<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HSTS and HPKP &amp;quot;pinned certs&amp;quot; - breaks decryption and captive portal in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/hsts-and-hpkp-quot-pinned-certs-quot-breaks-decryption-and/m-p/65037#M38898</link>
    <description>&lt;P&gt;&lt;A href="https://wiki.mozilla.org/SecurityEngineering/Public_Key_Pinning#Implementation_status" target="_blank"&gt;https://wiki.mozilla.org/SecurityEngineering/Public_Key_Pinning#Implementation_status&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="mw-headline"&gt;How to use pinning&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Starting with FF 32, it's on by default, so you don't have to do anything. The pinning level is enforced by a pref, security.cert_pinning.enforcement_level&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;0. Pinning disabled&lt;/LI&gt;&lt;LI&gt;1. Allow User MITM (pinning not enforced if the trust anchor is a user inserted CA, default)&lt;/LI&gt;&lt;LI&gt;2. Strict. Pinning is always enforced.&lt;/LI&gt;&lt;LI&gt;3. Enforce test mode.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What mode is enabled in yours ?&lt;/P&gt;</description>
    <pubDate>Wed, 23 Sep 2015 23:32:31 GMT</pubDate>
    <dc:creator>cpainchaud</dc:creator>
    <dc:date>2015-09-23T23:32:31Z</dc:date>
    <item>
      <title>HSTS and HPKP "pinned certs" - breaks decryption and captive portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/hsts-and-hpkp-quot-pinned-certs-quot-breaks-decryption-and/m-p/65024#M38889</link>
      <description>&lt;P&gt;I'm seeing many sites recently, like Google and Reddit for example, that are implementing HPKP, which prevents man-in-the-middle decryption like the PA. Currently, Chrome browsers completely ignore the PA certificate on these sites and use the site cert. Firefox just stops with a security message with no proceed or bypass, even when the PA root cert has been imported manually into the browser.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Besides the fact that this breaks PA decryption, my concern is when captive portal "web-form" is enabled, some browsers do not forward to the portal if the first webpage someone browses to has HPKP&amp;nbsp;(like gmail). It just fails to open the site, until the user tries a different site (or a different browser).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only workaround I have been able to find is to whitelist these sites, but the number keeps growing. &amp;nbsp;Is there a better way to fix the captive portal issue?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Sep 2015 22:08:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/hsts-and-hpkp-quot-pinned-certs-quot-breaks-decryption-and/m-p/65024#M38889</guid>
      <dc:creator>Maxstr</dc:creator>
      <dc:date>2015-09-23T22:08:20Z</dc:date>
    </item>
    <item>
      <title>Re: HSTS and HPKP "pinned certs" - breaks decryption and captive portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/hsts-and-hpkp-quot-pinned-certs-quot-breaks-decryption-and/m-p/65029#M38891</link>
      <description>&lt;P&gt;it should work with Chrome is your CA is deployed in Trust Enterprise store (not the classic &amp;amp; standard public CA store)&lt;/P&gt;</description>
      <pubDate>Wed, 23 Sep 2015 22:29:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/hsts-and-hpkp-quot-pinned-certs-quot-breaks-decryption-and/m-p/65029#M38891</guid>
      <dc:creator>cpainchaud</dc:creator>
      <dc:date>2015-09-23T22:29:40Z</dc:date>
    </item>
    <item>
      <title>Re: HSTS and HPKP "pinned certs" - breaks decryption and captive portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/hsts-and-hpkp-quot-pinned-certs-quot-breaks-decryption-and/m-p/65030#M38892</link>
      <description>&lt;P&gt;&lt;A href="https://developer.mozilla.org/en-US/docs/Web/Security/Public_Key_Pinning" target="_blank"&gt;https://developer.mozilla.org/en-US/docs/Web/Security/Public_Key_Pinning&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Firefox (and Chrome)&lt;/SPAN&gt;&lt;STRONG&gt; disable Pin Validation&lt;/STRONG&gt;&lt;SPAN&gt; for Pinned Hosts whose validated certificate chain terminates at a &lt;/SPAN&gt;&lt;STRONG&gt;user-defined trust anchor&lt;/STRONG&gt;&lt;SPAN&gt; (rather than a built-in trust anchor).&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Sep 2015 22:31:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/hsts-and-hpkp-quot-pinned-certs-quot-breaks-decryption-and/m-p/65030#M38892</guid>
      <dc:creator>cpainchaud</dc:creator>
      <dc:date>2015-09-23T22:31:49Z</dc:date>
    </item>
    <item>
      <title>Re: HSTS and HPKP "pinned certs" - breaks decryption and captive portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/hsts-and-hpkp-quot-pinned-certs-quot-breaks-decryption-and/m-p/65034#M38895</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/13836"&gt;@cpainchaud&lt;/a&gt; wrote:&lt;BR /&gt;&lt;P&gt;&lt;A href="https://developer.mozilla.org/en-US/docs/Web/Security/Public_Key_Pinning" target="_blank"&gt;https://developer.mozilla.org/en-US/docs/Web/Security/Public_Key_Pinning&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Firefox (and Chrome)&lt;/SPAN&gt;&lt;STRONG&gt; disable Pin Validation&lt;/STRONG&gt;&lt;SPAN&gt; for Pinned Hosts whose validated certificate chain terminates at a &lt;/SPAN&gt;&lt;STRONG&gt;user-defined trust anchor&lt;/STRONG&gt;&lt;SPAN&gt; (rather than a built-in trust anchor).&lt;/SPAN&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Not quite sure what that means. I've added the PA cert into Firefox as both trusted root and in personal store (and whatever the other options are), but it still blocks it.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Sep 2015 23:09:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/hsts-and-hpkp-quot-pinned-certs-quot-breaks-decryption-and/m-p/65034#M38895</guid>
      <dc:creator>Maxstr</dc:creator>
      <dc:date>2015-09-23T23:09:17Z</dc:date>
    </item>
    <item>
      <title>Re: HSTS and HPKP "pinned certs" - breaks decryption and captive portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/hsts-and-hpkp-quot-pinned-certs-quot-breaks-decryption-and/m-p/65036#M38897</link>
      <description>&lt;P&gt;it says 'starting firefox 32' what version do you have and in which store did you install it ?&lt;/P&gt;</description>
      <pubDate>Wed, 23 Sep 2015 23:23:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/hsts-and-hpkp-quot-pinned-certs-quot-breaks-decryption-and/m-p/65036#M38897</guid>
      <dc:creator>cpainchaud</dc:creator>
      <dc:date>2015-09-23T23:23:01Z</dc:date>
    </item>
    <item>
      <title>Re: HSTS and HPKP "pinned certs" - breaks decryption and captive portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/hsts-and-hpkp-quot-pinned-certs-quot-breaks-decryption-and/m-p/65037#M38898</link>
      <description>&lt;P&gt;&lt;A href="https://wiki.mozilla.org/SecurityEngineering/Public_Key_Pinning#Implementation_status" target="_blank"&gt;https://wiki.mozilla.org/SecurityEngineering/Public_Key_Pinning#Implementation_status&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="mw-headline"&gt;How to use pinning&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Starting with FF 32, it's on by default, so you don't have to do anything. The pinning level is enforced by a pref, security.cert_pinning.enforcement_level&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;0. Pinning disabled&lt;/LI&gt;&lt;LI&gt;1. Allow User MITM (pinning not enforced if the trust anchor is a user inserted CA, default)&lt;/LI&gt;&lt;LI&gt;2. Strict. Pinning is always enforced.&lt;/LI&gt;&lt;LI&gt;3. Enforce test mode.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What mode is enabled in yours ?&lt;/P&gt;</description>
      <pubDate>Wed, 23 Sep 2015 23:32:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/hsts-and-hpkp-quot-pinned-certs-quot-breaks-decryption-and/m-p/65037#M38898</guid>
      <dc:creator>cpainchaud</dc:creator>
      <dc:date>2015-09-23T23:32:31Z</dc:date>
    </item>
    <item>
      <title>Re: HSTS and HPKP "pinned certs" - breaks decryption and captive portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/hsts-and-hpkp-quot-pinned-certs-quot-breaks-decryption-and/m-p/65052#M38904</link>
      <description>&lt;P&gt;Well, with Chrome, I have the PA cert imported as trusted publisher, root, etc. But, even if Google.com is in the decryption profile, Chrome itself ignores the Palo cert. I go to google.com or YouTube.com and look at the certificate, instead of my cert, it's google's own cert. But all other websites that use SSL do show my cert correctly, so I know it's working. It's only HPKP (or it might just be google's own sites).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for Firefox, I'm using the latest version on my test machine. While I can easily make any conf changes here, the&amp;nbsp;main issue is that there is no practical way to add certificates to Firefox on an enterprise-scale. It doesn't use GPO, so the cert has to be manually added to each installation. Then it wil work with "normal" websites and I verified that it decrypts. But it will not work with HPKP, unless each Firefox installation is manually changed with that setting you mentioned earlier (which I haven't had a chance to test yet).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Chrome isn't the main issue, because it just overrides the PA cert and allows the user to pass without a warning message. I'm not too concerned about decrypting Google's websites.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Firefox on the other hand, presents a hard security warning and prevents bypassing it.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Sep 2015 11:54:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/hsts-and-hpkp-quot-pinned-certs-quot-breaks-decryption-and/m-p/65052#M38904</guid>
      <dc:creator>Maxstr</dc:creator>
      <dc:date>2015-09-24T11:54:50Z</dc:date>
    </item>
    <item>
      <title>Re: HSTS and HPKP "pinned certs" - breaks decryption and captive portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/hsts-and-hpkp-quot-pinned-certs-quot-breaks-decryption-and/m-p/65063#M38910</link>
      <description>&lt;P&gt;it used to work with previous versions in my lab I am pretty sure with Chrome. Might be a bug on their side as their doc says it should work. May be you could open a bug on chromium project ?&lt;/P&gt;</description>
      <pubDate>Thu, 24 Sep 2015 16:41:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/hsts-and-hpkp-quot-pinned-certs-quot-breaks-decryption-and/m-p/65063#M38910</guid>
      <dc:creator>cpainchaud</dc:creator>
      <dc:date>2015-09-24T16:41:53Z</dc:date>
    </item>
    <item>
      <title>Re: HSTS and HPKP "pinned certs" - breaks decryption and captive portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/hsts-and-hpkp-quot-pinned-certs-quot-breaks-decryption-and/m-p/65070#M38913</link>
      <description>&lt;P&gt;I just went through this hell last week.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Solution: uninstall Firefox, delete the Mozilla folder under %APPDATA%, reboot, reinstall Firefox, reinstall firewall cert.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You should be good to go.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Sep 2015 17:51:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/hsts-and-hpkp-quot-pinned-certs-quot-breaks-decryption-and/m-p/65070#M38913</guid>
      <dc:creator>efairhurst</dc:creator>
      <dc:date>2015-09-24T17:51:16Z</dc:date>
    </item>
  </channel>
</rss>

