<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inbound SSL Inspection with mis-matched certificates (or SSL handoff) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-inspection-with-mis-matched-certificates-or-ssl/m-p/33497#M24568</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you both for the feedback and clarification!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 01 Feb 2013 23:12:12 GMT</pubDate>
    <dc:creator>Dpeters1</dc:creator>
    <dc:date>2013-02-01T23:12:12Z</dc:date>
    <item>
      <title>Inbound SSL Inspection with mis-matched certificates (or SSL handoff)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-inspection-with-mis-matched-certificates-or-ssl/m-p/33492#M24563</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm kind of expecting a no to this question, but I noticed whilst setting up inbound SSL inspection for a client the other day that if the Cert on the Palo Alto and the cert on the SSL web server do not match then the firewall will refuse to decrypt the traffic and just pass it though as SSL using the server certificate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be great to be able to use a different cert on the Palo for a variety of reasons, number on being for Exchange client access servers, often my clients are using internally signed SSL certs for the CAS but want to use a standard SSL cert from the likes of godaddy/verisign/etc externally. They do this because SAN certs can be pricey and it the verification processes with the CA's are more stringent for SAN certs which can be a pain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did I miss something in the certificate policy that stopped this working or is it by design?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Likewise it would be handy to be able to do SSL handoff on the palo and allow HTTP between the firewall and the server internally and SSL out to the rest of the world. I doubt this is possible though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for reading, any feedback gratefully received.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2013 15:33:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-inspection-with-mis-matched-certificates-or-ssl/m-p/33492#M24563</guid>
      <dc:creator>Dpeters1</dc:creator>
      <dc:date>2013-01-25T15:33:36Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL Inspection with mis-matched certificates (or SSL handoff)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-inspection-with-mis-matched-certificates-or-ssl/m-p/33493#M24564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you create your SSL Decryption policy for inbound inspection, you can specify the certificate. If you are asking whether you can create multiple policies that will send multiple certificates based on what the client is requesting, the answer to that is no. While technically feasible, it would require that the client send the server_name extension in the Client Hello packet - something that is not required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would recommend requesting that from your account team as a feature enhancement. I would phrase it as "add a feature to select a certificate based on the server_name extension in the Client Hello packet".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Beyond that, a wildcard certificate from a CA might be a middle ground between a single name and a SAN cert. But if you do have clients using multiple domains, the only other option would be adding additional IPs to your external interface, changing DNS to reflect those IPs for the different domains, and then having different SSL inbound inspection rules based on those IPs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;&lt;P&gt;Greg &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 26 Jan 2013 00:28:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-inspection-with-mis-matched-certificates-or-ssl/m-p/33493#M24564</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2013-01-26T00:28:24Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL Inspection with mis-matched certificates (or SSL handoff)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-inspection-with-mis-matched-certificates-or-ssl/m-p/33494#M24565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Greg,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much for your reply and I'm sorry the the lateness of mine!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We're not looking to offer different certs based on the client request just one that isnt identical to the cert on the internal server.. for example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;webmail.mycompany.com&amp;nbsp; &amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;nbsp;&amp;nbsp; webmail.mycompany.local&lt;/P&gt;&lt;P&gt;SSL Cert on PAN&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Internally signed Cert on Exchange / Web Server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently my understanding is that unless the certificates are identical on both the PAN and internal server decryption will not happen.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope that makes sense.. I'll reproduce this ASAP to show the exact errors that occur in the system log.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Jan 2013 15:21:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-inspection-with-mis-matched-certificates-or-ssl/m-p/33494#M24565</guid>
      <dc:creator>Dpeters1</dc:creator>
      <dc:date>2013-01-31T15:21:20Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL Inspection with mis-matched certificates (or SSL handoff)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-inspection-with-mis-matched-certificates-or-ssl/m-p/33495#M24566</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you're right. The certificate on the server must be the same as the certificate on the firewall for it to do the decryption. If they do not match, decryption will fail and it will pass through instead.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Feb 2013 22:22:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-inspection-with-mis-matched-certificates-or-ssl/m-p/33495#M24566</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2013-02-01T22:22:31Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL Inspection with mis-matched certificates (or SSL handoff)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-inspection-with-mis-matched-certificates-or-ssl/m-p/33496#M24567</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For inbound decryption the firewall does not act as a proxy for the SSL session, so there is only one session between the client and the web server.&amp;nbsp; This configuration is similar to taking a capture of the SSL session and then manually decrypting it with the certificate's private key.&amp;nbsp; The firewall simply decrypts each packet and performs decryption, then the original packet received is transmitted to the host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In a proxy configuration there are two distinct SSL sessions, a client to firewall, and firewall to server segment.&amp;nbsp; The feature you are looking for might be closer to the behavior of the current outbound/proxy decryption except being able to control the certificate offered by the firewall to the client.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Feb 2013 22:50:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-inspection-with-mis-matched-certificates-or-ssl/m-p/33496#M24567</guid>
      <dc:creator>kfindlen</dc:creator>
      <dc:date>2013-02-01T22:50:07Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL Inspection with mis-matched certificates (or SSL handoff)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-inspection-with-mis-matched-certificates-or-ssl/m-p/33497#M24568</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you both for the feedback and clarification!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Feb 2013 23:12:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-inspection-with-mis-matched-certificates-or-ssl/m-p/33497#M24568</guid>
      <dc:creator>Dpeters1</dc:creator>
      <dc:date>2013-02-01T23:12:12Z</dc:date>
    </item>
  </channel>
</rss>

