<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic When doing inbound SSL decrypt via a Palo Alto firewall, how are the private keys that you load into the FW protected? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/when-doing-inbound-ssl-decrypt-via-a-palo-alto-firewall-how-are/m-p/22822#M16675</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had this question come up from a security minded colleague at work, and it was a good question that I didn't know the answer to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to do SSL decryption for inbound SSL connections to servers that sit "behind" the Palo Alto, the procedure involves loading the SSL private keys onto the PA. Under "normal common sense security best practices," this is inherently a security risk, because the SSL private key of web servers should be protected as much as possible and definitely shouldn't be loaded onto a device that is inherently put on the edge of trusted networks (and usually is on the outer edge of a DMZ even in fact!).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So this begs the question: How are the private keys on a PA protected from tampering or from being stolen? If I steal a passive Palo Alto, can I break into it or remove the hard drives and pull the private keys off? What's to stop me from doing that?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 31 May 2013 19:20:44 GMT</pubDate>
    <dc:creator>ericgearhart</dc:creator>
    <dc:date>2013-05-31T19:20:44Z</dc:date>
    <item>
      <title>When doing inbound SSL decrypt via a Palo Alto firewall, how are the private keys that you load into the FW protected?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-doing-inbound-ssl-decrypt-via-a-palo-alto-firewall-how-are/m-p/22822#M16675</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had this question come up from a security minded colleague at work, and it was a good question that I didn't know the answer to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to do SSL decryption for inbound SSL connections to servers that sit "behind" the Palo Alto, the procedure involves loading the SSL private keys onto the PA. Under "normal common sense security best practices," this is inherently a security risk, because the SSL private key of web servers should be protected as much as possible and definitely shouldn't be loaded onto a device that is inherently put on the edge of trusted networks (and usually is on the outer edge of a DMZ even in fact!).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So this begs the question: How are the private keys on a PA protected from tampering or from being stolen? If I steal a passive Palo Alto, can I break into it or remove the hard drives and pull the private keys off? What's to stop me from doing that?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 May 2013 19:20:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-doing-inbound-ssl-decrypt-via-a-palo-alto-firewall-how-are/m-p/22822#M16675</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-05-31T19:20:44Z</dc:date>
    </item>
    <item>
      <title>Re: When doing inbound SSL decrypt via a Palo Alto firewall, how are the private keys that you load into the FW protected?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-doing-inbound-ssl-decrypt-via-a-palo-alto-firewall-how-are/m-p/22823#M16676</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can specify a master key (Device &amp;gt; Master Key and Diagnostics) to encrypt private keys on the firewall.&lt;/P&gt;&lt;P&gt;Private keys are stored in encrypted form by default,even if a new master key is not specified.&lt;/P&gt;&lt;P&gt;The keys can be transported and they can be imported on a different box if the master key matches.&lt;/P&gt;&lt;P&gt;Without a master key match, the import will fail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AMeya&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 May 2013 22:28:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-doing-inbound-ssl-decrypt-via-a-palo-alto-firewall-how-are/m-p/22823#M16676</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-05-31T22:28:12Z</dc:date>
    </item>
    <item>
      <title>Re: When doing inbound SSL decrypt via a Palo Alto firewall, how are the private keys that you load into the FW protected?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-doing-inbound-ssl-decrypt-via-a-palo-alto-firewall-how-are/m-p/22824#M16677</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there a doc describing this including which algos/methods are being used etc?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But as a sidenote to egearhert: If somebody breaks in and steal your PA gear, you should replace the private keys on your servers because they will most likely be affected anyway (somebody untrusted has been inside your datacenter).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also if Im not mistaken the private key thingy doesnt work if the servers are using DH (Diffie Hellman) for keyexchange.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another setup might be to use ssl-offloading. For example a setup such as Internet &amp;lt;-&amp;gt; F5 &amp;lt;-&amp;gt; PA &amp;lt;-&amp;gt; server(s) (I exclude routers/switches in this example).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This way the F5 can terminate the ssl-session and in cleartext forward the traffic towards your servers through the PA. Of course the problem of "what if somebody steals the gear" is moved from PA to F5 (or similar device) but still.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Jun 2013 17:52:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-doing-inbound-ssl-decrypt-via-a-palo-alto-firewall-how-are/m-p/22824#M16677</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-06-02T17:52:38Z</dc:date>
    </item>
  </channel>
</rss>

