<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Exclude certificates generated by a third party CA from being decrypted in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/exclude-certificates-generated-by-a-third-party-ca-from-being/m-p/50305#M37039</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I don't trust them but :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;If I trust their CA, they could sign anything that my user would think is leggit website. And I am 100% sure that they don't take any special measures to protect their CAs . I still want websites to remain untrusted for browser, which is not possible if PA trusts their CA.&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;&lt;SPAN style="background-color: #ffffff;"&gt;"&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;Otherwise you can add excludes to a "whitelist" in the PA (listed at &lt;/SPAN&gt;&lt;A _jive_internal="true" data-containerid="2027" data-containertype="14" data-objectid="1423" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-1423" style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #316989; background-color: #ffffff;"&gt;List of Applications Excluded from SSL Decryption&lt;/A&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt; )" &amp;lt;-- &lt;/SPAN&gt;&lt;/EM&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;doing such thing means that hackers will get the habbit to use websites that are like&amp;nbsp; site1.gov.co.uk with selfsigned certicates because they know they aren't inspected : applications ignored by SSL Decryption in this case aren't checked against known CAs&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;Usually , tools provided by these organization are checking that the certificate of website/webapp is signed by their internal CA.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;Also, these tools are often using Client certificates , which makes Decryption impossible.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt; For all these reasons, the only viable possibility is to allow to ignore SSL Decryption when cert is signed by a list third party CA that would be fed by customer. Decryption Policy panel and stack needs a real big revamp to be usable (in addtion of TLS proper implementation)&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 20 Sep 2012 08:14:06 GMT</pubDate>
    <dc:creator>essnet</dc:creator>
    <dc:date>2012-09-20T08:14:06Z</dc:date>
    <item>
      <title>Exclude certificates generated by a third party CA from being decrypted</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/exclude-certificates-generated-by-a-third-party-ca-from-being/m-p/50303#M37037</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; The use is very simple : many government agencies (social security, tax collecters...) are using SSL websites signed with own CA (which is great for their own security) but creates many problems with PA decryption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Is there a way configure PaloAlto to exclude from Decryption of certicates generated by a list of third-party CAs I would feed by myself ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your time&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Sep 2012 13:51:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/exclude-certificates-generated-by-a-third-party-ca-from-being/m-p/50303#M37037</guid>
      <dc:creator>essnet</dc:creator>
      <dc:date>2012-09-19T13:51:58Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude certificates generated by a third party CA from being decrypted</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/exclude-certificates-generated-by-a-third-party-ca-from-being/m-p/50304#M37038</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Why not download their public root cert and import it as a trusted authority in your PA so it will successfully decrypt their traffic (because traffic coming from a gov site doesnt necessary mean that it is clean &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Otherwise you can add excludes to a "whitelist" in the PA (listed at &lt;A __default_attr="1423" __jive_macro_name="document" class="jive_macro jive_macro_document" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt; )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately I dont currently recall what the CLI command is for that...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Sep 2012 19:54:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/exclude-certificates-generated-by-a-third-party-ca-from-being/m-p/50304#M37038</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-09-19T19:54:27Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude certificates generated by a third party CA from being decrypted</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/exclude-certificates-generated-by-a-third-party-ca-from-being/m-p/50305#M37039</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I don't trust them but :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;If I trust their CA, they could sign anything that my user would think is leggit website. And I am 100% sure that they don't take any special measures to protect their CAs . I still want websites to remain untrusted for browser, which is not possible if PA trusts their CA.&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;&lt;SPAN style="background-color: #ffffff;"&gt;"&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;Otherwise you can add excludes to a "whitelist" in the PA (listed at &lt;/SPAN&gt;&lt;A _jive_internal="true" data-containerid="2027" data-containertype="14" data-objectid="1423" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-1423" style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #316989; background-color: #ffffff;"&gt;List of Applications Excluded from SSL Decryption&lt;/A&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt; )" &amp;lt;-- &lt;/SPAN&gt;&lt;/EM&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;doing such thing means that hackers will get the habbit to use websites that are like&amp;nbsp; site1.gov.co.uk with selfsigned certicates because they know they aren't inspected : applications ignored by SSL Decryption in this case aren't checked against known CAs&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;Usually , tools provided by these organization are checking that the certificate of website/webapp is signed by their internal CA.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;Also, these tools are often using Client certificates , which makes Decryption impossible.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt; For all these reasons, the only viable possibility is to allow to ignore SSL Decryption when cert is signed by a list third party CA that would be fed by customer. Decryption Policy panel and stack needs a real big revamp to be usable (in addtion of TLS proper implementation)&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Sep 2012 08:14:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/exclude-certificates-generated-by-a-third-party-ca-from-being/m-p/50305#M37039</guid>
      <dc:creator>essnet</dc:creator>
      <dc:date>2012-09-20T08:14:06Z</dc:date>
    </item>
  </channel>
</rss>

