<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inbound SSL Decryption issues in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-issues/m-p/169306#M53808</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is Indound Decryption on a security rule that only allows a single company to connect to an inside resource on our network. &amp;nbsp;They do have a small list of IP addresses that can make the connection and, so far, I haven't seen it succeed on any of them. &amp;nbsp;I verified with the vendor this morning that SSLv3 should be disabled and it shouldn't be using it... it should be using TLS1.2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll do a packet capture at the next available connection which should be later tonight and see what I get.&lt;/P&gt;</description>
    <pubDate>Tue, 01 Aug 2017 15:11:55 GMT</pubDate>
    <dc:creator>jsalmans</dc:creator>
    <dc:date>2017-08-01T15:11:55Z</dc:date>
    <item>
      <title>Inbound SSL Decryption issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-issues/m-p/169186#M53781</link>
      <description>&lt;P&gt;Wondering if anyone has an idea on why I might be getting "decrypt-error" on an Inbound SSL decrypt rule?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This service only runs a few times at night so I haven't done a packet capture yet... tonight I did some debug commands and found this in the log:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2017-07-31 22:00:15.865 -0500 Error: pan_ssl3_client_process_handshake(pan_ssl_client.c:871): pan_ssl3_client_get_se&lt;BR /&gt;rver_hello() failed&lt;BR /&gt;2017-07-31 22:00:15.865 -0500 Error: pan_ssl_proxy_handle_rt_hs(pan_ssl_proxy.c:236): pan_ssl3_process_handshake_mes&lt;BR /&gt;sage() failed -6&lt;BR /&gt;2017-07-31 22:00:15.865 -0500 Error: pan_ssl_proxy_parse_data(pan_ssl_proxy.c:550): pan_ssl_parse_record() failed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I didn't think this service was supposed to accept SSLv3 and my decryption profile I have installed shouldn't have that as an option. &amp;nbsp;Even when I had no decryption profile it was giving me decrypt-error although I believe I was also seeing some decrypt-unsupport-param.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm on PANOS 7.1.11.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2017 03:34:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-issues/m-p/169186#M53781</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2017-08-01T03:34:41Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL Decryption issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-issues/m-p/169235#M53788</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/39461"&gt;@jsalmans&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it working only from some clients or is this issue oersistent for all connections?&lt;/P&gt;&lt;P&gt;A packet capure will probably the best right now. With the capture you'll be able to see what ciphers the client proposes in the ssl-handshake hello packet. With that information it will probably already clear why the decryption isn't working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2017 08:11:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-issues/m-p/169235#M53788</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-08-01T08:11:16Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL Decryption issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-issues/m-p/169306#M53808</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is Indound Decryption on a security rule that only allows a single company to connect to an inside resource on our network. &amp;nbsp;They do have a small list of IP addresses that can make the connection and, so far, I haven't seen it succeed on any of them. &amp;nbsp;I verified with the vendor this morning that SSLv3 should be disabled and it shouldn't be using it... it should be using TLS1.2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll do a packet capture at the next available connection which should be later tonight and see what I get.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2017 15:11:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-issues/m-p/169306#M53808</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2017-08-01T15:11:55Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL Decryption issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-issues/m-p/169454#M53841</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I'm looking at the packet capture but I'm not seeing any SSL transations or Cipher setup. &amp;nbsp;I'm fairly certain I captured all of the traffic but the wireshark file is showing nothing but TCP protocol traffic and that includes the SYN, ACK from the server, some data PSH transfers, and then a RST from the server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm fairly certain this data is supposed to be encrypted and the firewall is definitely showing it as SSL traffic and not as the application it should be coming across as.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is one of my first attempts at Inbound SSL Decryption and its pretty late at night so hopefully I'm not making&amp;nbsp;an obvious error here somewhere.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Aug 2017 03:46:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-issues/m-p/169454#M53841</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2017-08-02T03:46:35Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL Decryption issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-issues/m-p/169642#M53875</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/39461"&gt;@jsalmans&lt;/a&gt;&lt;/P&gt;&lt;P&gt;There definately should be more in the capture ...&lt;/P&gt;&lt;P&gt;What if you temporary allow the access from everywhere and run a TLS test like Qualys SSLLabs ot the one at htbridge.com?&lt;/P&gt;&lt;P&gt;Or you do a connection test yourself over the internet to check if there is a reason for this problem?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or you share some screenshots of your security/decryption policy... may be there is something real simple thats missing?&lt;/P&gt;</description>
      <pubDate>Wed, 02 Aug 2017 17:07:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-issues/m-p/169642#M53875</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-08-02T17:07:45Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL Decryption issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-issues/m-p/169653#M53879</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yeah I'm not sure what was going on. &amp;nbsp;I'm going to try again during the scheduled time tonight.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I thought about using one of those 3rd party SSL check services. &amp;nbsp;I still might be it isn't my server and I'm not 100% responsible for the data it has so I'll have to reach out to my team on that.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Aug 2017 19:10:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-issues/m-p/169653#M53879</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2017-08-02T19:10:54Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL Decryption issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-issues/m-p/169711#M53890</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I did the packet capture again tonight. &amp;nbsp;My filter was set up to capture any traffic going to the NAT IP or private IP of the server using the interface we have configured for Internet/Untrusted as the Ingress. &amp;nbsp;I also had rules to capture any traffic coming from the NAT IP or the private IP. &amp;nbsp;I also turned the decryption policy completely off for now. &amp;nbsp;Here are the logs I see.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="panorama log.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10617i297A79D8D63A7EF4/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="panorama log.png" alt="panorama log.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;As you can see, app-id is flagging that as SSL traffic. &amp;nbsp;I have my security policy set up like so:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sec-policy.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10618iF3AE77E1386DC73E/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="sec-policy.png" alt="sec-policy.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rule 75 was the original until I saw that the traffic was coming in as SSL and I created rule 74 to allow that traffic in (I'm assuming this won't be necessary once decryption is working since the decryption is supposed to happen before app-id according to the flow chart).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is a sample of what I'm seeing in Wireshark. &amp;nbsp;I do see TLS traffic happening but between the server and a completely different client... when I limit my packet capture to those 52.x.x.x addresses I don't see anything except TCP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="wireshark.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10619i7516D0F24DEC32B9/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="wireshark.png" alt="wireshark.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, spyware alerts are being flagged from the 52.x.x.x IP address as "Suspicious TLC Evasion Found" but it is set to alert only.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am I missing something really obvious here or am I seeing something like a false positive on ssl app-id?&lt;/P&gt;</description>
      <pubDate>Thu, 03 Aug 2017 03:37:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-issues/m-p/169711#M53890</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2017-08-03T03:37:14Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL Decryption issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-issues/m-p/170595#M54062</link>
      <description>&lt;P&gt;Just checking to see if anyone has any further ideas based on the info and screenshots I provided?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 08 Aug 2017 20:05:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-issues/m-p/170595#M54062</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2017-08-08T20:05:23Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL Decryption issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-issues/m-p/170599#M54063</link>
      <description>&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;gt;&amp;nbsp;&lt;SPAN&gt;when I limit my packet capture to those 52.x.x.x addresses I don't see anything except TCP.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In Wireshark, right-click on any of the frames you put in the capture &amp;gt; "Decode As" and choose SSL (change the port to the one you're using, 5671. Don't bother with the source port.):&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="decode-as.jpg" style="width: 711px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10689iB0C5FD11D7F77838/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="decode-as.jpg" alt="decode-as.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This will let Wireshark display the actual Client Hello and certificate and such. By default, it only recognizes port 443 and a few others as SSL/TLS, so you have to tell it what dissector to use when it's not that set of ports.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once you've got that in, you should be able to see where the failure is. Most of the time I see handshake failures caused by something simple like cipher suites not matching. It could be that there's something else, but the capture should help once it's decoded.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for your original question regarding SSLv3, that's just the name in the code. Something like "pan_ssl3_process_handshake_message()" is just a function name, which can process SSLv3 and TLS alike.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you can post another screenshot of the packet capture after decoding, it may help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Greg Wesson&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Aug 2017 20:19:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-issues/m-p/170599#M54063</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2017-08-08T20:19:01Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL Decryption issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-issues/m-p/170600#M54064</link>
      <description>&lt;P&gt;I also want to add these questions:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Does the column "decrypted" in your logs actually show "yes"?&lt;/LI&gt;&lt;LI&gt;Do you have a decryption profile applied to your decryption policy and if yes do you block sessions that cannot be decrypted and could you show a screenshot of that profile?&lt;/LI&gt;&lt;LI&gt;Did you do connection test or with ssllabs.com/htbridge.com? If yes what was the output there?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/28203"&gt;@gwesson&lt;/a&gt;&amp;nbsp;good point with the wireshark decoding&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also looked again to the posted wireshark screenshot. And if this is the SSL session, I think there are too many packets for a failing TLS session based on a ciphersuite mismatch. But after setting the decoding session we should know more.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And last but not least: did you also capture the session aftet NAT, so between the firewall and your server? Or did you try to connect to your server directly for testing purposes? (May be with openssl directly or with a tool like sslyze)&lt;/P&gt;</description>
      <pubDate>Tue, 08 Aug 2017 20:39:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-issues/m-p/170600#M54064</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-08-08T20:39:15Z</dc:date>
    </item>
  </channel>
</rss>

