<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Decryption rule blocking traffic silently in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/decryption-rule-blocking-traffic-silently/m-p/48876#M35990</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am running PanOS 6.0.3. I have a decryption rule that perfectly works most of the time. However I realized that in some specific situation it silently blocks the traffic. As I am quite new on Palo Alto, I do not know if I am misunderstanding something or if I found a bug.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here follows the exact description:&lt;/P&gt;&lt;P&gt;1) Global rule decryption all traffic going to internet: working perfectly as shown by cli or in the traffic log&lt;/P&gt;&lt;P&gt;2) if I try to use the snapchat application on android, the app does not work and failed with a 'connection error'. Removing the decryption rule, make it working&lt;/P&gt;&lt;P&gt;3) Same issue using dropbox application on an iPad. It should be noted that accessing the dropbox website works with the decryption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Starting from there, I can only imagine that either&lt;/P&gt;&lt;P&gt;- the version of TLS protocol used is not supported by PANOS 6.0.3, but how to confirm this?&lt;/P&gt;&lt;P&gt;- there is a bug in the PANOS 6.0.3&lt;/P&gt;&lt;P&gt;- the certificates shown for the decryption (created by the firewall) are rejected for some reason by the application, but how to confirm this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As a temporary solution, I created a custom URL category with the IP address of the snapchat website (not tested on dropbox). I than use this URL category in a no decrypt rule.This avoid the issue (but remove the benefit of the decryption). It is not perfect as sometimes I need to restart several times the app before the traffic is identified in the correct URL category.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Although, this is affecting dropbox and snapchat, I am quite afradi to find more business applications affected by the same issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your thoughts will be greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 01 Jul 2014 11:05:41 GMT</pubDate>
    <dc:creator>michel.nolf</dc:creator>
    <dc:date>2014-07-01T11:05:41Z</dc:date>
    <item>
      <title>Decryption rule blocking traffic silently</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption-rule-blocking-traffic-silently/m-p/48876#M35990</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am running PanOS 6.0.3. I have a decryption rule that perfectly works most of the time. However I realized that in some specific situation it silently blocks the traffic. As I am quite new on Palo Alto, I do not know if I am misunderstanding something or if I found a bug.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here follows the exact description:&lt;/P&gt;&lt;P&gt;1) Global rule decryption all traffic going to internet: working perfectly as shown by cli or in the traffic log&lt;/P&gt;&lt;P&gt;2) if I try to use the snapchat application on android, the app does not work and failed with a 'connection error'. Removing the decryption rule, make it working&lt;/P&gt;&lt;P&gt;3) Same issue using dropbox application on an iPad. It should be noted that accessing the dropbox website works with the decryption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Starting from there, I can only imagine that either&lt;/P&gt;&lt;P&gt;- the version of TLS protocol used is not supported by PANOS 6.0.3, but how to confirm this?&lt;/P&gt;&lt;P&gt;- there is a bug in the PANOS 6.0.3&lt;/P&gt;&lt;P&gt;- the certificates shown for the decryption (created by the firewall) are rejected for some reason by the application, but how to confirm this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As a temporary solution, I created a custom URL category with the IP address of the snapchat website (not tested on dropbox). I than use this URL category in a no decrypt rule.This avoid the issue (but remove the benefit of the decryption). It is not perfect as sometimes I need to restart several times the app before the traffic is identified in the correct URL category.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Although, this is affecting dropbox and snapchat, I am quite afradi to find more business applications affected by the same issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your thoughts will be greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jul 2014 11:05:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption-rule-blocking-traffic-silently/m-p/48876#M35990</guid>
      <dc:creator>michel.nolf</dc:creator>
      <dc:date>2014-07-01T11:05:41Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption rule blocking traffic silently</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption-rule-blocking-traffic-silently/m-p/48877#M35991</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Michael.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Issue can be resolved with decryption profile, however there might be other ways to do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its possible to configure decryption profile with various option. one of them is if firewall is not able to decrypt traffic than it can pass it encrypted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jul 2014 14:38:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption-rule-blocking-traffic-silently/m-p/48877#M35991</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-07-01T14:38:00Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption rule blocking traffic silently</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption-rule-blocking-traffic-silently/m-p/48878#M35992</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you know many application are not able to be decrypted by the palo (and globally).&lt;/P&gt;&lt;P&gt;Please refer to &lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/message/27941#27941" title="https://live.paloaltonetworks.com/message/27941#27941"&gt;https://live.paloaltonetworks.com/message/27941#27941&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Seem this list is not really .... complete&lt;/P&gt;&lt;P&gt;Hope help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;V.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jul 2014 17:01:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption-rule-blocking-traffic-silently/m-p/48878#M35992</guid>
      <dc:creator>VinceM</dc:creator>
      <dc:date>2014-07-01T17:01:05Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption rule blocking traffic silently</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption-rule-blocking-traffic-silently/m-p/48879#M35993</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks to both of you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 08:10:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption-rule-blocking-traffic-silently/m-p/48879#M35993</guid>
      <dc:creator>michel.nolf</dc:creator>
      <dc:date>2014-07-02T08:10:12Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption rule blocking traffic silently</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption-rule-blocking-traffic-silently/m-p/48880#M35994</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Michel,&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 10pt; line-height: 1.5em;"&gt;There are some applications that do not play nice when decryption is turned on, on the PA firewall. &lt;/SPAN&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 10pt; line-height: 1.5em;"&gt;Here is a document with a list of the applications we've already identified that should be excluded from decryption: &lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1423"&gt;List of Applications Excluded from SSL Decryption&lt;/A&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 09:29:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption-rule-blocking-traffic-silently/m-p/48880#M35994</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-07-02T09:29:46Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption rule blocking traffic silently</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption-rule-blocking-traffic-silently/m-p/48881#M35995</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Hulk,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did already found that list thanks to the links inside the previous posts. It just makes me a little bit more confused. E;g. ms-update is considered as having issues...I do not have any with that applications. Is it due to the 6.0.3 version? given the fact that 6.0.3 is supporting more recent TLS version. It could be...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 09:48:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption-rule-blocking-traffic-silently/m-p/48881#M35995</guid>
      <dc:creator>michel.nolf</dc:creator>
      <dc:date>2014-07-02T09:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: Decryption rule blocking traffic silently</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decryption-rule-blocking-traffic-silently/m-p/48882#M35996</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Michel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A packet capture would give you more insight about the SSL handshake.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2014 09:57:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decryption-rule-blocking-traffic-silently/m-p/48882#M35996</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-07-02T09:57:13Z</dc:date>
    </item>
  </channel>
</rss>

