<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: OCSP on SSL decrypt with self signed certificate in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ocsp-on-ssl-decrypt-with-self-signed-certificate/m-p/159#M122</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please tell some details? I think we're hitting a same bug:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Jun 21 08:34:15 Error: sslmgr_parse_request(sslmgr_main.c:820): Truncated buffer(8188)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Jun 21 08:38:31 Error: pan_ocsp_certchain_to_file(pan_crl.c:1078): Error opening /opt/pancfg/certificates/predefined/VeriSign, Inc.,&lt;/P&gt;&lt;P&gt;Jun 21 08:38:31 Error: pan_ocsp_fetch_ocsp(pan_crl.c:1922): pan_ocsp_certchain_to_file() failed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The certificate for the site&amp;nbsp; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://neo.ubs.com"&gt;https://neo.ubs.com&lt;/A&gt;&lt;SPAN&gt; is valid but our pa says the certificate is expired.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 21 Jun 2013 06:50:00 GMT</pubDate>
    <dc:creator>azwicker</dc:creator>
    <dc:date>2013-06-21T06:50:00Z</dc:date>
    <item>
      <title>OCSP on SSL decrypt with self signed certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ocsp-on-ssl-decrypt-with-self-signed-certificate/m-p/150#M113</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When enabling OCSP and having a self signed certificate for SSL decryption&lt;/P&gt;&lt;P&gt;(we push the certificate to all our domain clients)&lt;/P&gt;&lt;P&gt;will OCSP check my self signed certificate against the OCSP responder (and fail because it is unknown)?&lt;/P&gt;&lt;P&gt;Or will it only check the original destination server certificate (for example that of facebook)?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 May 2013 11:45:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ocsp-on-ssl-decrypt-with-self-signed-certificate/m-p/150#M113</guid>
      <dc:creator>mr.linus</dc:creator>
      <dc:date>2013-05-02T11:45:26Z</dc:date>
    </item>
    <item>
      <title>Re: OCSP on SSL decrypt with self signed certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ocsp-on-ssl-decrypt-with-self-signed-certificate/m-p/151#M114</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The OCSP extension will simply not be built in the client-side certificate by default. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you choose to use an OCSP responder on the self-signed certificate, the client will use that OCSP responder. It won't fail, because the OCSP responder will not find a revoked serial number (it won't find any serial number, but that's not the purpose of OCSP).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;&lt;P&gt;Greg Wesson &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 May 2013 22:42:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ocsp-on-ssl-decrypt-with-self-signed-certificate/m-p/151#M114</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2013-05-02T22:42:33Z</dc:date>
    </item>
    <item>
      <title>Re: OCSP on SSL decrypt with self signed certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ocsp-on-ssl-decrypt-with-self-signed-certificate/m-p/152#M115</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Allright, OCSP is not completely clear to me yet.&lt;/P&gt;&lt;P&gt;Would you not use it purely for client certificates?&lt;/P&gt;&lt;P&gt;And if so, how do you dissable it to check all server certificaes when ssl decryption is enabled.&lt;/P&gt;&lt;P&gt;Because when we set this up and we use SSL decryption, we get untrusted warnings for all certificates. To solve this, we would need to configure an OCSP responder for all CA's separately, which obviously is not possible.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 May 2013 09:23:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ocsp-on-ssl-decrypt-with-self-signed-certificate/m-p/152#M115</guid>
      <dc:creator>mr.linus</dc:creator>
      <dc:date>2013-05-03T09:23:24Z</dc:date>
    </item>
    <item>
      <title>Re: OCSP on SSL decrypt with self signed certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ocsp-on-ssl-decrypt-with-self-signed-certificate/m-p/153#M116</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OCSP is pretty uncommon to be used for SSL decryption. I most commonly see it used for the firewall login itself (using a trusted or in-house CA), captive portal, and global protect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The reason you get untrusted warnings on all certificates with SSL decryption is because the firewall is creating a new certificate on the fly for the host you are visiting. For example, if your client visits &lt;/SPAN&gt;&lt;A class="jive-link-anchor-small" href="https://live.paloaltonetworks.com/"&gt;https://live.paloaltonetworks.com&lt;/A&gt;&lt;SPAN&gt;, instead of the certificate being issued by GoDaddy as ours is, it is issued by your firewall. The firewall copies the Common Name and dates from the official GoDaddy cert on that site, but has to issue a new one for the client.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unless the client trusts that firewall CA certificate, every site will be untrusted. This is the nature of SSL Decryption (technically it is a man-in-the-middle). &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 May 2013 16:21:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ocsp-on-ssl-decrypt-with-self-signed-certificate/m-p/153#M116</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2013-05-03T16:21:53Z</dc:date>
    </item>
    <item>
      <title>Re: OCSP on SSL decrypt with self signed certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ocsp-on-ssl-decrypt-with-self-signed-certificate/m-p/154#M117</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Following, since this case relates to us &lt;img id="smileywink" class="emoticon emoticon-smileywink" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-wink.png" alt="Smiley Wink" title="Smiley Wink" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 May 2013 09:10:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ocsp-on-ssl-decrypt-with-self-signed-certificate/m-p/154#M117</guid>
      <dc:creator>dieter_b</dc:creator>
      <dc:date>2013-05-06T09:10:08Z</dc:date>
    </item>
    <item>
      <title>Re: OCSP on SSL decrypt with self signed certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ocsp-on-ssl-decrypt-with-self-signed-certificate/m-p/155#M118</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I know, that is PA ssl decryption 101 &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I mean even with the client having the root CA in his trust, we still get all untrusted certificates.&lt;/P&gt;&lt;P&gt;(without OCSP the ssl decryption works fine)&lt;/P&gt;&lt;P&gt;Looks like the OCSP is not checking the root CA, but is checking if the original certificate (for example facebook) is not revoked...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 May 2013 10:11:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ocsp-on-ssl-decrypt-with-self-signed-certificate/m-p/155#M118</guid>
      <dc:creator>mr.linus</dc:creator>
      <dc:date>2013-05-06T10:11:50Z</dc:date>
    </item>
    <item>
      <title>Re: OCSP on SSL decrypt with self signed certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ocsp-on-ssl-decrypt-with-self-signed-certificate/m-p/156#M119</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I wouldn't expect using OCSP would have any effect on decryption. I think that it might be worth creating a case with support as long as your firewall is under a support contract. The client doesn't get the original certificate, so it wouldn't be possible for them to check to see if it is revoked or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you open your support ticket, please point to this discussion for additional background.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Greg &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 May 2013 22:02:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ocsp-on-ssl-decrypt-with-self-signed-certificate/m-p/156#M119</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2013-05-06T22:02:25Z</dc:date>
    </item>
    <item>
      <title>Re: OCSP on SSL decrypt with self signed certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ocsp-on-ssl-decrypt-with-self-signed-certificate/m-p/157#M120</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Owkey, then it seems my initial understanding of OCSP was somewhat correct and this should not have any impact on ssl decryption.&lt;/P&gt;&lt;P&gt;I have opened a tech support case (pointing to this discussion).&lt;/P&gt;&lt;P&gt;I will give an update as soon as I have one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tanx for all the help Greg!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Linus&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 11:02:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ocsp-on-ssl-decrypt-with-self-signed-certificate/m-p/157#M120</guid>
      <dc:creator>mr.linus</dc:creator>
      <dc:date>2013-05-07T11:02:19Z</dc:date>
    </item>
    <item>
      <title>Re: OCSP on SSL decrypt with self signed certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ocsp-on-ssl-decrypt-with-self-signed-certificate/m-p/158#M121</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;owkey&lt;/P&gt;&lt;P&gt;a quick update: seems we were hitting a bug. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it seems there was a filename buffer overflow. so when we enable ocsp and the PA did a check to find the PA responder it would fail because the filename was to long.&lt;/P&gt;&lt;P&gt;(extract from the sslmgr.log file:&amp;nbsp; pan_ocsp_certchain_to_file(pan_crl.c:1104): Error opening /opt/pancfg/certificates/predefined/VeriSign, Inc., )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PA feedack:&lt;/P&gt;&lt;P&gt;The fix for the original issue is still being tested. I will update you with further OS version information when available. &lt;/P&gt;&lt;P&gt;The fix will extend the CA filename buffer to eliminate the error message we are seeing in sslmgr.log. Also, it will clean up the cert status representation on the dataplane.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Jun 2013 12:17:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ocsp-on-ssl-decrypt-with-self-signed-certificate/m-p/158#M121</guid>
      <dc:creator>mr.linus</dc:creator>
      <dc:date>2013-06-18T12:17:05Z</dc:date>
    </item>
    <item>
      <title>Re: OCSP on SSL decrypt with self signed certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ocsp-on-ssl-decrypt-with-self-signed-certificate/m-p/159#M122</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please tell some details? I think we're hitting a same bug:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Jun 21 08:34:15 Error: sslmgr_parse_request(sslmgr_main.c:820): Truncated buffer(8188)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Jun 21 08:38:31 Error: pan_ocsp_certchain_to_file(pan_crl.c:1078): Error opening /opt/pancfg/certificates/predefined/VeriSign, Inc.,&lt;/P&gt;&lt;P&gt;Jun 21 08:38:31 Error: pan_ocsp_fetch_ocsp(pan_crl.c:1922): pan_ocsp_certchain_to_file() failed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The certificate for the site&amp;nbsp; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://neo.ubs.com"&gt;https://neo.ubs.com&lt;/A&gt;&lt;SPAN&gt; is valid but our pa says the certificate is expired.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Jun 2013 06:50:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ocsp-on-ssl-decrypt-with-self-signed-certificate/m-p/159#M122</guid>
      <dc:creator>azwicker</dc:creator>
      <dc:date>2013-06-21T06:50:00Z</dc:date>
    </item>
    <item>
      <title>Re: OCSP on SSL decrypt with self signed certificate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ocsp-on-ssl-decrypt-with-self-signed-certificate/m-p/160#M123</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think it's best you open a tech support case for your issue. You can always point to this discussion.&lt;/P&gt;&lt;P&gt;The bug id i got was 51658. I am still waiting on the PanOS which will include a fix for this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Jun 2013 06:59:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ocsp-on-ssl-decrypt-with-self-signed-certificate/m-p/160#M123</guid>
      <dc:creator>mr.linus</dc:creator>
      <dc:date>2013-06-25T06:59:22Z</dc:date>
    </item>
  </channel>
</rss>

