indent: 0in;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 8pt; font-family: 'Courier New'; color: #595959;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b; text-indent: 0in;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 8pt; font-family: 'Courier New'; color: #595959;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b; text-indent: 0in;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 8pt; font-family: 'Courier New'; color: #595959;"&gt;&amp;nbsp; }&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px; font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-family: inherit; text-decoration: underline; color: #696969;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #696969;"&gt;WebUI:&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #696969;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: arial, helvetica, sans-serif; color: #595959;"&gt;Device -&amp;gt; Setup -&amp;gt; Session -&amp;gt; Forward Proxy Server Certificate Settings&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this answers your query.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 28 Apr 2015 12:26:04 GMT</pubDate>
    <dc:creator>prb</dc:creator>
    <dc:date>2015-04-28T12:26:04Z</dc:date>
    <item>
      <title>SHA256 forward decryption on Palo Alto Networks Firewall PanOS 5.0.15</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sha256-forward-decryption-on-palo-alto-networks-firewall-panos-5/m-p/15979#M11667</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a private subordinate CA signed using sha256.&amp;nbsp; This is my forward decryption certificate.&amp;nbsp; The trust anchor is also sha256.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #252525; font-size: 14px; font-family: sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;With forward decryption enabled on my PanOS5.0.15 device, the certificates generated by the firewall are signed using sha1, even when the websites real certificate is signed using sha256.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The current changes made by Google to Chrome mean that the certificate indicator now has a warning because the sites certificate isn't using SHA256.&amp;nbsp;&amp;nbsp; In the future, Chrome will block access to such sites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does PanOS 5.0.15 have a setting that will let me resolve this issue?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;References:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.dropbox.com/s/8jmnp4cs84r5gnt/PaloAltoNetworksCert0.PNG?dl=0" title="https://www.dropbox.com/s/8jmnp4cs84r5gnt/PaloAltoNetworksCert0.PNG?dl=0"&gt;https://www.dropbox.com/s/8jmnp4cs84r5gnt/PaloAltoNetworksCert0.PNG?dl=0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.dropbox.com/s/0tbjlk3plvz6zfu/PaloAltoNetworksCert1.PNG?dl=0" title="https://www.dropbox.com/s/0tbjlk3plvz6zfu/PaloAltoNetworksCert1.PNG?dl=0"&gt;https://www.dropbox.com/s/0tbjlk3plvz6zfu/PaloAltoNetworksCert1.PNG?dl=0&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Apr 2015 16:17:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sha256-forward-decryption-on-palo-alto-networks-firewall-panos-5/m-p/15979#M11667</guid>
      <dc:creator>EdwinD</dc:creator>
      <dc:date>2015-04-24T16:17:31Z</dc:date>
    </item>
    <item>
      <title>Re: SHA256 forward decryption on Palo Alto Networks Firewall PanOS 5.0.15</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sha256-forward-decryption-on-palo-alto-networks-firewall-panos-5/m-p/15980#M11668</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI &lt;A href="https://live.paloaltonetworks.com/u1/10575"&gt;EdwinD&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure if you already have an answer, if not, here you go -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately, no.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is supported only starting 6.1 as described in release notes -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configurable Key Size for SSL Forward Proxy Server Certificates The firewall now supports both 2048-bit RSA keys (with SHA-256 hashing) and 1024-bit RSA keys (with SHA-1 hashing) for generating the certificates it uses to establish the SSL Forward Proxy session between itself and the client. This is an extension of the 2048-bit key support that was already available with SSL decryption. In previous releases, 2048-bit keys were supported in SSL Inbound Inspection sessions as well as in SSL Forward Proxy sessions between the firewall and the destination server. As part of the extended support for 2048-bit keys, the firewall will now by default dynamically choose the key size to use to establish SSL Forward Proxy sessions with clients, based on the key size used by the destination server. You can optionally configure a static key size for SSL Forward Proxy sessions between the firewall and clients regardless of the key size used by the destination server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can configure the setting under,&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;CLI:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b; text-indent: 0in;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 8pt; font-family: 'courier new', courier;"&gt;&amp;nbsp; &lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10.6666679382324px; font-family: inherit; color: #595959;"&gt;deviceconfig&lt;/SPAN&gt; &lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10.6666679382324px; font-family: inherit; color: #595959;"&gt;{&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b; text-indent: 0in;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 8pt; font-family: 'courier new', courier; color: #595959;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; setting {&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b; text-indent: 0in;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 8pt; font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10.6666679382324px; font-family: inherit; color: #595959;"&gt;ssl&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10.6666679382324px; font-family: inherit; color: #595959;"&gt;-decrypt &lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10.6666679382324px; font-family: inherit; color: #595959;"&gt;{&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b; text-indent: 0in;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 8pt; font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10.6666679382324px; font-family: inherit; color: #595959;"&gt;fwd&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10.6666679382324px; font-family: inherit; color: #595959;"&gt;-proxy-server-cert-key-size {0 | 1024 | 2048};&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b; text-indent: 0in;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 8pt; font-family: 'Courier New'; color: #595959;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b; text-indent: 0in;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 8pt; font-family: 'Courier New'; color: #595959;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b; text-indent: 0in;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 8pt; font-family: 'Courier New'; color: #595959;"&gt;&amp;nbsp; }&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px; font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-family: inherit; text-decoration: underline; color: #696969;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #696969;"&gt;WebUI:&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #696969;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: arial, helvetica, sans-serif; color: #595959;"&gt;Device -&amp;gt; Setup -&amp;gt; Session -&amp;gt; Forward Proxy Server Certificate Settings&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this answers your query.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Apr 2015 12:26:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sha256-forward-decryption-on-palo-alto-networks-firewall-panos-5/m-p/15980#M11668</guid>
      <dc:creator>prb</dc:creator>
      <dc:date>2015-04-28T12:26:04Z</dc:date>
    </item>
  </channel>
</rss>

