<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Questioning about unsupported cipher suite for SSL Decryption in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/questioning-about-unsupported-cipher-suite-for-ssl-decryption/m-p/24895#M18168</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello HULK,&lt;/P&gt;&lt;P&gt;Thanks for giving information &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;. It's a strongly needed information.&lt;/P&gt;&lt;P&gt;But I have question remaining is how do I bypass the unsupported SSL traffic such as a SSL with using unsupported cipher-suite.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should I not assign the SSL decryption profile that makes bypass the unsupported SSL traffic? or how?&lt;/P&gt;&lt;P&gt;I tried to find that URL for SSL handshaking but could not find. I believe that Ciper Suite : TLS_RSA_WITH_AES_256_CBC_SHA makes hiding URL for SSL handshaking, right? I am not sure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I found that URL for SSL handshaking and recognizing URLs of SSL by PAN, I could make a no-decrypt rule but now I cannot do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Roh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 04 Feb 2014 02:16:57 GMT</pubDate>
    <dc:creator>Retired Member</dc:creator>
    <dc:date>2014-02-04T02:16:57Z</dc:date>
    <item>
      <title>Questioning about unsupported cipher suite for SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questioning-about-unsupported-cipher-suite-for-ssl-decryption/m-p/24891#M18164</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello guys.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have installed SSL decryption policy, which is forward proxy, for particular users. It's working fine but some problem occurred. Korean messenger application called kakao-talk for PC is not being able to login during forward-proxy SSL decryption policy applied. So I tried to capture the PCAPs for kakao-talk login function and they were using that TLS version 1.1 and Ciper Suite : TLS_RSA_WITH_AES_256_CBC_SHA (0x0035).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I could not find that any document for unsupported cipher suite for forward proxy (outbound SSL decryption). My question is PAN could not support cipher suite, TLS_RSA_WITH_AES_256_CBC_SHA? How do I bypass for the unsupported cipher suite for outbound SSL decryption? I tried to create a decryption profile that not to enable any block policy but it could not be bypassed and kakao-talk was not able to login.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know what is unsupported cipher suite for outbound SSL decryption and how can I bypass for unsupported outbound SSL decryption traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Roh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 01:37:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questioning-about-unsupported-cipher-suite-for-ssl-decryption/m-p/24891#M18164</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2014-02-04T01:37:20Z</dc:date>
    </item>
    <item>
      <title>Re: Questioning about unsupported cipher suite for SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questioning-about-unsupported-cipher-suite-for-ssl-decryption/m-p/24892#M18165</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have decryption profile assigned to the decryption policy ( Options Tab in the policy )&amp;nbsp; . If so, can you verify if the "Block sessions with unsupported cipher suites" is selected and disable it and try again&amp;nbsp; ? You can define what should be blocked or not blocked for the Unsupported Modes in the decryption profile&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 01:51:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questioning-about-unsupported-cipher-suite-for-ssl-decryption/m-p/24892#M18165</guid>
      <dc:creator>knarra1</dc:creator>
      <dc:date>2014-02-04T01:51:09Z</dc:date>
    </item>
    <item>
      <title>Re: Questioning about unsupported cipher suite for SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questioning-about-unsupported-cipher-suite-for-ssl-decryption/m-p/24893#M18166</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello knarra,&lt;/P&gt;&lt;P&gt;Thanks for interesting my question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, The decryption profile assigned to the decryption policy and I disabled the option "Block sessions with unsupported cipher suites" but it's not working to login for kakao-talk application.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="jiveImage" src="https://live.paloaltonetworks.com/legacyfs/online/11416_pastedImage_0.png" style="max-width: 1200px; max-height: 900px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Roh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 02:06:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questioning-about-unsupported-cipher-suite-for-ssl-decryption/m-p/24893#M18166</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2014-02-04T02:06:52Z</dc:date>
    </item>
    <item>
      <title>Re: Questioning about unsupported cipher suite for SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questioning-about-unsupported-cipher-suite-for-ssl-decryption/m-p/24894#M18167</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Sir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For SSL decryption, we only support SSLv3, TLSv1.0, and TLSv1.1 (TLSv1.2 will be downgraded in forward-proxy mode as of 4.1.9 and 5.0.0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Supported cipher suits:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;RSA-AES256-CBC-SHA&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;RSA-AES128-CBC-SHA&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;RSA-3DES-EDE-CBC-SHA&lt;/P&gt;&lt;P&gt;RSA-RC4-128-MD5&lt;/P&gt;&lt;P&gt;RSA-RC4-128-SHA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 02:10:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questioning-about-unsupported-cipher-suite-for-ssl-decryption/m-p/24894#M18167</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-02-04T02:10:34Z</dc:date>
    </item>
    <item>
      <title>Re: Questioning about unsupported cipher suite for SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questioning-about-unsupported-cipher-suite-for-ssl-decryption/m-p/24895#M18168</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello HULK,&lt;/P&gt;&lt;P&gt;Thanks for giving information &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;. It's a strongly needed information.&lt;/P&gt;&lt;P&gt;But I have question remaining is how do I bypass the unsupported SSL traffic such as a SSL with using unsupported cipher-suite.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should I not assign the SSL decryption profile that makes bypass the unsupported SSL traffic? or how?&lt;/P&gt;&lt;P&gt;I tried to find that URL for SSL handshaking but could not find. I believe that Ciper Suite : TLS_RSA_WITH_AES_256_CBC_SHA makes hiding URL for SSL handshaking, right? I am not sure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I found that URL for SSL handshaking and recognizing URLs of SSL by PAN, I could make a no-decrypt rule but now I cannot do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Roh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 02:16:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questioning-about-unsupported-cipher-suite-for-ssl-decryption/m-p/24895#M18168</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2014-02-04T02:16:57Z</dc:date>
    </item>
    <item>
      <title>Re: Questioning about unsupported cipher suite for SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questioning-about-unsupported-cipher-suite-for-ssl-decryption/m-p/24896#M18169</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Roh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;First of all, we&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; can't decrypt where &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;diffie&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;hellman&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; is used in the key establishment. SSL traffic will be encrypted, so we can not see the original URL &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;on&lt;/SPAN&gt; the URL logs. URL logs will give us the certificate name. If you have that Destination IP address, you can create a No-Decryption policy for that specific destination &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;top of the policy table).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Thanks&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 02:40:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questioning-about-unsupported-cipher-suite-for-ssl-decryption/m-p/24896#M18169</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-02-04T02:40:52Z</dc:date>
    </item>
    <item>
      <title>Re: Questioning about unsupported cipher suite for SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questioning-about-unsupported-cipher-suite-for-ssl-decryption/m-p/24897#M18170</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello HULK,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for giving a information. Finally I created a no-decrypted rule with destination address and it's working fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a nice day.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Roh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 03:27:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questioning-about-unsupported-cipher-suite-for-ssl-decryption/m-p/24897#M18170</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2014-02-04T03:27:03Z</dc:date>
    </item>
    <item>
      <title>Re: Questioning about unsupported cipher suite for SSL Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/questioning-about-unsupported-cipher-suite-for-ssl-decryption/m-p/446664#M100609</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have recently found this topic, but I have the same problem. We have PAN OS 9.1.7 which already have predefine ssl decryption exclude list contain *.kakao.com, even I have added more kakao.com domain into the exclude list or add the url category or destination with kakao IP address in the no decryption policy, while other traffic like web-browsing and ssl will decrypt. It is still failed to login Kakao talk when ssl decryption in place.&lt;/P&gt;&lt;P&gt;The only way to make Kakao talk work is to NOT decrypt everything, with the no decrypt rule place at first in the decryption policy pool.&lt;/P&gt;&lt;P&gt;Would anyone please help to suggest, my aim is to make the Kakao talk works and we can still decrypt normal http/https traffic.&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Wed, 10 Nov 2021 07:25:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/questioning-about-unsupported-cipher-suite-for-ssl-decryption/m-p/446664#M100609</guid>
      <dc:creator>terryc07</dc:creator>
      <dc:date>2021-11-10T07:25:18Z</dc:date>
    </item>
  </channel>
</rss>

