<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to Block weak ciphers? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-weak-ciphers/m-p/200941#M59427</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56221"&gt;@raji_toor&lt;/a&gt;&amp;nbsp;This can also be done with custom signatures.&amp;nbsp; I created one recently for a customer who wanted to block connections using "sha1WithRSAEncryption"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&amp;lt;vulnerability-threat version="8.1.0"&amp;gt;
  &amp;lt;entry name="41023"&amp;gt;
    &amp;lt;signature&amp;gt;
      &amp;lt;standard&amp;gt;
        &amp;lt;entry name="sig1"&amp;gt;
          &amp;lt;and-condition&amp;gt;
            &amp;lt;entry name="And Condition 1"&amp;gt;
              &amp;lt;or-condition&amp;gt;
                &amp;lt;entry name="Or Condition 1"&amp;gt;
                  &amp;lt;operator&amp;gt;
                    &amp;lt;pattern-match&amp;gt;
                      &amp;lt;pattern&amp;gt;\x2a864886f70d010105\x&amp;lt;/pattern&amp;gt;
                      &amp;lt;context&amp;gt;ssl-rsp-certificate&amp;lt;/context&amp;gt;
                      &amp;lt;negate&amp;gt;no&amp;lt;/negate&amp;gt;
                    &amp;lt;/pattern-match&amp;gt;
                  &amp;lt;/operator&amp;gt;
                &amp;lt;/entry&amp;gt;
              &amp;lt;/or-condition&amp;gt;
            &amp;lt;/entry&amp;gt;
          &amp;lt;/and-condition&amp;gt;
          &amp;lt;order-free&amp;gt;yes&amp;lt;/order-free&amp;gt;
          &amp;lt;scope&amp;gt;session&amp;lt;/scope&amp;gt;
        &amp;lt;/entry&amp;gt;
      &amp;lt;/standard&amp;gt;
    &amp;lt;/signature&amp;gt;
    &amp;lt;default-action&amp;gt;
      &amp;lt;alert/&amp;gt;
    &amp;lt;/default-action&amp;gt;
    &amp;lt;threatname&amp;gt;sha1WithRSAEncryption&amp;lt;/threatname&amp;gt;
    &amp;lt;severity&amp;gt;informational&amp;lt;/severity&amp;gt;
    &amp;lt;direction&amp;gt;server2client&amp;lt;/direction&amp;gt;
    &amp;lt;comment&amp;gt;detects the presence of SHA-1 signature algorithm ID of server during SSL handshake&amp;lt;/comment&amp;gt;
    &amp;lt;affected-host&amp;gt;
      &amp;lt;client&amp;gt;yes&amp;lt;/client&amp;gt;
    &amp;lt;/affected-host&amp;gt;
  &amp;lt;/entry&amp;gt;
&amp;lt;/vulnerability-threat&amp;gt;&lt;/PRE&gt;&lt;P&gt;If you're interested in pursuing the custom signature option, head over to the &lt;A title="Custom Signatures discussion area" href="https://live.paloaltonetworks.com/t5/Custom-Signatures/bd-p/CustomSignatures" target="_blank"&gt;Custom Signatures discussion area&lt;/A&gt;.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 16 Feb 2018 16:39:11 GMT</pubDate>
    <dc:creator>jvalentine</dc:creator>
    <dc:date>2018-02-16T16:39:11Z</dc:date>
    <item>
      <title>How to Block weak ciphers?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-weak-ciphers/m-p/200925#M59418</link>
      <description>&lt;P&gt;Can PA be used block weak ciphers at zone or server level?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2018 16:07:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-weak-ciphers/m-p/200925#M59418</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2018-02-16T16:07:17Z</dc:date>
    </item>
    <item>
      <title>Re: How to Block weak ciphers?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-weak-ciphers/m-p/200927#M59419</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56221"&gt;@raji_toor&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Take a look at SSL-Decryption profiles.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/tkb/articleprintpage/tkb-id/FeaturedArticles/article-id/120" target="_blank"&gt;https://live.paloaltonetworks.com/t5/tkb/articleprintpage/tkb-id/FeaturedArticles/article-id/120&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2018 16:08:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-weak-ciphers/m-p/200927#M59419</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-02-16T16:08:48Z</dc:date>
    </item>
    <item>
      <title>Re: How to Block weak ciphers?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-weak-ciphers/m-p/200935#M59422</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;What if decryption is not enabled or is not an option.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2018 16:17:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-weak-ciphers/m-p/200935#M59422</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2018-02-16T16:17:45Z</dc:date>
    </item>
    <item>
      <title>Re: How to Block weak ciphers?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-weak-ciphers/m-p/200938#M59425</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56221"&gt;@raji_toor&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;If you aren't utilizing Decryption then I&amp;nbsp;&lt;EM&gt;believe&lt;/EM&gt; your only option is going to be through a Vulnerability Protection profile and the only Threat that deals with weak ciphers is ID 38924 'SSL Version 2 Weak RSA Cipher Detected' which you could modify from the default of 'alert' and change it to reset if you'd like.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2018 16:24:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-weak-ciphers/m-p/200938#M59425</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-02-16T16:24:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to Block weak ciphers?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-weak-ciphers/m-p/200941#M59427</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56221"&gt;@raji_toor&lt;/a&gt;&amp;nbsp;This can also be done with custom signatures.&amp;nbsp; I created one recently for a customer who wanted to block connections using "sha1WithRSAEncryption"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&amp;lt;vulnerability-threat version="8.1.0"&amp;gt;
  &amp;lt;entry name="41023"&amp;gt;
    &amp;lt;signature&amp;gt;
      &amp;lt;standard&amp;gt;
        &amp;lt;entry name="sig1"&amp;gt;
          &amp;lt;and-condition&amp;gt;
            &amp;lt;entry name="And Condition 1"&amp;gt;
              &amp;lt;or-condition&amp;gt;
                &amp;lt;entry name="Or Condition 1"&amp;gt;
                  &amp;lt;operator&amp;gt;
                    &amp;lt;pattern-match&amp;gt;
                      &amp;lt;pattern&amp;gt;\x2a864886f70d010105\x&amp;lt;/pattern&amp;gt;
                      &amp;lt;context&amp;gt;ssl-rsp-certificate&amp;lt;/context&amp;gt;
                      &amp;lt;negate&amp;gt;no&amp;lt;/negate&amp;gt;
                    &amp;lt;/pattern-match&amp;gt;
                  &amp;lt;/operator&amp;gt;
                &amp;lt;/entry&amp;gt;
              &amp;lt;/or-condition&amp;gt;
            &amp;lt;/entry&amp;gt;
          &amp;lt;/and-condition&amp;gt;
          &amp;lt;order-free&amp;gt;yes&amp;lt;/order-free&amp;gt;
          &amp;lt;scope&amp;gt;session&amp;lt;/scope&amp;gt;
        &amp;lt;/entry&amp;gt;
      &amp;lt;/standard&amp;gt;
    &amp;lt;/signature&amp;gt;
    &amp;lt;default-action&amp;gt;
      &amp;lt;alert/&amp;gt;
    &amp;lt;/default-action&amp;gt;
    &amp;lt;threatname&amp;gt;sha1WithRSAEncryption&amp;lt;/threatname&amp;gt;
    &amp;lt;severity&amp;gt;informational&amp;lt;/severity&amp;gt;
    &amp;lt;direction&amp;gt;server2client&amp;lt;/direction&amp;gt;
    &amp;lt;comment&amp;gt;detects the presence of SHA-1 signature algorithm ID of server during SSL handshake&amp;lt;/comment&amp;gt;
    &amp;lt;affected-host&amp;gt;
      &amp;lt;client&amp;gt;yes&amp;lt;/client&amp;gt;
    &amp;lt;/affected-host&amp;gt;
  &amp;lt;/entry&amp;gt;
&amp;lt;/vulnerability-threat&amp;gt;&lt;/PRE&gt;&lt;P&gt;If you're interested in pursuing the custom signature option, head over to the &lt;A title="Custom Signatures discussion area" href="https://live.paloaltonetworks.com/t5/Custom-Signatures/bd-p/CustomSignatures" target="_blank"&gt;Custom Signatures discussion area&lt;/A&gt;.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2018 16:39:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-weak-ciphers/m-p/200941#M59427</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2018-02-16T16:39:11Z</dc:date>
    </item>
  </channel>
</rss>

