<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Decryption - getting spoof cert out to BYOD personal devices in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-getting-spoof-cert-out-to-byod-personal-devices/m-p/29608#M21628</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;+1 need this for education sector, would be VERY useful and push out some competing products which claim to already do this. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would be very useful when no ssl certificate detected, a portal page detecting the device (ios/android/windows/macos) provided an install mechanism for the certificate.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 25 Nov 2014 05:15:51 GMT</pubDate>
    <dc:creator>ChrisV</dc:creator>
    <dc:date>2014-11-25T05:15:51Z</dc:date>
    <item>
      <title>SSL Decryption - getting spoof cert out to BYOD personal devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-getting-spoof-cert-out-to-byod-personal-devices/m-p/29602#M21622</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are in the process of setting up SSL decryption.&amp;nbsp; We have a BYOD wireless network that needs to have SSL decryption turned on.&amp;nbsp; Students can connect with their personal devices, so we need to be able to block Facebook, porn, etc.that are coming in over HTTPS.&amp;nbsp; We've got it working with organization-owned equipment but are having hang-ups with personal devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is more of a general one to the rest of the users: if you are doing this too, how do you get the cert available to the end user so they can install on their device?&amp;nbsp; We were thinking of having an internal web page that explains the need to install the cert, and have it include a URL to download the cert from the internal web server.&amp;nbsp; I know with other filtering appliances we've had in the past, we did this, and end-users could never figure out how to put the cert in "Trusted Root Certification Authorities" store.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would there be a better way to handle this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Nov 2014 19:27:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-getting-spoof-cert-out-to-byod-personal-devices/m-p/29602#M21622</guid>
      <dc:creator>dannon</dc:creator>
      <dc:date>2014-11-20T19:27:30Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption - getting spoof cert out to BYOD personal devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-getting-spoof-cert-out-to-byod-personal-devices/m-p/29603#M21623</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/u1/28936"&gt;dannon&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The following document can be helpful:&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1802"&gt;Pushing SSL Decryption Certificates Using GPO&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Nov 2014 20:24:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-getting-spoof-cert-out-to-byod-personal-devices/m-p/29603#M21623</guid>
      <dc:creator>bat</dc:creator>
      <dc:date>2014-11-20T20:24:48Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption - getting spoof cert out to BYOD personal devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-getting-spoof-cert-out-to-byod-personal-devices/m-p/29604#M21624</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi @dannon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, that would definitely be the best way to proceed as you cannot have control over machines (pc/laptop/cell/macs) etc to push it through GPO. Once you redirect them, they will need to install the certificate on their devices in order for them to not to get browser's warning. Hope this helps. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Nov 2014 20:28:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-getting-spoof-cert-out-to-byod-personal-devices/m-p/29604#M21624</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-11-20T20:28:17Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption - getting spoof cert out to BYOD personal devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-getting-spoof-cert-out-to-byod-personal-devices/m-p/29605#M21625</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's an interesting problem you have stated! Now, if i understand it right &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. You are ok with the users being redirected to a website and installing the Cert &lt;/P&gt;&lt;P&gt;2. What the actual problem is the fact that the users are unable to add the certs without instruction and/or the instructions are difficult to follow &lt;/P&gt;&lt;P&gt;3. We cannot use the GPO technically as they are not a part of the domain and hence we cannot push the certificates &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, I am making some assumptions &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. All the intended clients are Windows - Multiple versions of them may be &lt;/P&gt;&lt;P&gt;2. All the users may not have administrative access on their computer - A little far fetched but still a remote possibility &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Solution :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We create an installer using C#, which does this for them. Then we can send the installer and not the certificate file. A simple Next, Next Installation will be far easier to follow. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since we are talking windows, a simple c# program will be sufficient.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Convert the Certificate as a x509 format (Open SSL should be able to do this fairly simply)&lt;/P&gt;&lt;P&gt;2. You could create a C# Forms Application with the main install button performing the following &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE style="font-family: Consolas, Menlo, Monaco, 'Lucida Console', 'Liberation Mono', 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Courier New', monospace, serif; background-position: initial;"&gt;&lt;SPAN class="kwd" style="color: #00008b; background: transparent;"&gt;string&lt;/SPAN&gt;&lt;SPAN class="pln" style="background: transparent;"&gt; certFile&lt;/SPAN&gt;&lt;SPAN class="pun" style="background: transparent;"&gt;;&lt;/SPAN&gt;&lt;SPAN class="pln" style="background: transparent;"&gt; &lt;/SPAN&gt;&lt;SPAN class="com" style="color: #808080; background: transparent;"&gt;// Contains name of certificate file&lt;/SPAN&gt;&lt;SPAN class="pln" style="background: transparent;"&gt;&lt;BR /&gt;X509Store store &lt;/SPAN&gt;&lt;SPAN class="pun" style="background: transparent;"&gt;=&lt;/SPAN&gt;&lt;SPAN class="pln" style="background: transparent;"&gt; &lt;/SPAN&gt;&lt;SPAN class="kwd" style="color: #00008b; background: transparent;"&gt;new&lt;/SPAN&gt;&lt;SPAN class="pln" style="background: transparent;"&gt; X509Store&lt;/SPAN&gt;&lt;SPAN class="pun" style="background: transparent;"&gt;(&lt;/SPAN&gt;&lt;SPAN class="typ" style="color: #2b91af; background: transparent;"&gt;StoreName&lt;/SPAN&gt;&lt;SPAN class="pun" style="background: transparent;"&gt;.&lt;/SPAN&gt;&lt;SPAN class="typ" style="color: #2b91af; background: transparent;"&gt;Root&lt;/SPAN&gt;&lt;SPAN class="pun" style="background: transparent;"&gt;,&lt;/SPAN&gt;&lt;SPAN class="pln" style="background: transparent;"&gt; &lt;/SPAN&gt;&lt;SPAN class="typ" style="color: #2b91af; background: transparent;"&gt;StoreLocation&lt;/SPAN&gt;&lt;SPAN class="pun" style="background: transparent;"&gt;.&lt;/SPAN&gt;&lt;SPAN class="typ" style="color: #2b91af; background: transparent;"&gt;CurrentUser&lt;/SPAN&gt;&lt;SPAN class="pun" style="background: transparent;"&gt;);&lt;/SPAN&gt;&lt;SPAN class="pln" style="background: transparent;"&gt;&lt;BR /&gt;store&lt;/SPAN&gt;&lt;SPAN class="pun" style="background: transparent;"&gt;.&lt;/SPAN&gt;&lt;SPAN class="typ" style="color: #2b91af; background: transparent;"&gt;Open&lt;/SPAN&gt;&lt;SPAN class="pun" style="background: transparent;"&gt;(&lt;/SPAN&gt;&lt;SPAN class="typ" style="color: #2b91af; background: transparent;"&gt;OpenFlags&lt;/SPAN&gt;&lt;SPAN class="pun" style="background: transparent;"&gt;.&lt;/SPAN&gt;&lt;SPAN class="typ" style="color: #2b91af; background: transparent;"&gt;ReadWrite&lt;/SPAN&gt;&lt;SPAN class="pun" style="background: transparent;"&gt;);&lt;/SPAN&gt;&lt;SPAN class="pln" style="background: transparent;"&gt;&lt;BR /&gt;store&lt;/SPAN&gt;&lt;SPAN class="pun" style="background: transparent;"&gt;.&lt;/SPAN&gt;&lt;SPAN class="typ" style="color: #2b91af; background: transparent;"&gt;Add&lt;/SPAN&gt;&lt;SPAN class="pun" style="background: transparent;"&gt;(&lt;/SPAN&gt;&lt;SPAN class="kwd" style="color: #00008b; background: transparent;"&gt;new&lt;/SPAN&gt;&lt;SPAN class="pln" style="background: transparent;"&gt; X509Certificate2&lt;/SPAN&gt;&lt;SPAN class="pun" style="background: transparent;"&gt;(&lt;/SPAN&gt;&lt;SPAN class="pln" style="background: transparent;"&gt;X509Certificate2&lt;/SPAN&gt;&lt;SPAN class="pun" style="background: transparent;"&gt;.&lt;/SPAN&gt;&lt;SPAN class="typ" style="color: #2b91af; background: transparent;"&gt;CreateFromCertFile&lt;/SPAN&gt;&lt;SPAN class="pun" style="background: transparent;"&gt;(certF&lt;/SPAN&gt;&lt;SPAN class="pln" style="background: transparent;"&gt;ile&lt;/SPAN&gt;&lt;SPAN class="pun" style="background: transparent;"&gt;)));&lt;/SPAN&gt;&lt;SPAN class="pln" style="background: transparent;"&gt;&lt;BR /&gt;store&lt;/SPAN&gt;&lt;SPAN class="pun" style="background: transparent;"&gt;.&lt;/SPAN&gt;&lt;SPAN class="typ" style="color: #2b91af; background: transparent;"&gt;Close&lt;/SPAN&gt;&lt;/CODE&gt;&lt;SPAN style="font-family: Consolas, Menlo, Monaco, 'Lucida Console', 'Liberation Mono', 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Courier New', monospace, serif; font-size: 10pt; line-height: 1.5em;"&gt;();&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Consolas, Menlo, Monaco, 'Lucida Console', 'Liberation Mono', 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Courier New', monospace, serif; font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Consolas, Menlo, Monaco, 'Lucida Console', 'Liberation Mono', 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Courier New', monospace, serif; font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Consolas, Menlo, Monaco, 'Lucida Console', 'Liberation Mono', 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Courier New', monospace, serif; font-size: 10pt; line-height: 1.5em;"&gt;This will add the Certificate into the Users Root CA (Not the computer account) - Which is sufficient for our purposes &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Consolas, Menlo, Monaco, 'Lucida Console', 'Liberation Mono', 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Courier New', monospace, serif; font-size: 10pt; line-height: 1.5em;"&gt;If thats not a possibility, then create a batch bile &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2 (Onother Option) . Create a batch file with the content (Name the file installCert.bat or something)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;certmgr /add certFile.cer /s Root &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And give the certificate in x509 format and the batch file in the same folder. Once people click on the batch file the cert will be installed &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if you have questions &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hardik&lt;/P&gt;&lt;P&gt;&lt;SPAN class="typ" style="color: #2b91af; background: transparent;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="typ" style="color: #2b91af; background: transparent;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="typ" style="color: #2b91af; background: transparent;"&gt;So, just cl&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 Nov 2014 15:25:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-getting-spoof-cert-out-to-byod-personal-devices/m-p/29605#M21625</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-11-22T15:25:18Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption - getting spoof cert out to BYOD personal devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-getting-spoof-cert-out-to-byod-personal-devices/m-p/29606#M21626</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's an interesting solution Hardik.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue is that we have many iPhones/iPads and android devices coming in, so it's not just limited to Windows boxes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm wondering if end-users would be wary of us running scripts on their own personal devices...??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Nov 2014 17:58:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-getting-spoof-cert-out-to-byod-personal-devices/m-p/29606#M21626</guid>
      <dc:creator>dannon</dc:creator>
      <dc:date>2014-11-24T17:58:02Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption - getting spoof cert out to BYOD personal devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-getting-spoof-cert-out-to-byod-personal-devices/m-p/29607#M21627</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dannon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We could solve this dilemma by enforcing Client Certificate Authentication - There by you can give the users certificates, signed by the Local CA&lt;/P&gt;&lt;P&gt;and they will put that in the Root Cert Store&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Nov 2014 23:36:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-getting-spoof-cert-out-to-byod-personal-devices/m-p/29607#M21627</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-11-24T23:36:22Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption - getting spoof cert out to BYOD personal devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-getting-spoof-cert-out-to-byod-personal-devices/m-p/29608#M21628</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;+1 need this for education sector, would be VERY useful and push out some competing products which claim to already do this. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would be very useful when no ssl certificate detected, a portal page detecting the device (ios/android/windows/macos) provided an install mechanism for the certificate.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Nov 2014 05:15:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-getting-spoof-cert-out-to-byod-personal-devices/m-p/29608#M21628</guid>
      <dc:creator>ChrisV</dc:creator>
      <dc:date>2014-11-25T05:15:51Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption - getting spoof cert out to BYOD personal devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-getting-spoof-cert-out-to-byod-personal-devices/m-p/29609#M21629</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It would be tough to do a redirect to a web page if the client doesn't trust &lt;EM&gt;&lt;STRONG&gt;us&lt;/STRONG&gt;&lt;/EM&gt; as a CA - which is the problem we're trying to solve here.&amp;nbsp; I've emailed certs to users with instructions to install, and that has worked ok.&amp;nbsp; For mobile devices, a solution like our Mobile Security Manager has the ability to simplify provisioning of common configuration like email and certificates.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Nov 2014 06:22:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-getting-spoof-cert-out-to-byod-personal-devices/m-p/29609#M21629</guid>
      <dc:creator>gwesley</dc:creator>
      <dc:date>2014-11-26T06:22:43Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption - getting spoof cert out to BYOD personal devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-getting-spoof-cert-out-to-byod-personal-devices/m-p/29610#M21630</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In the end, we setup an internal web server (IIS7) and have several HTML pages.&amp;nbsp; We also have a link to the SSL-cert and screenshots on how to install it on various client OSs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have our Cisco WLC 5508 wireless controller redirecting BYOD guests to this page after they connect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This was the quickest and simplest way for us.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Dec 2014 21:16:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-getting-spoof-cert-out-to-byod-personal-devices/m-p/29610#M21630</guid>
      <dc:creator>dannon</dc:creator>
      <dc:date>2014-12-02T21:16:07Z</dc:date>
    </item>
  </channel>
</rss>

