<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSL Decryption Woes in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/63629#M38260</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not able to get to&amp;nbsp;&lt;A href="https://platinum.netnames.com/" target="_blank"&gt;https://platinum.netnames.com/&lt;/A&gt; with SSL decryption on, on PAN 7.0.1 / PA-3020 (IE11 / FF40 == TLS failure). Also, speed seems capped to 3Mbit/s with some CDNs (S3 AWS). Am I missing something?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks.&lt;/P&gt;</description>
    <pubDate>Wed, 26 Aug 2015 08:36:51 GMT</pubDate>
    <dc:creator>prospectfr</dc:creator>
    <dc:date>2015-08-26T08:36:51Z</dc:date>
    <item>
      <title>SSL Decryption Woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/63629#M38260</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not able to get to&amp;nbsp;&lt;A href="https://platinum.netnames.com/" target="_blank"&gt;https://platinum.netnames.com/&lt;/A&gt; with SSL decryption on, on PAN 7.0.1 / PA-3020 (IE11 / FF40 == TLS failure). Also, speed seems capped to 3Mbit/s with some CDNs (S3 AWS). Am I missing something?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2015 08:36:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/63629#M38260</guid>
      <dc:creator>prospectfr</dc:creator>
      <dc:date>2015-08-26T08:36:51Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/63631#M38262</link>
      <description>&lt;P&gt;The website "&lt;A href="https://platinum.netnames.com&amp;quot;" target="_blank"&gt;https://platinum.netnames.com"&lt;/A&gt; is using unsupported cipher suite (TLS_ECDHE_RSA is not supported.) that's why you are having issues while opening that website. Refer to following documnet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Articles/SSL-Decryption-Not-Working-due-to-Unsupported-Cipher-Suites/ta-p/55543" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Articles/SSL-Decryption-Not-Working-due-to-Unsupported-Cipher-Suites/ta-p/55543&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2015 09:34:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/63631#M38262</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2015-08-26T09:34:51Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/63632#M38263</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This site only supporty ciphersuites with forward secrecy (ciphers with ECDHE or DHE). Those ciphers are not supported by the ssl decryption feature of paloalto.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;These are the supported ciphers of this website:&lt;/P&gt;&lt;P&gt;TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384&lt;BR /&gt;TLS_DHE_RSA_WITH_AES_256_GCM_SHA384&lt;BR /&gt;TLS_DHE_RSA_WITH_AES_128_GCM_SHA256&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;source: &lt;A title="https://www.ssllabs.com/ssltest/analyze.html?d=platinum.netnames.com" href="https://www.ssllabs.com/ssltest/analyze.html?d=platinum.netnames.com" target="_blank"&gt;https://www.ssllabs.com/ssltest/analyze.html?d=platinum.netnames.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Remo&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2015 09:25:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/63632#M38263</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2015-08-26T09:25:11Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/63633#M38264</link>
      <description>&lt;P&gt;That's what I suspected, however I don't understand why can't it be handled in a graceful manner (aka simply not decrypting) ? It is not very convenient to whitelist on incident (neither it is practical). It would be nice if PaloAlto could maintain a category of such sites on their own so we just have to exclude it from decryption and everybody benefits from it.&lt;/P&gt;&lt;P&gt;Is anyone using SSL Decrypt in the field with a lot of URL categories?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for your input.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2015 09:28:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/63633#M38264</guid>
      <dc:creator>prospectfr</dc:creator>
      <dc:date>2015-08-26T09:28:43Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/63634#M38265</link>
      <description>&lt;P&gt;Some server uses non standard cipher suites that&amp;nbsp; why PA cannot decrypt them. However PAOS 7.0 can decrypt more traffic than previous versions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Pankaj Kumar&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2015 09:37:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/63634#M38265</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2015-08-26T09:37:04Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/63642#M38268</link>
      <description>&lt;P&gt;I totally feel your pain and agree...I've actually got a case open right now on this very issue. &amp;nbsp;The amount of TLS1.2 sites that fail to load because of unsupported cipher suites the palo doesn't support is kinda crazy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then compounding the issue is the "Page can't be disaplayed" error users get in IE. &amp;nbsp;At least Chrome give users a "Connection Closed Error" which does indicate something actually happened.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On your decryption profile you should be able to allow connection to SSL sites with "Unsupported ciphers" which I've actually got set to allow, but the 5060 still isn't allowing the connection. &amp;nbsp;So TAC is investigating.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2015 13:13:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/63642#M38268</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2015-08-26T13:13:04Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/63645#M38269</link>
      <description>&lt;P&gt;FWIW I am the only user of the solution (demo unit), and I am thinking of turning off SSL decryption given the number of issues it causes. I can't imagine the number of tickets I would get with 1K+ users on it.&lt;/P&gt;&lt;P&gt;How is TAC dealing with these issues from your experience?&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2015 14:01:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/63645#M38269</guid>
      <dc:creator>prospectfr</dc:creator>
      <dc:date>2015-08-26T14:01:30Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/63646#M38270</link>
      <description>&lt;P&gt;Oddly enough, it's still worth it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not all sites run TLS1.2. &amp;nbsp;There have been plenty of cases where decrypted content has enabled the threat service to find malware.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are also a fair amount of sites running TLS1.2 that the device does support FB, Youtube, Webmail, as well as other governmental websites.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2015 14:51:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/63646#M38270</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2015-08-26T14:51:16Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/63648#M38271</link>
      <description>&lt;P&gt;As far as TAC support on this TLS issue. &amp;nbsp;I've only had the case open for about 12 hours. &amp;nbsp;We'll see how things progress.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2015 14:54:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/63648#M38271</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2015-08-26T14:54:02Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/63728#M38295</link>
      <description>&lt;P&gt;I've got about 1k users and I am decrypting all traffic. Currently running 7.0.1 on a pair of 3050s. 7.x has definitely improved the situation as they fixed a bug that prevented many pages from loading even with the unsupported cipher bypass enabled. You still run into situations like the one you described, but not nearly as many as before. I generally have 2-3 unblock requests per week so it is managable for now. I expect that number to go up in the future as more sites begin using cipher suites that the Palos can't handle. I'm hoping Palo is putting time into supporting more suites as decryption is one of the foundations of their app-id.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2015 16:48:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/63728#M38295</guid>
      <dc:creator>ITCMPHC</dc:creator>
      <dc:date>2015-08-27T16:48:06Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/63898#M38392</link>
      <description>&lt;P&gt;Still don't have an answer from TAC.&lt;/P&gt;</description>
      <pubDate>Mon, 31 Aug 2015 17:35:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/63898#M38392</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2015-08-31T17:35:25Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/63924#M38398</link>
      <description>&lt;P&gt;Slightly OT, what kind of traffic do you manage to require 3050s instead of 3020s for 1K users?&lt;/P&gt;</description>
      <pubDate>Tue, 01 Sep 2015 08:22:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/63924#M38398</guid>
      <dc:creator>prospectfr</dc:creator>
      <dc:date>2015-09-01T08:22:12Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/64301#M38577</link>
      <description>&lt;P&gt;Bug ID&amp;nbsp;83524 -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has been documented for sites with unsupported cipher suites still not being accessible when configured to not block unsupported cipher suites.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The current work around is to bypass URLs as they come. &amp;nbsp;As of this date 8 Sep 15, this bug still isn't resolved in 7.0.2, though operability with other ciphers might be better the bug isn't officially resolved in 7.0.2.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Sep 2015 15:56:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/64301#M38577</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2015-09-08T15:56:31Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Woes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/66498#M39220</link>
      <description>&lt;P&gt;I asked a Palo Alto representative about this a few months back, and support for TLS_ECDHE_RSA and TLS_DHE_RSA was planned to be implemented sometime in the first half of 2016.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could be coming in&amp;nbsp;PANOS 8?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 06:56:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-woes/m-p/66498#M39220</guid>
      <dc:creator>arvesynd</dc:creator>
      <dc:date>2015-10-14T06:56:42Z</dc:date>
    </item>
  </channel>
</rss>

