<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSL Sites bypass URL Category block in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49938#M36750</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good Day Guys and Gals&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I need ideas on the following issue please! I have a block on all Social networking sites for the company. The Policy works great when the user tries to access &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://plus.google.com"&gt;http://plus.google.com&lt;/A&gt;&lt;SPAN&gt;, but when they use SSL (&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://plus.google.com"&gt;https://plus.google.com&lt;/A&gt;&lt;SPAN&gt;) the user gains full access to the site. Same goes for all other Social networking sites! How do we stop them on SSL?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanx in advance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 28 Sep 2011 10:28:24 GMT</pubDate>
    <dc:creator>u7285</dc:creator>
    <dc:date>2011-09-28T10:28:24Z</dc:date>
    <item>
      <title>SSL Sites bypass URL Category block</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49938#M36750</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good Day Guys and Gals&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I need ideas on the following issue please! I have a block on all Social networking sites for the company. The Policy works great when the user tries to access &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://plus.google.com"&gt;http://plus.google.com&lt;/A&gt;&lt;SPAN&gt;, but when they use SSL (&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://plus.google.com"&gt;https://plus.google.com&lt;/A&gt;&lt;SPAN&gt;) the user gains full access to the site. Same goes for all other Social networking sites! How do we stop them on SSL?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanx in advance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Sep 2011 10:28:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49938#M36750</guid>
      <dc:creator>u7285</dc:creator>
      <dc:date>2011-09-28T10:28:24Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Sites bypass URL Category block</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49939#M36751</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, you need SSL Proxy to unencrypt SSL and analize the traffic. It is very easy to implement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Sep 2011 11:16:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49939#M36751</guid>
      <dc:creator>ssancho</dc:creator>
      <dc:date>2011-09-28T11:16:03Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Sites bypass URL Category block</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49940#M36752</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You could also block these using the URL filtering feature. URL filtering will work on encrypted or unencrypted traffic because it is making the allow/block decision using the unencrypted URL information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Benjamin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Sep 2011 21:40:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49940#M36752</guid>
      <dc:creator>bpappas</dc:creator>
      <dc:date>2011-09-28T21:40:57Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Sites bypass URL Category block</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49941#M36753</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good Morning Bpappas&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your reply!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am actualy using the URL filtering feature, Policy with application filtering and plus.google url in custom deny list, but still it bypasses the PA......&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any other ideas?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2011 06:47:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49941#M36753</guid>
      <dc:creator>u7285</dc:creator>
      <dc:date>2011-09-29T06:47:10Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Sites bypass URL Category block</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49942#M36754</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@kobus.snyders:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if that is happening I would advise you to open a case with your support provider. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Benjamin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2011 20:58:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49942#M36754</guid>
      <dc:creator>bpappas</dc:creator>
      <dc:date>2011-09-29T20:58:16Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Sites bypass URL Category block</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49943#M36755</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN&gt;The problem with URL filtering and HTTPS traffic is that with HTTPS you cannot actually see the GET message which URL filtering normally looks at because it is encrypted. So URL filtering can only apply to the URL in the certificate. If that certificate does not have "plus.google.com" then URL filtering will not work on that. It seems &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://plus.google.com"&gt;https://plus.google.com&lt;/A&gt;&lt;SPAN&gt; certificate was issued to "*.google.com". You can see a server certificate in IE by going to File &amp;gt; Properties and then click on Certificates button.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Likely the only way you will be able to reliably identify social media sites would be to use SSL proxy decryption as others have suggested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Richard&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 01 Oct 2011 04:05:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49943#M36755</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2011-10-01T04:05:34Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Sites bypass URL Category block</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49944#M36756</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For this specific case, shouldn't blocking the 'google-plus' application achieve the same result?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Oct 2011 16:47:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49944#M36756</guid>
      <dc:creator>mgentile</dc:creator>
      <dc:date>2011-10-03T16:47:05Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Sites bypass URL Category block</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49945#M36757</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is not the case for me, it does block it in chrome but not in IE or Fx?&amp;nbsp; I've also added a url filter but that didnt work iether for google+&amp;nbsp; Im still testing but I ahve to ahve this closed by the end of the week.&amp;nbsp; I may have to open a case for the Palo techs to help me out on this.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Nov 2011 21:32:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49945#M36757</guid>
      <dc:creator>fnichelson</dc:creator>
      <dc:date>2011-11-15T21:32:19Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Sites bypass URL Category block</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49946#M36758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, have you tried ssl decryption?. it works great with sites that uses ssl/https.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Nov 2011 01:52:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49946#M36758</guid>
      <dc:creator>Kali</dc:creator>
      <dc:date>2011-11-16T01:52:34Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Sites bypass URL Category block</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49947#M36759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Im nervous to turn on SSL Decryption. Is it reliable ? Do I have to turn it on for all SSL traffic ? I just want the URL information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Justin &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 May 2012 00:34:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49947#M36759</guid>
      <dc:creator>jhickey</dc:creator>
      <dc:date>2012-05-08T00:34:34Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Sites bypass URL Category block</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49948#M36760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You define for which zones and ipaddresses and/or users along with categories you wish to enable ssl decryption for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In you case perhaps something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;srczone: clients&lt;/P&gt;&lt;P&gt;dstzone: internet&lt;/P&gt;&lt;P&gt;srcip: any&lt;/P&gt;&lt;P&gt;dstip: any&lt;/P&gt;&lt;P&gt;user: any&lt;/P&gt;&lt;P&gt;categories: (select all categories, dont know if "any" exists yet).&lt;/P&gt;&lt;P&gt;action: decrypt&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This way as soon as a ssl handshake is seen the PA will intercept depending on if you set this up as ssl-proxy (common when intercepting outgoing clients) or ssl inspection (common when intercepting incoming clients towards one of your servers which you have the private key for).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Previously there have been issues with 2000-series when there were to many concurrent ssl decryptions (because at 2000-series and below the mgmtplane is involved into creating the faked cert on the fly). I dont know if this has been fixed yet (I think it is).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also note in order to make this transparent for the clients you need to import the CA cert (well the public part of what you imported into your PA device) as a trusted CA in your clients (can be done through group policy). Also you can use a second cert (and not import this one in your clients) which PA can use for ssl sessions that couldnt be verified (for example if the cert from the server at internet is expired, revoked or such).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 May 2012 06:47:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49948#M36760</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-05-08T06:47:54Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Sites bypass URL Category block</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49949#M36761</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Usually, Google services are fully compatible with SSL decryption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to activate it only for Google, create SSL Decryption rules only for the following ranges:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip4:216.239.32.0/19&lt;/P&gt;&lt;P&gt;ip4:64.233.160.0/19&lt;/P&gt;&lt;P&gt;ip4:66.249.80.0/20&lt;/P&gt;&lt;P&gt;ip4:72.14.192.0/18&lt;/P&gt;&lt;P&gt;ip4:209.85.128.0/17&lt;/P&gt;&lt;P&gt;ip4:66.102.0.0/20&lt;/P&gt;&lt;P&gt;ip4:74.125.0.0/16&lt;/P&gt;&lt;P&gt;ip4:64.18.0.0/20&lt;/P&gt;&lt;P&gt;ip4:207.126.144.0/20&lt;/P&gt;&lt;P&gt;ip4:173.194.0.0/16&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 May 2012 16:37:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49949#M36761</guid>
      <dc:creator>essnet</dc:creator>
      <dc:date>2012-05-08T16:37:58Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Sites bypass URL Category block</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49950#M36762</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I found that if you define an application in the rules that also does URL filtering it needs to decrypt the packet to decipher the application.&amp;nbsp; One way is to use http and https ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example your rule to block a website might look like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;srczone: trust&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;dstzone: untrust&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;STRONG&gt;application: web-browsing&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;action: allow&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;profile: URL filtering&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;STRONG&gt;Change to:&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;srczone: trust&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;dstzone: untrust&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;STRONG&gt;service: service-http, service-https&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;action: allow&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;profile: URL filtering&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;Just was one thing I came across that sounds close.&amp;nbsp; The other option is of course adding certificates.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Jun 2013 19:59:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49950#M36762</guid>
      <dc:creator>MTatty</dc:creator>
      <dc:date>2013-06-04T19:59:19Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Sites bypass URL Category block</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49951#M36763</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sounds odd... when you use url filter without decryption then the url filter can only look at the CN part of the certs passing through. This will also mean that the identified application will most likely just be "ssl" (and "web-browsing" for the cleartext stuff).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you enable decryption then the real appid (lets say youtube or whatever) will be identified and the full url will be logged (and handled by the filters) aswell.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jun 2013 06:40:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-sites-bypass-url-category-block/m-p/49951#M36763</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-06-05T06:40:10Z</dc:date>
    </item>
  </channel>
</rss>

