<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Inspection issues with GlobalProtect users in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/588469#M117323</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;PAN ID: PAN-253546&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Fixed versions: 11.2.2, 10.2.11, 10.1.14, 11.1.5, 11.0.7, 10.2.4-h19, 12.1.0&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;10.1.14 dropped yesterday, with no mention in the release notes of this bug.&amp;nbsp; Is it fixed in that version, or do we need to wait another couple months?&lt;/P&gt;</description>
    <pubDate>Fri, 31 May 2024 08:50:16 GMT</pubDate>
    <dc:creator>TimBaker</dc:creator>
    <dc:date>2024-05-31T08:50:16Z</dc:date>
    <item>
      <title>SSL Inspection issues with GlobalProtect users</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/584535#M116758</link>
      <description>&lt;P&gt;We're having some strange SSL/TLS Inspection errors while on GlobalProtect. We are getting unsupported-parameter errors while a user is connected to GlobalProtect trying to get to any internet site, including things like google.com. Doing a packet capture on the firewall it shows the connection trying to happen on tls 1.0 which we do indeed not allow as part of the decryption profile. This only happens while on GlobalProtect, other users with the same security policies and decryption polices applied work as intended and are decrypted as intended.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This issue appears to have just started today, we updated PAN-OS to 10.2.9-h1 last week. This issue consistently happens on Chrome and Edge, but the issue seems to be almost non existent on Firefox. Which none of these browsers have tls 1.0 enabled. Even on the same computer, it works fine on-prem but has issues on GlobalProtect. Being its the weird combination of GlobalProtect users while using Chromium browsers, not sure which side is incorrectly acting on tls 1.0. I only see unsupported parameter or decryption error as the session end reason in the traffic logs, there are no errors in the decryption logs. Have tested on GP 6.0.7, 6.2.2, and 6.2.3, we are running PAN-OS 10.2.9-h1.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Unchecking the unsupported mode checks block fixes fixes the issue and gets us running for now.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Has anyone experienced something similar or a direction to look? We've also got a TAC case open.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 21:36:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/584535#M116758</guid>
      <dc:creator>Claw4609</dc:creator>
      <dc:date>2024-04-22T21:36:03Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection issues with GlobalProtect users</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/584971#M116794</link>
      <description>&lt;P&gt;Faced the same issue after upgrading &lt;SPAN&gt;&lt;SPAN class="ui-provider ed bot bou bov bow box boy boz bpa bpb bpc bpd bpe bpf bpg bph bpi bpj bpk bpl bpm bpn bpo bpp bpq bpr bps bpt bpu bpv bpw bpx bpy bpz bqa"&gt;to 10.2.8-h3. Also observed the same behavior on&amp;nbsp;10.2.9-h1 as well. Running GP version: 6.1.4, the same issue was on&amp;nbsp; 5.1 version as well.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 19:12:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/584971#M116794</guid>
      <dc:creator>Jagdeep1</dc:creator>
      <dc:date>2024-04-25T19:12:11Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection issues with GlobalProtect users</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/584972#M116795</link>
      <description>&lt;P&gt;Palo sent this for a Prisma Access alert, however this appears to be the cause of the issue for our on-prem environment as well as I am able to replicate the issue on demand by editing this flag in the browser. If we change these flags in Chrome and Edge it resolves the issue. We for now have unchecked the "&lt;SPAN&gt;Block sessions with unsupported" checkbox in the SSL Decryption profile for the time being which is allowing us to get by without changing the flags on the endpoints at this time. We're working with TAC on what Palos recommendations are.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE role="presentation" border="0" cellspacing="0" cellpadding="0" align="center"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;DIV class="x_mj-column-per-100 x_outlook-group-fix"&gt;
&lt;TABLE role="presentation" border="0" width="100%" cellspacing="0" cellpadding="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;TABLE role="presentation" border="0" width="100%" cellspacing="0" cellpadding="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD align="left"&gt;
&lt;DIV data-ogsc="rgb(0, 0, 0)"&gt;
&lt;TABLE width="32" cellspacing="0" cellpadding="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;TABLE role="presentation" border="0" cellspacing="0" cellpadding="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD height="20"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;H2 data-ogsc="rgb(51, 51, 51)"&gt;Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher&lt;/H2&gt;
&lt;TABLE role="presentation" border="0" cellspacing="0" cellpadding="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD height="35"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;SPAN data-ogsc="rgb(51, 51, 51)"&gt;New incident: Monitoring&lt;/SPAN&gt;
&lt;TABLE role="presentation" border="0" cellspacing="0" cellpadding="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD height="12"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;SPAN class="x_email-body" data-ogsc="rgb(51, 51, 51)"&gt;For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:&lt;BR /&gt;&lt;BR /&gt;Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.&lt;BR /&gt;&lt;BR /&gt;Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.&lt;BR /&gt;&lt;BR /&gt;Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Thu, 25 Apr 2024 19:17:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/584972#M116795</guid>
      <dc:creator>Claw4609</dc:creator>
      <dc:date>2024-04-25T19:17:26Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection issues with GlobalProtect users</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/584974#M116796</link>
      <description>&lt;P&gt;Thank You&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/227075"&gt;@Claw4609&lt;/a&gt;&amp;nbsp; for sharing.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 19:28:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/584974#M116796</guid>
      <dc:creator>Jagdeep1</dc:creator>
      <dc:date>2024-04-25T19:28:48Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection issues with GlobalProtect users</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/585084#M116808</link>
      <description>&lt;P&gt;Hello Team&lt;/P&gt;
&lt;P&gt;Is this a known issue, is anybody aware if this has been identified as bug?&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 17:11:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/585084#M116808</guid>
      <dc:creator>UtkarshKumar</dc:creator>
      <dc:date>2024-04-26T17:11:53Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection issues with GlobalProtect users</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/585089#M116809</link>
      <description>&lt;P&gt;We just started with the exact same behavior as OP on 4/20.&amp;nbsp; GP clients are the only ones affected... 10.2.8-h3 or 10.2.9-h1 ... any version of GP.&amp;nbsp; Disabling the Kyber flags fixes the issue as well as the other suggestions in this thread.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 19:12:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/585089#M116809</guid>
      <dc:creator>paul-norris</dc:creator>
      <dc:date>2024-04-26T19:12:39Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection issues with GlobalProtect users</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/585450#M116876</link>
      <description>&lt;P&gt;&lt;STRONG&gt;7/31/2024 Update: &lt;/STRONG&gt;Updated ETA for 10.2.11, 11.2.2&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;7/15/2024 Update: &lt;/STRONG&gt;Current ETA for 10.2.11, addl bug info.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;5/14/2024 Update: &lt;/STRONG&gt;See below - Bug ID and PANOS fixed versions.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;5/6/2024 Update: &lt;/STRONG&gt;See below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Some additional info that might be useful:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Chromium commit to "&lt;SPAN&gt;Enable PostQuantumKyber by default on desktop" occured on 3/12/2024&lt;/SPAN&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://issues.chromium.org/issues/40910498" target="_self"&gt;&lt;SPAN&gt;https://issues.chromium.org/issues/40910498&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Chromium Embedded Framework (CEF) was updated to Chromium v124 on 3/22/2024.
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://bitbucket.org/chromiumembedded/cef/src/master/" target="_blank" rel="noopener"&gt;https://bitbucket.org/chromiumembedded/cef/src/master/&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Google Chrome enabled "TLS 1.3 hybridized Kyber support" in v124 on 4/16/2004.
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://developer.chrome.com/release-notes/124#x25519kyber768_key_encapsulation_for_tls" target="_blank" rel="noopener"&gt;https://developer.chrome.com/release-notes/124#x25519kyber768_key_encapsulation_for_tls&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Impacts:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Any Chromium-based browser (Google Chrome, ARC, Brave, Opera, MS Edge, etc.) gets Kyber enabled by default.
&lt;UL&gt;
&lt;LI&gt;Workaround: As noted above, "&lt;SPAN&gt;Disabling the Kyber flags fixes the issue" for now.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Any applications that use the 3/22/2024 or later versions of the Chromium Embedded Framework (CEF) may also have Kyber on by default.
&lt;UL&gt;
&lt;LI&gt;The macOS Slack Desktop App may be one of these apps.&amp;nbsp;
&lt;UL&gt;
&lt;LI&gt;Workarounds: TBD.&lt;/LI&gt;
&lt;LI&gt;These may be more challenging because these apps that embed CEF don't typically have the flags exposed.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;5/6/2024 Update:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Chromium Embedded Framework (CEF), Slack, and Kyber:
&lt;UL&gt;
&lt;LI&gt;I have traffic logs of traffic from the macOS Slack Desktop app showing the typical decrypt-unsupport-param"&amp;nbsp;errors seen with TLS1.3 traffic with Kyber enabled.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;SSL Decryption Workaround:
&lt;UL&gt;
&lt;LI&gt;Per PAN TAC, the workaround in the SSL Decryption is to disable the following unsupported mode checks. This will allow all TLS1.3 packets with Kyber enabled to bypass SSL Decryption.
&lt;UL&gt;
&lt;LI&gt;The upside is that users are functional.&lt;/LI&gt;
&lt;LI&gt;The downside is that a significant (and growing) percentage of traffic is now bypassing SSL Decryption.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Unblock unsupported mode checks" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59536i85E2B69DEA6E73DE/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Unblock sessions.png" alt="Unblock unsupported mode checks" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Unblock unsupported mode checks&lt;/span&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;LI&gt;This has an unintended consequence; Any traffic with unsupported SSL/TLS versions is now allowed to bypass SSL Decryption. So, you may also need to also broaden the min/max SSL/TLS Protocol versions in order to catch as much encrypted traffic as possible:&lt;/LI&gt;
&lt;LI&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SSL Versions.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59537iD13EDAD40802E6A7/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="SSL Versions.png" alt="SSL Versions.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;5/14/2024 Update&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Updates from my TAC case:
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;PAN ID: PAN-253546&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Fixed versions: 11.2.2, 10.2.11, 10.1.14, 11.1.5, 11.0.7, 10.2.4-h19, 12.1.0&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;7/15/2024 &amp;amp; 7/31/2024 Update&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;"The issue is caused when the large client hello is split into multiple packets and these arrive as out of order on the firewall." - PAN TAC. &lt;/SPAN&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Observation:&amp;nbsp;This happened with Chromium-based browsers, including Google Chrome, on a &lt;EM&gt;very&lt;/EM&gt; regular basis.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;10.2.11, one of the fixed versions, is scheduled to ship around the &lt;STRIKE&gt;end of July 2024&lt;/STRIKE&gt; mid-August 2024.
&lt;UL&gt;
&lt;LI&gt;Keep in mind that its software - it ships when PAN says its ready. The date here is an estimate only.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;STRONG&gt;Shipped:&lt;/STRONG&gt; 11.2.2 shipped on 7/31/2024.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Not Kyber related, but related and useful: As of PANOS 11.1,&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-release-notes/features-introduced-in-pan-os/decryption-features" target="_blank" rel="noopener"&gt;PAN firewalls can detect, block, and log the use of PQC and hybrid PQC algorithms in TLSv1.3 sessions.&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 31 Jul 2024 20:30:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/585450#M116876</guid>
      <dc:creator>jjhernandez</dc:creator>
      <dc:date>2024-07-31T20:30:23Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection issues with GlobalProtect users</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/585511#M116882</link>
      <description>&lt;P&gt;With the hybridized kyber TLS 1.3 support enabled by Google which affects SSL decrypt, is this specifically impacting PAN-OS 10.1, 10.2 and 11.0? I ask out of curiosity because quantum security is in code 11.1 which may or may not be applicable in this scenario.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We're running 10.1.11-h4 and GP 6.0.7.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 May 2024 11:26:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/585511#M116882</guid>
      <dc:creator>BWilson13</dc:creator>
      <dc:date>2024-05-01T11:26:35Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection issues with GlobalProtect users</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/585795#M116920</link>
      <description>&lt;P&gt;seeing the same issue with GP users in our environment. No issues when they are on prem or on prem wifi. &lt;BR /&gt;Disabling the chrome flag looks to resolve the issue. Thanks for the suggestion!&amp;nbsp;&lt;BR /&gt;This was a nasty one, took a good while to track down the very odd intermittent symptoms.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since this is only happening to users on GP, is there anything that palo can/will address on this?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are running PANOS - 10.1.9-H8 - GP 6.1.4&lt;/P&gt;</description>
      <pubDate>Fri, 03 May 2024 20:12:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/585795#M116920</guid>
      <dc:creator>CReyna</dc:creator>
      <dc:date>2024-05-03T20:12:38Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection issues with GlobalProtect users</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/585803#M116922</link>
      <description>&lt;P&gt;I have received this from our TAC case:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have internal reported issue and the target fix versions are:&lt;BR /&gt;10.2.11, 10.1.14, 11.1.5, 11.0.7&lt;/P&gt;</description>
      <pubDate>Sat, 04 May 2024 02:11:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/585803#M116922</guid>
      <dc:creator>Claw4609</dc:creator>
      <dc:date>2024-05-04T02:11:50Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection issues with GlobalProtect users</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/585869#M116934</link>
      <description>&lt;P&gt;Did you by any chance upgrade to the recommended version and test?&lt;/P&gt;</description>
      <pubDate>Mon, 06 May 2024 13:57:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/585869#M116934</guid>
      <dc:creator>BhamyShenoy</dc:creator>
      <dc:date>2024-05-06T13:57:30Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection issues with GlobalProtect users</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/585870#M116935</link>
      <description>&lt;P&gt;We're currently running&amp;nbsp;&lt;SPAN&gt;10.2.9-h1and other have reported the issue on other versions. The targeted fix releases arent out yet, given they are two versions away my guess would be 4-6 months until release but Im asking TAC if they have an ETA.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 May 2024 14:00:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/585870#M116935</guid>
      <dc:creator>Claw4609</dc:creator>
      <dc:date>2024-05-06T14:00:08Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection issues with GlobalProtect users</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/585873#M116936</link>
      <description>&lt;P&gt;Ah, my bad I did not look for 10.2 versions. Yes, I reported the issue with the TAC as well. We are on 10.1.11.&amp;nbsp; I am awaiting their response regarding fix versions and ETA. Thanks much!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 May 2024 14:41:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/585873#M116936</guid>
      <dc:creator>BhamyShenoy</dc:creator>
      <dc:date>2024-05-06T14:41:25Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection issues with GlobalProtect users</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/586115#M116985</link>
      <description>&lt;P&gt;Is there a bug-id referenced in the case?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 02:45:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/586115#M116985</guid>
      <dc:creator>MilesMclaughlin</dc:creator>
      <dc:date>2024-05-08T02:45:20Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection issues with GlobalProtect users</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/586165#M116991</link>
      <description>&lt;P&gt;Not that they said at least, they just said they have an internal bug-id created. Also stated there is no current ETA on the targeted fix releases.&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 12:01:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/586165#M116991</guid>
      <dc:creator>Claw4609</dc:creator>
      <dc:date>2024-05-08T12:01:12Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection issues with GlobalProtect users</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/588469#M117323</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;PAN ID: PAN-253546&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Fixed versions: 11.2.2, 10.2.11, 10.1.14, 11.1.5, 11.0.7, 10.2.4-h19, 12.1.0&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;10.1.14 dropped yesterday, with no mention in the release notes of this bug.&amp;nbsp; Is it fixed in that version, or do we need to wait another couple months?&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 08:50:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/588469#M117323</guid>
      <dc:creator>TimBaker</dc:creator>
      <dc:date>2024-05-31T08:50:16Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection issues with GlobalProtect users</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/588582#M117343</link>
      <description>&lt;P&gt;i'm not seeing anything related in the 1.1.14 release notes?&lt;BR /&gt;someone got it tested yet?&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 09:31:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/588582#M117343</guid>
      <dc:creator>ADK999</dc:creator>
      <dc:date>2024-06-03T09:31:07Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection issues with GlobalProtect users</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/589595#M117503</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Thanks for your post. What about the 10.2 ? Because there is not 10.2.10 yet... I did some wireshark capture and the palo alto is downgrading the protocol in my case from TLS1.3 to TLS1.2. This is one of the expected behaviour BUT why it is downgrading in TLS1.2 and not in TLS1.3 without the PQC algo??? I opened a TAC for that.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/decryption/post-quantum-cryptography-detection-and-control" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/decryption/post-quantum-cryptography-detection-and-control&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Have a great day,&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jun 2024 09:42:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/589595#M117503</guid>
      <dc:creator>RomainSalmon</dc:creator>
      <dc:date>2024-06-14T09:42:57Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection issues with GlobalProtect users</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/592717#M117957</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I also have a case open in regards to the issue. TAC confirmed the mentioned versions&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Fixed versions: 11.2.2, 10.2.11, 10.1.14, 11.1.5, 11.0.7, 10.2.4-h19, 12.1.0&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;But we still have the issue in 10.1.14-h2 and I am also wondering why it is not mentioned in the release notes.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2024 07:41:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/592717#M117957</guid>
      <dc:creator>alpatt</dc:creator>
      <dc:date>2024-07-23T07:41:18Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection issues with GlobalProtect users</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/592728#M117960</link>
      <description>&lt;P&gt;Hi, i am wondering the same thing.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have seen this in the 11.2 release note : "&lt;SPAN&gt;Post-quantum cryptography (PQC) is all about the next-gen cryptographic algorithms. These babies replace the old-school ones like Diffie Hellman, RSA, and elliptic curve, which are sitting ducks for those quantum computers. With PAN-OS 11.2 Quasar, we're extending the post-quantum safe VPN introduced in PAN-OS 11.1 Cosmos by introducing PQC algorithms to create quantum-safe hybrid keys."&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;This functionality is available in 11.1: &lt;A href="https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/decryption/post-quantum-cryptography-detection-and-control" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/decryption/post-quantum-cryptography-detection-and-control&lt;/A&gt; est celle de la version 11.1.There is no reference about PQC in previous versions.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;FYI :&amp;nbsp;11.1.2-h3 is the preferred release.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2024 08:10:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-issues-with-globalprotect-users/m-p/592728#M117960</guid>
      <dc:creator>RomainSalmon</dc:creator>
      <dc:date>2024-07-23T08:10:50Z</dc:date>
    </item>
  </channel>
</rss>

