<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic decrypt ldaps traffic in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-ldaps-traffic/m-p/38805#M28459</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hey all,&lt;/P&gt;&lt;P&gt;I would like to decrypt my ldaps traffic that is now showing up as ssl in my traffic logs.&lt;/P&gt;&lt;P&gt;I can not seem to get it to work&lt;/P&gt;&lt;P&gt;- with ssl forward proxy decryption, I break the ldaps connection altogether and my ldap connection just fails.&lt;/P&gt;&lt;P&gt;- with inboud ssl decryption (with the AD-ldaps certificate&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;+ private key&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; imported), the palo alto just refuses to decrytp the traffic. in the logs it is just marked as not decrypted (and application = ssl).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;anybody has any experience with this?&lt;/P&gt;&lt;P&gt;kind regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 18 Nov 2013 15:19:43 GMT</pubDate>
    <dc:creator>mr.linus</dc:creator>
    <dc:date>2013-11-18T15:19:43Z</dc:date>
    <item>
      <title>decrypt ldaps traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-ldaps-traffic/m-p/38805#M28459</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hey all,&lt;/P&gt;&lt;P&gt;I would like to decrypt my ldaps traffic that is now showing up as ssl in my traffic logs.&lt;/P&gt;&lt;P&gt;I can not seem to get it to work&lt;/P&gt;&lt;P&gt;- with ssl forward proxy decryption, I break the ldaps connection altogether and my ldap connection just fails.&lt;/P&gt;&lt;P&gt;- with inboud ssl decryption (with the AD-ldaps certificate&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;+ private key&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; imported), the palo alto just refuses to decrytp the traffic. in the logs it is just marked as not decrypted (and application = ssl).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;anybody has any experience with this?&lt;/P&gt;&lt;P&gt;kind regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Nov 2013 15:19:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decrypt-ldaps-traffic/m-p/38805#M28459</guid>
      <dc:creator>mr.linus</dc:creator>
      <dc:date>2013-11-18T15:19:43Z</dc:date>
    </item>
    <item>
      <title>Re: decrypt ldaps traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-ldaps-traffic/m-p/38806#M28460</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Linus,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the software version is 5.0 then for decryption rules there is a decryption profile. Check if it is applied, if so look what checks are made in that profile.&lt;/P&gt;&lt;P&gt;Which ever certificate is configured for Forward decryption, is that certificate configured on the hosts to trust the certificate ?&lt;/P&gt;&lt;P&gt;Also if you look for global counters when the traffic is passing "show counter global" you may catch some counters related to this traffic providing a direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Nov 2013 22:05:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decrypt-ldaps-traffic/m-p/38806#M28460</guid>
      <dc:creator>Phoenix</dc:creator>
      <dc:date>2013-11-18T22:05:09Z</dc:date>
    </item>
    <item>
      <title>Re: decrypt ldaps traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-ldaps-traffic/m-p/38807#M28461</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;stupid....&lt;/P&gt;&lt;P&gt;since this is a lab setup, things change a lot. seems there was a new root ca installed on the PA which was not yet trusted by the client &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;installing the cert solved the issue.&lt;/P&gt;&lt;P&gt;tanx&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Nov 2013 10:25:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decrypt-ldaps-traffic/m-p/38807#M28461</guid>
      <dc:creator>mr.linus</dc:creator>
      <dc:date>2013-11-19T10:25:16Z</dc:date>
    </item>
  </channel>
</rss>

