<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Trouble decrypting Google traffic in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-decrypting-google-traffic/m-p/3096#M2311</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looks like the CRL/OSCP check is timing out - look at Status: timed-out and hence the error message. Can you verify if there is any network latency in retrieving the crl list or reaching the server itself?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 24 Jun 2013 18:10:49 GMT</pubDate>
    <dc:creator>zarina</dc:creator>
    <dc:date>2013-06-24T18:10:49Z</dc:date>
    <item>
      <title>Trouble decrypting Google traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-decrypting-google-traffic/m-p/3093#M2308</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we have some trouble with a lot of Google sites when we enable SSL decryption and also enable CRL and OCSP checks. We either get no response at all, or error messages like the one in the attached screenshot. If we disable the CRL/OCSP checks (which is undesirable I guess), then we have no problems at all. Google is the only destination we have these problems with and regarding to the system logs, the CRL list retreival is working fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Sascha&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Jun 2013 17:12:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-decrypting-google-traffic/m-p/3093#M2308</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-06-24T17:12:51Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble decrypting Google traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-decrypting-google-traffic/m-p/3094#M2309</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;If you look at the certificate that you get when you go to&lt;SPAN style="font-style: inherit;"&gt; any google website like &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://youtube.com/" style="font-style: inherit; text-decoration: underline; color: #316989;"&gt;https://youtube.com&lt;/A&gt; (click on the icon to the left of the address to view certificate info) you will see that the common name is *.google.com.&amp;nbsp; Google uses this wildcard certificate for most of its sites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;Before decrypting the traffic the firewall only has the common name on the certificate to use for looking up URL category.&amp;nbsp; *.google.com is in the Search Engines category, so that's what the firewall identifies it as when you go to google sites like &lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;A class="jive-link-external-small" href="https://youtube.com/" style="font-style: inherit; text-decoration: underline; color: #316989;"&gt;https://youtube.com&lt;/A&gt; , or basically any other Google service.&amp;nbsp; Once you have decrypted the traffic the firewall can do the URL lookup based on the HTTP GET request for the website.&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;Best regards,&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;Karthik RP&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Jun 2013 17:23:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-decrypting-google-traffic/m-p/3094#M2309</guid>
      <dc:creator>kprakash</dc:creator>
      <dc:date>2013-06-24T17:23:13Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble decrypting Google traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-decrypting-google-traffic/m-p/3095#M2310</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, but it's not a problem of being blocked by firewall policy. It's a problem with the PAN checking Google's certificates. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See this:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="cert.PNG" class="jiveImage" src="https://live.paloaltonetworks.com/legacyfs/online/7058_cert.PNG" style="width: 450px; height: 283px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I wrote above, it must have something to do with checking CRL/OCSP in Device -&amp;gt; Service -&amp;gt; Session -&amp;gt; Decryption Certificate Revocation Settings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we disable the checks, it works fine.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Jun 2013 17:32:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-decrypting-google-traffic/m-p/3095#M2310</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-06-24T17:32:49Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble decrypting Google traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-decrypting-google-traffic/m-p/3096#M2311</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looks like the CRL/OSCP check is timing out - look at Status: timed-out and hence the error message. Can you verify if there is any network latency in retrieving the crl list or reaching the server itself?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Jun 2013 18:10:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-decrypting-google-traffic/m-p/3096#M2311</guid>
      <dc:creator>zarina</dc:creator>
      <dc:date>2013-06-24T18:10:49Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble decrypting Google traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-decrypting-google-traffic/m-p/3097#M2312</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As I said earlier, regarding to my system logs, there are no issues with retrieving the CRL lists. There is no timeout, and Google is the only destination that's affected. The "timeout" in the error message is indeed strange, but sometimes we get no error message at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Jun 2013 20:54:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-decrypting-google-traffic/m-p/3097#M2312</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-06-24T20:54:36Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble decrypting Google traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-decrypting-google-traffic/m-p/3098#M2313</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1&amp;gt;Can you&amp;nbsp; try to increase the timeout value for the settings under &lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt; Decryption Certificate Revocation Settings&lt;/SPAN&gt; : to max=60sec .&lt;/P&gt;&lt;P&gt;2&amp;gt;What is the Software Version installed on the firewall?&lt;/P&gt;&lt;P&gt;3&amp;gt;Can you attach the following log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;less mp-log sslmgr.log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also following discussion may interest you:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/message/28884#28884"&gt;https://live.paloaltonetworks.com/message/28884#28884&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Jun 2013 08:11:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-decrypting-google-traffic/m-p/3098#M2313</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-06-25T08:11:41Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble decrypting Google traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-decrypting-google-traffic/m-p/3099#M2314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Nadir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we are running 5.0.4. And I am seeing the same error messages in sslmgr.log that are described in the other discussion you linked to. So it's safe to assume we are hitting this bug as well. I will try to turn off OCSP checks. If I understand the bug correctly, it's only happening after turning on OCSP. What do you think?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Sascha&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Jun 2013 19:02:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-decrypting-google-traffic/m-p/3099#M2314</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-06-25T19:02:15Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble decrypting Google traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-decrypting-google-traffic/m-p/3100#M2315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Sacha,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are seeing the same error ,its likely that we are&amp;nbsp; encountering the Bug referenced in the discussion that would be fixed with OS_5.0.7.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Nadir&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Jun 2013 20:06:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-decrypting-google-traffic/m-p/3100#M2315</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-06-25T20:06:26Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble decrypting Google traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-decrypting-google-traffic/m-p/3101#M2316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks. Just for clarification: Isn't certificate revocation checking decoupled from decryption? Meaning, even if I bypass Google from decryption, wouldn't the certificate checks still jump in? Or are these settings only used in tandem with decryption?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Jun 2013 20:22:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-decrypting-google-traffic/m-p/3101#M2316</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-06-25T20:22:16Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble decrypting Google traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-decrypting-google-traffic/m-p/3102#M2317</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Where can I find a statement in the manual that proofs this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as I know the PA will only check the cert for revocation when its being part of the decryption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the session is not being intercepted then there will be no checks for revocation (how would the PA otherwise be able to display an error message for the client (that the cert is revoked) if the ssl session isnt decrypted?).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Jun 2013 08:19:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-decrypting-google-traffic/m-p/3102#M2317</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-06-26T08:19:05Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble decrypting Google traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-decrypting-google-traffic/m-p/3103#M2318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have generally seen OSCP settings come into play for&amp;nbsp;&amp;nbsp; CP ,GP&lt;/P&gt;&lt;P&gt;But based on the Bug that was referenced in the&amp;nbsp; &lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/message/28884#28884" style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #316989;"&gt;https://live.paloaltonetworks.com/message/28884#28884&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;OCSP did affect ssl-decrypted traffic.The CLI setting to enable OCSP is as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# set deviceconfig setting ssl-decrypt ocsp yes&lt;/P&gt;&lt;P&gt;which I found is same as enabling OCSP from the WebUI.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Jun 2013 10:24:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-decrypting-google-traffic/m-p/3103#M2318</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-06-26T10:24:35Z</dc:date>
    </item>
  </channel>
</rss>

