<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Inbound decryption woes in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30574#M22371</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We just confirmed this same behavior... a colleague of mine at work was trying to get decrypt working, and I remembered this thread. Decrypt works fine and the URL filtering log populates when he browses using a regular laptop, but from an iPad SSL decrypt does NOT work. The App-ID stays 'ssl' instead of flipping over to web-browsing, and the URL filtering log doesn't populate when he browses from an iPad.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 09 Jul 2013 17:38:21 GMT</pubDate>
    <dc:creator>ericgearhart</dc:creator>
    <dc:date>2013-07-09T17:38:21Z</dc:date>
    <item>
      <title>SSL Inbound decryption woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30565#M22362</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we just configured our first SSL Inbound decryption, but we have some trouble and need help troubleshooting it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Very simple setup:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Webserver in DMZ zone&lt;/P&gt;&lt;P&gt;Firewall policy: from:untrust to:dmz; src:any; dst:webserver; app:ssl,web-browsing; service:service-http(s); action:allow&lt;/P&gt;&lt;P&gt;Decryption policy: from:untrust to:dmz; src:any; dst:webserver; action:decrypt&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The webserver's certifictate and key have been imported to the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Accessing the webserver from an external PC: Traffic gets decrypted perfectly.&lt;/P&gt;&lt;P&gt;Accessing the webserver from an iPhone and from and Android device: Traffic is *not* being decrypted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In all cases the source IPs were completely random and are not subject to any firewall rule. This is reproducible and I tried to find out why it would decrypt in one case but not in another. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas? Is there a way I can troubleshoot this other than looking at the traffic logs, which don't contain any helpful information?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jul 2013 19:10:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30565#M22362</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-07-08T19:10:48Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound decryption woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30566#M22363</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you try different browsers on the mobile devices.This could be caused by Unsupported SSL cipher suite (algo)&amp;nbsp; selected by Client.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jul 2013 19:37:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30566#M22363</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-07-08T19:37:17Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound decryption woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30567#M22364</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How can I see that on the firewall? Where are incompatibilities being logged?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will try...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jul 2013 20:19:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30567#M22364</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-07-08T20:19:35Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound decryption woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30568#M22365</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;If the SSL version or cipher suite is not supported for decryption you should see a related entry in O/P of following command :&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt; &amp;gt;show system setting ssl-decrypt exclude-cache&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;To&amp;nbsp; reset this cache :&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&amp;gt; debug dataplane reset ssl-decrypt exclude-cache&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;Ref :&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;A __default_attr="1386" __jive_macro_name="document" class="jive_macro jive_macro_document" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;Following Global counters could be helpful in troubleshoting&amp;nbsp; :&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="font-style: inherit; font-family: 'courier new', courier;"&gt;&amp;gt;show counter global | match proxy&lt;/SPAN&gt; - PAN-OS 3.0.0 and 3.1.0&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="font-style: inherit; font-family: 'courier new', courier;"&gt;proxy_process 1205 info proxy pktproc Number of flows go through proxy&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="font-style: inherit; font-family: 'courier new', courier;"&gt;proxy_no_process 453 info proxy pktproc Number of flows donot go through proxy&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="font-style: inherit; font-family: 'courier new', courier;"&gt;proxy_wqe_held 253 info proxy resource Number of wqe held by proxy for notify answer&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="font-style: inherit; font-family: 'courier new', courier;"&gt;proxy_excluded 78 info proxy pktproc Number of ssl sessions bypassed proxy because of exclusion&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="font-style: inherit; font-family: 'courier new', courier;"&gt;proxy_client_hello_failed 4 warn proxy pktproc Number of ssl sessions bypassed proxy because client hello can't be parsed&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="font-style: inherit; font-family: 'courier new', courier;"&gt;proxy_url_request_pkt_drop 24 info proxy pktproc The number of packets get dropped because of waiting for url category request in ssl proxy&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="font-style: inherit; font-family: 'courier new', courier;"&gt;proxy_url_category_unknown 23435 info proxy pktproc Number of sessions checked by proxy with unknown url category&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="font-style: inherit; font-family: 'courier new', courier;"&gt;url_session_not_in_ssl_wait 4 error url system The session is not waiting for url in ssl proxy&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jul 2013 23:12:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30568#M22365</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-07-08T23:12:24Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound decryption woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30569#M22366</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Nadir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for the help. In fact, when I tried mobile Firefox the session was decrypted just fine. Using Google Chrome (Android) or mobile Safari (iPhone) the session would not get decrypted. Looks like an issue with Webkit based browsers. HOWEVER:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is nothing related in the certificate list you get when issuing the '&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;show system setting ssl-decrypt exclude-cache&lt;/SPAN&gt;' command. The webserver's certificate does not show up in that list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I also don't understand: If there is a problem with ciphers, why can I connect to the webserver using iPhone/Android just fine? The browser seems to be encrypting the session without a problem. It's the firewall that does not decrypt. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jul 2013 06:25:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30569#M22366</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-07-09T06:25:23Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound decryption woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30570#M22367</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First of all I would try without the inbound inspection to verify that there isnt something else thats borked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then I would verify that I have the inbound inspection properly setup including:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Block sessions with unsupported version&lt;/P&gt;&lt;P&gt;Block sessions with unsupported cipher suites&lt;/P&gt;&lt;P&gt;Block sessions if resources not available&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Verify then in monitor -&amp;gt; logs -&amp;gt; traffic that when you visit using browser (from computer and not iPhone/Android) that the traffic is really decrypted (should be a checkbox in the "Decrypted" part to the right of the popup - you get the popup if you click on the magnify-icon to the left of the traffic log row). Then do the same for the visit from your iPhone/Android device and compare.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Third I would take a tcpdump of the traffic which your iPhone and Android produces to look into which cipher suites are being requested and what is actually happening on the line (preferly compare this with the traffic generated when your browser from your computer (non iPhone/Android device) visits this https-site).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example PA has problems with newer versions of TLS (not supported at all) and the inbound inspection wont work at all if DH (Diffie Hellman) is being used for obvious reasons (both would the tcpdump help you with to find out).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jul 2013 06:39:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30570#M22367</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-07-09T06:39:01Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound decryption woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30571#M22368</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As far I understand , the unsupported modes and failures would be bypassed and not decrypted, unless you have configured a Decryption Profile and checked the options to Block sessions in case these checks fail.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jul 2013 06:43:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30571#M22368</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-07-09T06:43:55Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound decryption woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30572#M22369</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mikand,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for the detailed instructions. Actually, I already did all of that except for the tcpdumps. The decryption policy is definitely ok (else it wouldn't decrypt the non-iPhone sessions). We also have a decryption profile that specifically blocks unsupported versions/ciphers and if ressource is unavailable. This means these sessions are supposed to blocked, but they are not. They are just not being decrypted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What bugs me the most is that there is simply no information on the box about what's going on. At least not obvious. The traffic log is not helpful at all, since all it tells me is whether a session was decrypted or not. It doesn't tell me why. There is nothing in the system logs either. The exclude-cache is empty. I love PAN, but in this area they need to improve. A lot. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am going to ask the customer to send me the server's certificate so I can check whether it uses Diffie Hellman. That's about the only thing left I can think of as a culprit. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jul 2013 06:58:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30572#M22369</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-07-09T06:58:16Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound decryption woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30573#M22370</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With some luck there should be some ssl related info in dp-log or the mp-log.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try with "less dp-log" or "less mp-log" followed by a press on the tab-key to see which files are available.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once located you can tail the file with:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tail follow yes dp-log &amp;lt;filename&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tail follow yes mp-log &amp;lt;filename&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(dp = dataplane, mp = managementplane)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also use grep to search for strings withing these logfiles.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jul 2013 08:19:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30573#M22370</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-07-09T08:19:15Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound decryption woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30574#M22371</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We just confirmed this same behavior... a colleague of mine at work was trying to get decrypt working, and I remembered this thread. Decrypt works fine and the URL filtering log populates when he browses using a regular laptop, but from an iPad SSL decrypt does NOT work. The App-ID stays 'ssl' instead of flipping over to web-browsing, and the URL filtering log doesn't populate when he browses from an iPad.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jul 2013 17:38:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30574#M22371</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-07-09T17:38:21Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound decryption woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30575#M22372</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I guess it's time to open a case with PAN support.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jul 2013 18:02:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30575#M22372</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-07-09T18:02:12Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound decryption woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30576#M22373</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've got two pcaps open right now, and it looks like the difference between the two of them is the TLS version that was negotiated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The pcap I captured of a session where decrypt seems to work has TLSv1. The pcap of the session where decrypt did NOT appear to work negotiated TLSv1.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can somebody else confirm what I'm seeing?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jul 2013 18:03:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30576#M22373</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-07-09T18:03:11Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound decryption woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30577#M22374</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We're opening a case too.. we can reference your case (and vice-versa) if you'd like, maybe it'll get some more traction that way.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jul 2013 18:04:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30577#M22374</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-07-09T18:04:03Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound decryption woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30578#M22375</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks. Will do and post the case number here.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jul 2013 18:05:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30578#M22375</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-07-09T18:05:38Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound decryption woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30579#M22376</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A __default_attr="1504" __jive_macro_name="document" class="jive_macro jive_macro_document" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" class="active_link" href="https://live.paloaltonetworks.com/message/17280#17280" title="https://live.paloaltonetworks.com/message/17280#17280"&gt;https://live.paloaltonetworks.com/message/17280#17280&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wonder what happend to TLS1.2 support?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jul 2013 19:10:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30579#M22376</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-07-09T19:10:12Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound decryption woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30580#M22377</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Interesting. Thanks Mikand. Let's see what PAN support has to say about this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jul 2013 19:14:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30580#M22377</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-07-09T19:14:24Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound decryption woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30581#M22378</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;MY PAN support case number: 00146841&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jul 2013 19:27:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30581#M22378</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-07-09T19:27:08Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound decryption woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30582#M22379</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;cryptochrome - our case number is 00146826&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My colleague titled it "SSL Decrypt does not work from iOS" because that's essentially what the impact of not supporting TLS 1.2 is apparently.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jul 2013 20:26:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30582#M22379</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-07-09T20:26:01Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound decryption woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30583#M22380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A __default_attr="12528" __jive_macro_name="user" class="jive_macro jive_macro_user" data-objecttype="3" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt; - it also affects Android's chrome browser, which is also based on WebKit, just like mobile Safari. Would be interesting to find out whether it also applies to desktop Safari.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Jul 2013 06:17:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30583#M22380</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-07-10T06:17:44Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound decryption woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30584#M22381</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Support is asking for a freaking GoToMeeting session, which is honestly a waste of time at this point. I'm pushing back on them asking for a GTM session.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Jul 2013 13:47:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-woes/m-p/30584#M22381</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-07-12T13:47:04Z</dc:date>
    </item>
  </channel>
</rss>

