<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ssl decryption with upstream proxy in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-upstream-proxy/m-p/21718#M15869</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You mean PaloAlto automaticly adds site to exclude-cache list ?&lt;/P&gt;&lt;P&gt;Only for that site this behaviour ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 22 Mar 2013 15:20:07 GMT</pubDate>
    <dc:creator>Retired Member</dc:creator>
    <dc:date>2013-03-22T15:20:07Z</dc:date>
    <item>
      <title>ssl decryption with upstream proxy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-upstream-proxy/m-p/21717#M15868</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have a squid server behind our pa fw like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client &amp;lt;-&amp;gt; PA FW &amp;lt;-&amp;gt; Squid Proxy &amp;lt;-&amp;gt; ASA FW &amp;lt;-&amp;gt; Internet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Decryption of site &lt;A class="jive-link-external-small" href="https://addons.mozilla.org/"&gt;https://addons.mozilla.org&lt;/A&gt; adds the IP address of our squid proxy to the exclude-cache list and all following ssl connection are not decrypted anymore. Is this expected behaviour?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Mar 2013 08:30:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-upstream-proxy/m-p/21717#M15868</guid>
      <dc:creator>azwicker</dc:creator>
      <dc:date>2013-03-22T08:30:21Z</dc:date>
    </item>
    <item>
      <title>Re: ssl decryption with upstream proxy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-upstream-proxy/m-p/21718#M15869</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You mean PaloAlto automaticly adds site to exclude-cache list ?&lt;/P&gt;&lt;P&gt;Only for that site this behaviour ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Mar 2013 15:20:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-upstream-proxy/m-p/21718#M15869</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2013-03-22T15:20:07Z</dc:date>
    </item>
    <item>
      <title>Re: ssl decryption with upstream proxy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-upstream-proxy/m-p/21719#M15870</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is expected behavior, though the feature is designed without proxies in mind.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The basis for this behavior is if there is no proxy and an SSL certificate cannot be decrypted, the firewall can avoid attempting to decrypt traffic at that IP for the duration of the exclude-cache. The trouble is that an explicit proxy will cause all sites to be the same IP and will get excluded.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are a few ways to work around/solve the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Move the proxy behind the Palo Alto Networks firewall. This might mean that you have to use the proxy to spoof the client IP if you are using user-id.&lt;/P&gt;&lt;P&gt;2. Use transparent proxy (policy-based-forwarding, L4 routing, WCCP, etc.) upstream from the Palo Alto Networks firewall.&lt;/P&gt;&lt;P&gt;3. Manually add URLs to the exclude cache list. This is fairly time intensive, because it is a reactive approach rather than proactive. The command is:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', 'courier'; font-size: 8pt;"&gt;&amp;gt; configure&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', 'courier'; font-size: 8pt;"&gt;# set ssl-decrypt ssl-exclude-cert www.example.com&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', 'courier'; font-size: 8pt;"&gt;# commit&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#1 might be the easiest to do, though #2 might work better if you already have the equipment to do so.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;&lt;P&gt;Greg &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Mar 2013 18:26:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-upstream-proxy/m-p/21719#M15870</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2013-03-22T18:26:36Z</dc:date>
    </item>
    <item>
      <title>Re: ssl decryption with upstream proxy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-upstream-proxy/m-p/21720#M15871</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Another problem is that the identified appid could be just "http-proxy" instead of the true app being used if you have Client &amp;lt;-&amp;gt; PA &amp;lt;-&amp;gt; Proxy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "proper" solution, as already mentioned, is to setup the flow as Client &amp;lt;-&amp;gt; Proxy &amp;lt;-&amp;gt; PA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also when the PA cannot decrypt the ssl (for example if the server cert cannot be verified) you can use a second cert in PA which the PA will use to notify the client that there is something bad with this connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Good example: Client tries to connect to server using ssl. PA terminates this and handshakes on its own with the server. If the servercert is verified and everything is good PA will then use CERT_OK (or whatever you might call it) towards the client. Client has the CA (which PA uses) as trusted authority (otherwise the client will get a warning that the cert sent from PA couldnt be verified against the CA list).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Bad example: Same as above but the servercert is bad somhow, the CA might not be trusted or the cert expired etc. Instead of using CERT_OK your PA can instead use another cert as CA in the handshake towards the client named CERT_BAD (or whatever you call it). The client has this CERT_BAD as untrusted/blacklisted CA in its browser.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This way the client can get notified if the PA &amp;lt;-&amp;gt; server connection is good or bad.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding how to setup squid in transparent mode (regarding srcip) see this post: &lt;A __default_attr="22641" __jive_macro_name="message" class="jive_macro jive_macro_message" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Mar 2013 07:52:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-upstream-proxy/m-p/21720#M15871</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-03-23T07:52:48Z</dc:date>
    </item>
    <item>
      <title>Re: ssl decryption with upstream proxy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-upstream-proxy/m-p/21721#M15872</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;"Another problem is that the identified appid could be just "http-proxy" instead of the true app being used if you have Client &amp;lt;-&amp;gt; PA &amp;lt;-&amp;gt; Proxy."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;That's completely FALSE !!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;Even if the traffic is going though a proxy (User-&amp;gt; PA -&amp;gt; Proxy) you can still apply application rules to the traffic flow !&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;Instead of seeing 'web-browsing' as application in the log, you will see 'http-proxy' but all the other applications (ms-update, etc) will be recognized correctly !&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;If you need SSL exemption (for specific domain), you must use DNS format (like *.google.com) not IP.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;HA &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Mar 2013 08:53:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-upstream-proxy/m-p/21721#M15872</guid>
      <dc:creator>licenselu</dc:creator>
      <dc:date>2013-03-25T08:53:51Z</dc:date>
    </item>
    <item>
      <title>Re: ssl decryption with upstream proxy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-upstream-proxy/m-p/21722#M15873</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thats what I said - AppID only identifies the outer application being used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is if you have Client &amp;lt;-&amp;gt; PA &amp;lt;-&amp;gt; Proxy then all traffic passing through will be "http-proxy" instead of "youtube, facebook, google-apps" etc.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Mar 2013 09:09:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-upstream-proxy/m-p/21722#M15873</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-03-25T09:09:53Z</dc:date>
    </item>
    <item>
      <title>Re: ssl decryption with upstream proxy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-upstream-proxy/m-p/21723#M15874</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If implementing #1: Can the PA FW evaluate the X-Forwarded-For Header?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Mar 2013 13:24:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-upstream-proxy/m-p/21723#M15874</guid>
      <dc:creator>azwicker</dc:creator>
      <dc:date>2013-03-27T13:24:00Z</dc:date>
    </item>
    <item>
      <title>Re: ssl decryption with upstream proxy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-upstream-proxy/m-p/21724#M15875</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes it can evaluate the X-Forwarded-For header however the value of XFF will be in the source user column in the logs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And currently if you choose to clean out the XFF header it will probably get a hit in misconfigured IPSes (because the header isnt properly cleaned out, just nulled that is the line with XFF will currently show "X-Forwarded-For:" - just the ip/hostname part will be removed).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also XFF seems to be non-standard-RFC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Se this for more information: &lt;A __default_attr="1128" __jive_macro_name="document" class="jive_macro jive_macro_document" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Mar 2013 09:08:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-upstream-proxy/m-p/21724#M15875</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-03-29T09:08:23Z</dc:date>
    </item>
  </channel>
</rss>

