<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Is there a way to force the GlobalProtect client to not connect if the client sees certificate shenanigans? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/is-there-a-way-to-force-the-globalprotect-client-to-not-connect/m-p/45821#M33672</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also this kind of plugs into another issue with GlobalProtect, in that policy is completely reset when the user reboots. When they reboot, even if there was a way to push this setting to the GP client, the setting would be turned back off on reboot until the user VPNs back in. Not good.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 14 Apr 2013 17:39:07 GMT</pubDate>
    <dc:creator>ericgearhart</dc:creator>
    <dc:date>2013-04-14T17:39:07Z</dc:date>
    <item>
      <title>Is there a way to force the GlobalProtect client to not connect if the client sees certificate shenanigans?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-there-a-way-to-force-the-globalprotect-client-to-not-connect/m-p/45820#M33671</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What I mean by the title of this discussion is that when the GlobalProtect client goes to initiate an SSL VPN session, instead of prompting the user to "cancel or continue," can the client respond to the user with something like "Invalid certificate detected. Due to security concerns your connection cannot be established at this time. Please call the Security Operations Center at 888-555-1212 for assistance with remote VPN connectivity or with any questions."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd rather not ask the user to choose, because it's highly likely they'll just click "Continue," opening themselves up for a Man-in-the-Middle attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's trivially easy to do SSL man in the middle nowadays (&lt;A href="http://mitmproxy.org/" title="http://mitmproxy.org/"&gt;http://mitmproxy.org/&lt;/A&gt; is one example) so I'd rather them not connect then possibly have their entire VPN session captured by a 'bad guy.'&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 14 Apr 2013 17:37:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-there-a-way-to-force-the-globalprotect-client-to-not-connect/m-p/45820#M33671</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-04-14T17:37:03Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a way to force the GlobalProtect client to not connect if the client sees certificate shenanigans?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-there-a-way-to-force-the-globalprotect-client-to-not-connect/m-p/45821#M33672</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also this kind of plugs into another issue with GlobalProtect, in that policy is completely reset when the user reboots. When they reboot, even if there was a way to push this setting to the GP client, the setting would be turned back off on reboot until the user VPNs back in. Not good.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 14 Apr 2013 17:39:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-there-a-way-to-force-the-globalprotect-client-to-not-connect/m-p/45821#M33672</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-04-14T17:39:07Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a way to force the GlobalProtect client to not connect if the client sees certificate shenanigans?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-there-a-way-to-force-the-globalprotect-client-to-not-connect/m-p/45822#M33673</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is essentially what I mean... this is Cisco's AnyConnect and the dialog it presents when there's an invalid certificate:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect31/release/notes/anyconnect31rn.html#wp43939" title="http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect31/release/notes/anyconnect31rn.html#wp43939"&gt;http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect31/release/notes/anyconnect31rn.html#wp43939&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="http://www.cisco.com/en/US/i/200001-300000/240001-250000/244001-245000/244293.jpg" class="jive-image" src="https://ip1.i.lithium.com/a2b07c8290182b1f57387825c8dc8afca917d8f6/687474703a2f2f7777772e636973636f2e636f6d2f656e2f55532f692f3230303030312d3330303030302f3234303030312d3235303030302f3234343030312d3234353030302f3234343239332e6a7067" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Apr 2013 22:57:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-there-a-way-to-force-the-globalprotect-client-to-not-connect/m-p/45822#M33673</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-04-15T22:57:30Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a way to force the GlobalProtect client to not connect if the client sees certificate shenanigans?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-there-a-way-to-force-the-globalprotect-client-to-not-connect/m-p/45823#M33674</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also the dialog can be disabled, and the AnyConnect client can be configured to simply not connect after throwing an error:&lt;/P&gt;&lt;H3 class="p_H_Head3" style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 14px 0 7px -0.1in;"&gt;Improved Security Behavior&lt;/H3&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;
&lt;P&gt;&lt;A name="wp43965" style="color: #000000; font-size: 12px;"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P class="pB1_Body1" style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11.199999809265137px; margin: 1px 0px 6px;"&gt;When the client accepts an invalid server certificate, that certificate is saved in the client's certificate store. Previously, only the thumbprint of the certificate was saved. Note that invalid certificates are saved only when the user has elected to always trust and import invalid server certificates.&lt;/P&gt;
&lt;P&gt;&lt;A name="wp43966" style="color: #000000; font-size: 12px;"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P class="pB1_Body1" style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11.199999809265137px; margin: 1px 0px 6px;"&gt;There is no administrative override to make the end user less secure automatically. To completely remove the preceding security decisions from your end users, enable &lt;STRONG class="cBold"&gt;Strict Certificate Trust&lt;/STRONG&gt; in the user's local policy file. When Strict Certificate Trust is enabled, the user sees an error message, and the connection fails; there is no user prompt.&lt;/P&gt;
&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Apr 2013 23:27:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-there-a-way-to-force-the-globalprotect-client-to-not-connect/m-p/45823#M33674</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-04-15T23:27:27Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a way to force the GlobalProtect client to not connect if the client sees certificate shenanigans?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-there-a-way-to-force-the-globalprotect-client-to-not-connect/m-p/45824#M33675</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;GlobalProtect does not have a way to enforce strict checking. While it will throw an error as you mention, the user is free to make the decision about it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This seems to me like a useful feature, and I would recommend working with your account team to submit a feature request to see if this can be added.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Greg &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 16:14:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-there-a-way-to-force-the-globalprotect-client-to-not-connect/m-p/45824#M33675</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2013-04-18T16:14:56Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a way to force the GlobalProtect client to not connect if the client sees certificate shenanigans?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-there-a-way-to-force-the-globalprotect-client-to-not-connect/m-p/45825#M33676</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Honestly Greg at this point we're looking to buy a pair of ASAs and go the AnyConnect route for remote user VPN access. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you guys ("you guys" being PA) feel it's useful and a feature that makes sense, I'd ask that you guys go ahead and put in an FR/bug report/whatever for it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hate to sound so negative or sour, but GlobalProtect didn't live up to our expectations.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 17:02:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-there-a-way-to-force-the-globalprotect-client-to-not-connect/m-p/45825#M33676</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-04-18T17:02:27Z</dc:date>
    </item>
  </channel>
</rss>

