<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Inbound decryption and nginx webserver in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-and-nginx-webserver/m-p/18901#M13763</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to verify&lt;/P&gt;&lt;P&gt;The traffic is going from one zone to another or alternatively between two different interfaces of the same zone on the firewall&lt;/P&gt;&lt;P&gt;There is a security policy in place to allow the traffic to flow&lt;/P&gt;&lt;P&gt;The certificate and private key for the nginx set have been installed on the PA&lt;/P&gt;&lt;P&gt;There is a decryption policy set for SSL Inbound Inspection&lt;/P&gt;&lt;P&gt;Is the client connecting to the server IP or the NAT address for the server?&lt;/P&gt;&lt;P&gt;If you could provide more detail about your configuration, that would help to troubleshoot&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 29 Apr 2015 13:04:02 GMT</pubDate>
    <dc:creator>James_Costello</dc:creator>
    <dc:date>2015-04-29T13:04:02Z</dc:date>
    <item>
      <title>SSL Inbound decryption and nginx webserver</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-and-nginx-webserver/m-p/18898#M13760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I try to configure nginx 1.6.2 (on linux ubuntu server 14.04 LTS) with fully support SSL Inbound decryption.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 13px;"&gt;We're running PAN-OS 6.0.9.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Based on the document &lt;A href="https://live.paloaltonetworks.com/docs/DOC-2401"&gt;Inbound SSL Decryption Not Working Due to Unsupported Cipher Suites&lt;/A&gt;, I configure this on my nginx.conf:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssl_ciphers "&lt;CODE&gt;&lt;CODE&gt;AES256-SHA256:&lt;SPAN style="font-family: monospace; font-size: 13.3333330154419px;"&gt;AES128-SHA256:&lt;/SPAN&gt;&lt;CODE&gt;RC4-SHA:&lt;CODE&gt;RC4-MD5:&lt;CODE&gt;DES-CBC3-SHA:&lt;CODE&gt;AES256-SHA:&lt;CODE&gt;AES128-SHA&lt;/CODE&gt;&lt;/CODE&gt;&lt;/CODE&gt;&lt;/CODE&gt;&lt;/CODE&gt;&lt;/CODE&gt;&lt;/CODE&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;";&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ssl_protocols TLSv1 TLSv1.1 TLSv1.2;&lt;/P&gt;&lt;P&gt;ssl_prefer_server_ciphers on;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, PAN-OS not decrypt traffic.&lt;/P&gt;&lt;P&gt;Can you help me ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tnx&lt;/P&gt;&lt;P&gt;Carlo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 Apr 2015 13:11:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-and-nginx-webserver/m-p/18898#M13760</guid>
      <dc:creator>ctovazzi</dc:creator>
      <dc:date>2015-04-25T13:11:01Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound decryption and nginx webserver</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-and-nginx-webserver/m-p/18899#M13761</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://live.paloaltonetworks.com/u1/14167"&gt;ctovazzi&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you let a pcap run on the client machine, locate the cipher suite chosen from the server hello packet and paste it here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Say for example - &lt;/P&gt;&lt;P&gt;Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And also output of command,&lt;/P&gt;&lt;P&gt;&amp;gt;show counter global | match proxy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Apr 2015 13:03:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-and-nginx-webserver/m-p/18899#M13761</guid>
      <dc:creator>prb</dc:creator>
      <dc:date>2015-04-28T13:03:04Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound decryption and nginx webserver</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-and-nginx-webserver/m-p/18900#M13762</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi prb,&lt;/P&gt;&lt;P&gt;I run pcap on the client machine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On pcap, I find this (from my client to server):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HandShake protocol: Client Hello&lt;/P&gt;&lt;P&gt;Version: TLS 1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cipher Suites (21 suites):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b)&lt;/P&gt;&lt;P&gt;Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f)&lt;/P&gt;&lt;P&gt;Cipher Suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x009e)&lt;/P&gt;&lt;P&gt;Cipher Suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (0xcc14)&lt;/P&gt;&lt;P&gt;Cipher Suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (0xcc13)&lt;/P&gt;&lt;P&gt;Cipher Suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (0xcc15)&lt;/P&gt;&lt;P&gt;Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a)&lt;/P&gt;&lt;P&gt;Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)&lt;/P&gt;&lt;P&gt;Cipher Suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x0039)&lt;/P&gt;&lt;P&gt;Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009)&lt;/P&gt;&lt;P&gt;Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)&lt;/P&gt;&lt;P&gt;Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x0033)&lt;/P&gt;&lt;P&gt;Cipher Suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (0xc007)&lt;/P&gt;&lt;P&gt;Cipher Suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA (0xc011)&lt;/P&gt;&lt;P&gt;Cipher Suite: TLS_RSA_WITH_AES_128_GCM_SHA256 (0x009c)&lt;/P&gt;&lt;P&gt;Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA (0x0035)&lt;/P&gt;&lt;P&gt;Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA (0x002f)&lt;/P&gt;&lt;P&gt;Cipher Suite: TLS_RSA_WITH_RC4_128_SHA (0x0005)&lt;/P&gt;&lt;P&gt;Cipher Suite: TLS_RSA_WITH_RC4_128_MD5 (0x0004)&lt;/P&gt;&lt;P&gt;Cipher Suite: TLS_RSA_WITH_3DES_EDE_CBC_SHA (0x000a)&lt;/P&gt;&lt;P&gt;Cipher Suite: TLS_EMPTY_RENEGOTIATION_INFO_SCSV (0x00ff)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and this (from server to client after Client Hello Hadshake protocol)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TLSv1.2 Record Layer: Handshake Protocol: Server Hello&lt;/P&gt;&lt;P&gt;Cipher Suite: TLS_RSA_WITH_RC4_128_SHA (0x0005)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Carlo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Apr 2015 16:14:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-and-nginx-webserver/m-p/18900#M13762</guid>
      <dc:creator>ctovazzi</dc:creator>
      <dc:date>2015-04-28T16:14:52Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound decryption and nginx webserver</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-and-nginx-webserver/m-p/18901#M13763</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to verify&lt;/P&gt;&lt;P&gt;The traffic is going from one zone to another or alternatively between two different interfaces of the same zone on the firewall&lt;/P&gt;&lt;P&gt;There is a security policy in place to allow the traffic to flow&lt;/P&gt;&lt;P&gt;The certificate and private key for the nginx set have been installed on the PA&lt;/P&gt;&lt;P&gt;There is a decryption policy set for SSL Inbound Inspection&lt;/P&gt;&lt;P&gt;Is the client connecting to the server IP or the NAT address for the server?&lt;/P&gt;&lt;P&gt;If you could provide more detail about your configuration, that would help to troubleshoot&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Apr 2015 13:04:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-and-nginx-webserver/m-p/18901#M13763</guid>
      <dc:creator>James_Costello</dc:creator>
      <dc:date>2015-04-29T13:04:02Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound decryption and nginx webserver</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-and-nginx-webserver/m-p/18902#M13764</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://live.paloaltonetworks.com/u1/14167"&gt;ctovazzi&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the logs, issue is not with unsupported cipher suite.&lt;/P&gt;&lt;P&gt;You should verify configuration as requested by costello.&lt;/P&gt;&lt;P&gt;If everything is fine, you can check counters to narrow down further.&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&amp;gt;show counter global | match proxy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Apr 2015 19:08:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-and-nginx-webserver/m-p/18902#M13764</guid>
      <dc:creator>prb</dc:creator>
      <dc:date>2015-04-29T19:08:12Z</dc:date>
    </item>
  </channel>
</rss>

