<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA inbound decryption in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa-inbound-decryption/m-p/204761#M60201</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/84525"&gt;@blabla&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In that case, when this is not client cert auth, I need to ask you to explain me why you specify a keyfile in the s_client command?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you allow connections that cannot be decrypted in the decryption profile attached to the decryption rule? And you wrote that this problem happens with 8.1 - was it working as expected prior to the upgrade?&lt;/P&gt;</description>
    <pubDate>Sun, 11 Mar 2018 19:37:23 GMT</pubDate>
    <dc:creator>Remo</dc:creator>
    <dc:date>2018-03-11T19:37:23Z</dc:date>
    <item>
      <title>PA inbound decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-inbound-decryption/m-p/204751#M60198</link>
      <description>&lt;P&gt;PA drop (decrypt-error, policy-deny) packet when client present a certificate (SMTP STARTTLS).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PAN OS version: 8.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Test cases&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;1) Client cert TRUSTED, TLS 1.2 with ECDHE-RSA-AES256-GCM-SHA384&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Client send Certificate Verify TLS payload&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;openssl s_client -starttls smtp -crlf -tls1_2 -cert trusted-cert.pem -key private.key -cipher 'ECDHE-RSA-AES256-GCM-SHA384' -connect SMTP_HOST:25&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;result: Connection reset by PA (decrypt-error, policy-deny)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;2) Client cert UN-TRUSTED, TLS 1.2 with ECDHE-RSA-AES256-GCM-SHA384&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Client send Certificate Verify TLS payload&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;openssl s_client -starttls smtp -crlf -tls1_2 -cert un-trusted-cert.pem -key un-private.key -cipher 'ECDHE-RSA-AES256-GCM-SHA384' -connect SMTP_HOST:25&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;result: Connection reset by PA (decrypt-error, policy-deny)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;3) Client cert ANONYMOUS, TLS 1.2 with ECDHE-RSA-AES256-GCM-SHA384&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Client NOT send Certificate Verify TLS payload&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;openssl s_client -starttls smtp -crlf -tls1_2 -cipher 'ECDHE-RSA-AES256-GCM-SHA384' -connect SMTP_HOST:25&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;result: IT`s WORK (OK)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;================================================================================================&lt;/P&gt;&lt;P&gt;Attached captured packets pictures&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="decrypt error: client tls payload" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/14199i67C94A43A8135993/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="decrypt-error.jpg" alt="decrypt error: client tls payload" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;decrypt error: client tls payload&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="decrypt error: starttls flow" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/14200i263EF6C04214E343/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="decrypt-error2.jpg" alt="decrypt error: starttls flow" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;decrypt error: starttls flow&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="OK: client tls payload" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/14198i7DB88C4D34FEA377/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="decrypt-ok.jpg" alt="OK: client tls payload" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;OK: client tls payload&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="OK: starttls flow" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/14201i77DB2FD1442810CF/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="decrypt-ok2.jpg" alt="OK: starttls flow" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;OK: starttls flow&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Please help, thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 11 Mar 2018 17:09:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-inbound-decryption/m-p/204751#M60198</guid>
      <dc:creator>blabla</dc:creator>
      <dc:date>2018-03-11T17:09:08Z</dc:date>
    </item>
    <item>
      <title>Re: PA inbound decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-inbound-decryption/m-p/204759#M60199</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/84525"&gt;@blabla&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As far as I know, inbound decryption or decryption in general on a paloalto networks firewall does not support connections with client certificates.&lt;/P&gt;</description>
      <pubDate>Sun, 11 Mar 2018 17:23:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-inbound-decryption/m-p/204759#M60199</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-03-11T17:23:59Z</dc:date>
    </item>
    <item>
      <title>Re: PA inbound decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-inbound-decryption/m-p/204760#M60200</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is not client cert based auth. In this case client is google smtp server, wich during sending email over STARTTLS (&lt;FONT color="#000000"&gt;TLS 1.2 ECDHE-RSA-AES256-GCM-SHA384&lt;/FONT&gt;) for my smtp server, presents his client`s certificate (trusted), that verify my smtp server. The problem is PA drops (policy-deny) packets in this case. &amp;nbsp; In that case inbound decryption does not properly work and does not check incoming smtp traffic. Why?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for answer&lt;/P&gt;</description>
      <pubDate>Sun, 11 Mar 2018 19:20:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-inbound-decryption/m-p/204760#M60200</guid>
      <dc:creator>blabla</dc:creator>
      <dc:date>2018-03-11T19:20:29Z</dc:date>
    </item>
    <item>
      <title>Re: PA inbound decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-inbound-decryption/m-p/204761#M60201</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/84525"&gt;@blabla&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In that case, when this is not client cert auth, I need to ask you to explain me why you specify a keyfile in the s_client command?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you allow connections that cannot be decrypted in the decryption profile attached to the decryption rule? And you wrote that this problem happens with 8.1 - was it working as expected prior to the upgrade?&lt;/P&gt;</description>
      <pubDate>Sun, 11 Mar 2018 19:37:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-inbound-decryption/m-p/204761#M60201</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-03-11T19:37:23Z</dc:date>
    </item>
    <item>
      <title>Re: PA inbound decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-inbound-decryption/m-p/204762#M60202</link>
      <description>&lt;P&gt;&lt;STRONG&gt;openssl s_client -starttls smtp -crlf -tls1_2 -cert trusted-cert.pem -key private.key -cipher 'ECDHE-RSA-AES256-GCM-SHA384' -connect SMTP_HOST:25&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This command just simulates behavior of google smtp server when it sends email (over TLS) to my server. In this case &lt;STRONG&gt;trusted-cert.pem &lt;/STRONG&gt;file is trusted certificate like as in google smtp server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;========================================================&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;openssl s_client -starttls smtp -crlf -tls1_2 -cert un-trusted-cert.pem -key un-private.key -cipher 'ECDHE-RSA-AES256-GCM-SHA384' -connect SMTP_HOST:25&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This command just simulates like previous command but uses untrusted (self signed) certificate (just for experiment).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;========================================================&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;openssl s_client -starttls smtp -crlf -tls1_2 -cipher 'ECDHE-RSA-AES256-GCM-SHA384' -connect SMTP_HOST:25&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This command just simulates like previous command but doesnt use cert and key (ANONYMOUS, generated by openssl), in this case openssl doesnt send client certificate and decryption goes right. &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;But google smtp always sends his certificate when sending email (over STARTTLS) to my smtp server.&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;=======================================&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;gt;&amp;gt;Do you allow connections that cannot be decrypted in the decryption profile attached to the decryption rule?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, all policy rules allow, decription profile Min version: SSLv3 Max version: MAX, all block options unchecked, not block.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;gt;&amp;gt;And you wrote that this problem happens with 8.1 - was it working as expected prior to the upgrade?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I had PANOS version 7.1. The problem didnt solve. I upgrated from 7.1 to 8.0&amp;nbsp; version. The problem didnt solve.&amp;nbsp; Finally,&amp;nbsp;I upgrated from 8.0 to 8.1, but the problem didnt solve.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for answer.&lt;/P&gt;</description>
      <pubDate>Sun, 11 Mar 2018 20:08:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-inbound-decryption/m-p/204762#M60202</guid>
      <dc:creator>blabla</dc:creator>
      <dc:date>2018-03-11T20:08:50Z</dc:date>
    </item>
    <item>
      <title>Re: PA inbound decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-inbound-decryption/m-p/204763#M60203</link>
      <description>&lt;P&gt;After all upgrades i reimport my server certificate and private key.&lt;/P&gt;</description>
      <pubDate>Sun, 11 Mar 2018 20:16:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-inbound-decryption/m-p/204763#M60203</guid>
      <dc:creator>blabla</dc:creator>
      <dc:date>2018-03-11T20:16:20Z</dc:date>
    </item>
    <item>
      <title>Re: PA inbound decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-inbound-decryption/m-p/204767#M60205</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/84525"&gt;@blabla&lt;/a&gt;wrote:&lt;BR /&gt;&lt;P&gt;After all upgrades i reimport my server certificate and private key.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;And it still does not work right?&lt;/P&gt;</description>
      <pubDate>Sun, 11 Mar 2018 21:35:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-inbound-decryption/m-p/204767#M60205</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-03-11T21:35:39Z</dc:date>
    </item>
    <item>
      <title>Re: PA inbound decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-inbound-decryption/m-p/204769#M60207</link>
      <description>&lt;P&gt;Yes!&lt;/P&gt;</description>
      <pubDate>Sun, 11 Mar 2018 21:53:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-inbound-decryption/m-p/204769#M60207</guid>
      <dc:creator>blabla</dc:creator>
      <dc:date>2018-03-11T21:53:20Z</dc:date>
    </item>
    <item>
      <title>Re: PA inbound decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-inbound-decryption/m-p/207862#M60871</link>
      <description>&lt;P&gt;Solved!&lt;/P&gt;&lt;P&gt;Client (google smtp server) send certificate when my smtp server ask. &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;In this case inbound decryption not work!!!&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I disable postfix configuration option &lt;STRONG&gt;smtpd_tls_ask_ccert = no, &lt;/STRONG&gt;and fine work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Mar 2018 17:43:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-inbound-decryption/m-p/207862#M60871</guid>
      <dc:creator>blabla</dc:creator>
      <dc:date>2018-03-28T17:43:45Z</dc:date>
    </item>
  </channel>
</rss>

