<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA doesn't cover DROWN Attack? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa-doesn-t-cover-drown-attack/m-p/74372#M41668</link>
    <description>&lt;P&gt;Yes, I agree. But one of the IPS functions&amp;nbsp;is also to protect old or unpatched servers.&lt;/P&gt;
&lt;P&gt;Customer was of course advised to upgrade the server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 08 Mar 2016 11:19:07 GMT</pubDate>
    <dc:creator>santonic</dc:creator>
    <dc:date>2016-03-08T11:19:07Z</dc:date>
    <item>
      <title>PA doesn't cover DROWN Attack?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-doesn-t-cover-drown-attack/m-p/74353#M41660</link>
      <description>&lt;P&gt;A customer has been warned about DROWN attack (&lt;A href="https://drownattack.com/" target="_self"&gt;https://drownattack.com/&lt;/A&gt;) on one of its servers. As a server is behind PA I thought there was no risk. But searching through signature database I didn't find anything about DROWN attack. I've also checked all CVEs connected with attack (CVE-2015-3197, CVE-2016-0703, CVE-2016-0800) and PA doesn't have signature for any of them!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyone knows about if PA covers this attack? Anyone contacted PA about this already?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 08:07:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-doesn-t-cover-drown-attack/m-p/74353#M41660</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2016-03-08T08:07:04Z</dc:date>
    </item>
    <item>
      <title>Re: PA doesn't cover DROWN Attack?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-doesn-t-cover-drown-attack/m-p/74365#M41663</link>
      <description>&lt;P&gt;Hi santonic,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This has been reported to support yes.&lt;/P&gt;
&lt;P&gt;I'd recommend that you&amp;nbsp;open a case with support to get information on the coverage.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;-Kim.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 09:07:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-doesn-t-cover-drown-attack/m-p/74365#M41663</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2016-03-08T09:07:53Z</dc:date>
    </item>
    <item>
      <title>Re: PA doesn't cover DROWN Attack?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-doesn-t-cover-drown-attack/m-p/74366#M41664</link>
      <description>&lt;P&gt;Hi Santonic,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My understanding is that this attack requires SSLv2 to be supported? (correct me If I am wrong) I think the worse security risk is to have a server that supports SSLv2, I know the PAN &amp;nbsp;device does not support this, it doesn't even support v3.&amp;nbsp;I know SSLv2 was removed from OpenSSL toolkit on the 15th feb this year with v1.1.0.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ben&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 10:32:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-doesn-t-cover-drown-attack/m-p/74366#M41664</guid>
      <dc:creator>bmorris1</dc:creator>
      <dc:date>2016-03-08T10:32:16Z</dc:date>
    </item>
    <item>
      <title>Re: PA doesn't cover DROWN Attack?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-doesn-t-cover-drown-attack/m-p/74372#M41668</link>
      <description>&lt;P&gt;Yes, I agree. But one of the IPS functions&amp;nbsp;is also to protect old or unpatched servers.&lt;/P&gt;
&lt;P&gt;Customer was of course advised to upgrade the server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 11:19:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-doesn-t-cover-drown-attack/m-p/74372#M41668</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2016-03-08T11:19:07Z</dc:date>
    </item>
    <item>
      <title>Re: PA doesn't cover DROWN Attack?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-doesn-t-cover-drown-attack/m-p/74532#M41707</link>
      <description>&lt;P&gt;From my understanding of this vulnerability, a signature to cover the weakness might be difficult to create.&lt;BR /&gt;Since the exploit collects data and then decrypts it, the vulnerability is not based in a protocol anomaly or an easily detectable exploit.&lt;BR /&gt;The collection of data based on cracking a 40-bit RSA key, and can be found over time against the realtive limited variations with 40-bit.&lt;BR /&gt;Data collection might be by interception between client and server, and this would be undetectable to both.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;It might seem better to update the servers use of TLS/SSL, rather than wait for a usefull signature.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Mar 2016 10:42:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-doesn-t-cover-drown-attack/m-p/74532#M41707</guid>
      <dc:creator>Dulle</dc:creator>
      <dc:date>2016-03-10T10:42:25Z</dc:date>
    </item>
    <item>
      <title>Re: PA doesn't cover DROWN Attack?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-doesn-t-cover-drown-attack/m-p/74542#M41712</link>
      <description>&lt;P&gt;Would the PAN be able to detet this if it was performing reverse proxy ssl decryption?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just a thought&lt;/P&gt;</description>
      <pubDate>Thu, 10 Mar 2016 14:42:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-doesn-t-cover-drown-attack/m-p/74542#M41712</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2016-03-10T14:42:01Z</dc:date>
    </item>
    <item>
      <title>Re: PA doesn't cover DROWN Attack?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-doesn-t-cover-drown-attack/m-p/74570#M41725</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;decryption would not really help, as Dulle explained intercepting communication over long time is sufficient to exploit this. Decryption can't help if someone is somewhere allowing (knowingly or unknowingly) copying of your traffic as it passes along the way.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Mar 2016 23:41:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-doesn-t-cover-drown-attack/m-p/74570#M41725</guid>
      <dc:creator>Lucky</dc:creator>
      <dc:date>2016-03-10T23:41:04Z</dc:date>
    </item>
    <item>
      <title>Re: PA doesn't cover DROWN Attack?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-doesn-t-cover-drown-attack/m-p/74576#M41726</link>
      <description>&lt;P&gt;And there came&amp;nbsp;Application and Threat Content Release Notes Version 567, and proved me wrong....&lt;/P&gt;</description>
      <pubDate>Fri, 11 Mar 2016 05:29:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-doesn-t-cover-drown-attack/m-p/74576#M41726</guid>
      <dc:creator>Dulle</dc:creator>
      <dc:date>2016-03-11T05:29:34Z</dc:date>
    </item>
    <item>
      <title>Re: PA doesn't cover DROWN Attack?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-doesn-t-cover-drown-attack/m-p/74700#M41766</link>
      <description>&lt;P&gt;Not really Dulle. The signature doesn't detect any exploit. It just detects use of SSLv2.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2016 07:23:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-doesn-t-cover-drown-attack/m-p/74700#M41766</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2016-03-15T07:23:01Z</dc:date>
    </item>
  </channel>
</rss>

