<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS apps identified without decryption in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/https-apps-identified-without-decryption/m-p/16168#M11808</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Interesting. I just watch this video of Nur's interview and he briefly mentioned something about this..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.youtube.com/watch?v=kklH3QONErk&amp;amp;feature=player_embedded"&gt;http://www.youtube.com/watch?v=kklH3QONErk&amp;amp;feature=player_embedded&lt;/A&gt;&amp;nbsp; he mentioned about heuristic approach.. at around 9:15 time.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 16 Aug 2011 17:08:14 GMT</pubDate>
    <dc:creator>friento</dc:creator>
    <dc:date>2011-08-16T17:08:14Z</dc:date>
    <item>
      <title>HTTPS apps identified without decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-apps-identified-without-decryption/m-p/16167#M11807</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;in my configuration I have neither SSL Decryption implemented nor URL Filtering. I only have 1 policy: "trust to untrst accept all" in Vwire. PANOS 4.0.2&lt;/P&gt;&lt;P&gt;If, from my PC behind PAN device, I try to go to: _http&lt;STRONG&gt;s&lt;/STRONG&gt;://www.facebook.com_&lt;/P&gt;&lt;P&gt;PAN device shows me the app facebook-base in the Traffic Logs.&lt;/P&gt;&lt;P&gt;If I put a block policy for all facebook traffic and try to go to _http&lt;STRONG&gt;s&lt;/STRONG&gt;://www.facebook.com_&lt;/P&gt;&lt;P&gt;PAN device blocks my connection and I see the facebook-base app blocked in my Traffic Logs.&lt;/P&gt;&lt;P&gt;I analyzed my traffic with Wireshark and the only things I see are:&lt;/P&gt;&lt;P&gt;- DNS Request for facebook.com&lt;/P&gt;&lt;P&gt;- TLSv1 Negotation phase&lt;/P&gt;&lt;P&gt;- Change Chiper Spec exchange&lt;/P&gt;&lt;P&gt;- Application phase (where the application layer takes place) with the Application Data Protocol (HTTP) encrypted.&lt;/P&gt;&lt;P&gt;Eveything is encrypted, there is no HTTP GET in clear, no URL visible (obviously the URLs are encrypted)...&lt;/P&gt;&lt;P&gt;So, the question is: how is it possible that PAN device sees Facebook traffic in a HTTPS (TLSv1) connection?&lt;/P&gt;&lt;P&gt;Then, when I need to implement SSL Decryption? Only if I want "safe enablement"?&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The same behavior with _&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://secure.logmein.com_"&gt;https://secure.logmein.com_&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Thanks...maybe I have been missing something...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Aug 2011 13:59:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-apps-identified-without-decryption/m-p/16167#M11807</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2011-08-16T13:59:33Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS apps identified without decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-apps-identified-without-decryption/m-p/16168#M11808</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Interesting. I just watch this video of Nur's interview and he briefly mentioned something about this..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.youtube.com/watch?v=kklH3QONErk&amp;amp;feature=player_embedded"&gt;http://www.youtube.com/watch?v=kklH3QONErk&amp;amp;feature=player_embedded&lt;/A&gt;&amp;nbsp; he mentioned about heuristic approach.. at around 9:15 time.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Aug 2011 17:08:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-apps-identified-without-decryption/m-p/16168#M11808</guid>
      <dc:creator>friento</dc:creator>
      <dc:date>2011-08-16T17:08:14Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS apps identified without decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-apps-identified-without-decryption/m-p/16169#M11809</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, Friento&lt;/P&gt;&lt;P&gt;I know about Heuristic engine but this should be apply to custom encrypted application, such as Tor, Bittorrent, etc. not to HTTPS traffic...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Aug 2011 18:57:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-apps-identified-without-decryption/m-p/16169#M11809</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2011-08-16T18:57:50Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS apps identified without decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-apps-identified-without-decryption/m-p/16170#M11810</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My guess would be that its possibly looking at the "common name" of the SSL certificate which should be viewable during the initial SSL negotiation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding using SSL decryption...&lt;/P&gt;&lt;P&gt;My previous experience had been that without SSL decrpytion the PA will block specified HTTPS sites but is unable to inject its custom "repsonse page" notifying the user that the URL has been blocked.. so it just looks like a page timeout.. which is not ideal as will likely generate support calls.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Aug 2011 00:05:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-apps-identified-without-decryption/m-p/16170#M11810</guid>
      <dc:creator>ucteam</dc:creator>
      <dc:date>2011-08-17T00:05:18Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS apps identified without decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-apps-identified-without-decryption/m-p/16171#M11811</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you sure you are being blocked because of application and not by URL filtering?&amp;nbsp; The initial certificate exchange is in the clear and the Paloalto can read the destination URL in the cert and still to a URL filtering evaluation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SKrall&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Aug 2011 05:08:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-apps-identified-without-decryption/m-p/16171#M11811</guid>
      <dc:creator>skrall</dc:creator>
      <dc:date>2011-08-17T05:08:58Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS apps identified without decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-apps-identified-without-decryption/m-p/16172#M11812</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Skrall,&lt;/P&gt;&lt;P&gt;I'm totally sure. I don't have URL Filtering ebabled, my Security Policy is just like I said (ANY ANY ALLOW)&lt;/P&gt;&lt;P&gt;No SSL Decryption.&lt;/P&gt;&lt;P&gt;So, you are saying that PAN read the certificate sent by server to the client, which will be used to generate session keys and to encrypt following sessions? For this activity PAN need URL Filtering enabled?&amp;nbsp; In my case there is no URL Filtering and it just block every https connection I decide to block (facebook, gmail, logmein, etc)!&lt;/P&gt;&lt;P&gt;If so, do you think this should be documented, don't you?&lt;/P&gt;&lt;P&gt;I appreciate any further information.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Aug 2011 10:56:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-apps-identified-without-decryption/m-p/16172#M11812</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2011-08-17T10:56:56Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS apps identified without decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-apps-identified-without-decryption/m-p/16173#M11813</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I guess that in this case the application is simply recognised by the URL (or corresponding IP's)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Aug 2011 11:07:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-apps-identified-without-decryption/m-p/16173#M11813</guid>
      <dc:creator>Bart_Jocque</dc:creator>
      <dc:date>2011-08-17T11:07:45Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS apps identified without decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-apps-identified-without-decryption/m-p/16174#M11814</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;URL should not be visible as TLS RFC says as well as my Wireshark.&lt;/P&gt;&lt;P&gt;The only possible way I think is a Reverse Lookup on the IP address (to identify the hostname) made by PAN device prior to apply the action.&lt;/P&gt;&lt;P&gt;Any "certified" answer by PAN support will be appreciated.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Aug 2011 11:17:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-apps-identified-without-decryption/m-p/16174#M11814</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2011-08-17T11:17:04Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS apps identified without decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-apps-identified-without-decryption/m-p/16175#M11815</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In your sniffer trace, look for a packet with a summary description of&amp;nbsp; "Server Hello, Certificate".&amp;nbsp; It is usually the second TLS packet sent from the web site to the client. In the payload you can see the certificate details. One of those details is the fqdn for the webserver "www.facebook.com". If you are blocking the Facebook Base application then this cert is all we need to classify the traffic as Facebook and drop it even though it is considered SSL. Not all of the applications work this way but Facebook only has one product so they are easy to identify.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve Krall&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Aug 2011 18:58:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-apps-identified-without-decryption/m-p/16175#M11815</guid>
      <dc:creator>skrall</dc:creator>
      <dc:date>2011-08-17T18:58:15Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS apps identified without decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-apps-identified-without-decryption/m-p/16176#M11816</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Steve.&lt;/P&gt;&lt;P&gt;This sounds good! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Unfortunatelly, this beaviour is not documented in any pdf/manuals/student guide I've ever read.&lt;/P&gt;&lt;P&gt;Are there other "obscure" mechanism that PAN uses to identify an App? As far as I know: protocol decoder, app signature, protocol decryption, heuristic&lt;/P&gt;&lt;P&gt;I ask you this because is important to know if I have to activate SSL Decryption (with heavy impacts in the organization, privacy, etc) to intercept apps inside TLS or not. I know that this is applied only to base apps (not sub-function)...&lt;/P&gt;&lt;P&gt;Thanks so much!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Aug 2011 16:55:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-apps-identified-without-decryption/m-p/16176#M11816</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2011-08-18T16:55:50Z</dc:date>
    </item>
  </channel>
</rss>

