<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Chrome Quic SSL proxy / deep inspection in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/224779#M64515</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We block it without any issues. PAN also says block it:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In Security policy,&amp;nbsp;&lt;/SPAN&gt;&lt;A title="" href="https://live.paloaltonetworks.com/t5/Management-Articles/How-to-Block-QUIC-Protocol/ta-p/120207" target="_blank"&gt;block Quick UDP Internet Connections (QUIC) protocol&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;unless for business reasons, you want to allow encrypted browser traffic. Chrome and some other browsers establish sessions using QUIC instead of TLS/SSL, but QUIC uses proprietary encryption that the firewall can’t decrypt, so potentially dangerous traffic may enter the network as encrypted traffic. Blocking QUIC forces the browser to fall back to TLS/SSL and enables the firewall to decrypt the traffic.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/decryption/define-traffic-to-decrypt" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/decryption/define-traffic-to-decrypt&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 03 Aug 2018 19:55:45 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2018-08-03T19:55:45Z</dc:date>
    <item>
      <title>Chrome Quic SSL proxy / deep inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/224683#M64490</link>
      <description>&lt;P&gt;HI&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;WOndering when / if PA's will handle QUIC the same way it handles web-browsing / ssl ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;</description>
      <pubDate>Fri, 03 Aug 2018 03:09:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/224683#M64490</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2018-08-03T03:09:35Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome Quic SSL proxy / deep inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/224733#M64501</link>
      <description>&lt;P&gt;As far as I'm aware the PA can not decrypt QUIC. I have a Chrome group policy on my environement disabling QUIC in the browser and I block QUIC high up in my rules which would causes Chrome to fail back to SSL.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Aug 2018 15:25:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/224733#M64501</guid>
      <dc:creator>bbilut</dc:creator>
      <dc:date>2018-08-03T15:25:20Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome Quic SSL proxy / deep inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/224750#M64506</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/62286"&gt;@Alex_Samad&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;There are technical limitations in decrypting QUIC traffic due to the use of multiplexed connections and proprietery encryption methods. Visibility into this traffic is therefore limited and does not allow the firewall to decrypt this traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;My suggestion would be to block QUIC if you need visibility into the traffic. Since QUIC is still technically in development it would additionally be recommend that you create one rule that blocks application 'quic' on service 'application-default'; and then block udp-443 and udp-80 depending on your requirements. If Google updates QUIC it may be that the app-id drops back to unknown-udp, depending on your logging/security requirements this may/maynot be acceptable to you.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Aug 2018 15:53:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/224750#M64506</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-08-03T15:53:55Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome Quic SSL proxy / deep inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/224779#M64515</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We block it without any issues. PAN also says block it:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In Security policy,&amp;nbsp;&lt;/SPAN&gt;&lt;A title="" href="https://live.paloaltonetworks.com/t5/Management-Articles/How-to-Block-QUIC-Protocol/ta-p/120207" target="_blank"&gt;block Quick UDP Internet Connections (QUIC) protocol&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;unless for business reasons, you want to allow encrypted browser traffic. Chrome and some other browsers establish sessions using QUIC instead of TLS/SSL, but QUIC uses proprietary encryption that the firewall can’t decrypt, so potentially dangerous traffic may enter the network as encrypted traffic. Blocking QUIC forces the browser to fall back to TLS/SSL and enables the firewall to decrypt the traffic.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/decryption/define-traffic-to-decrypt" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/decryption/define-traffic-to-decrypt&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Aug 2018 19:55:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/224779#M64515</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-08-03T19:55:45Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome Quic SSL proxy / deep inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/224783#M64518</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes I know that, but i would have presumed over this time PA might have spent some time to do inspection. Its an open spec ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;</description>
      <pubDate>Fri, 03 Aug 2018 20:49:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/224783#M64518</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2018-08-03T20:49:20Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome Quic SSL proxy / deep inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/224815#M64529</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/62286"&gt;@Alex_Samad&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Last I looked at the protocol in depth the encryption method Google was using was still proprietary.&lt;/P&gt;</description>
      <pubDate>Sun, 05 Aug 2018 20:21:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/224815#M64529</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-08-05T20:21:08Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome Quic SSL proxy / deep inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/224829#M64536</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/62286"&gt;@Alex_Samad&lt;/a&gt;&lt;/P&gt;&lt;P&gt;For PaloAlto it is probably not worth spending money/time on something that&amp;nbsp;&lt;A href="https://w3techs.com/technologies/overview/site_element/all" target="_blank"&gt;1% of webservers use&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 05 Aug 2018 21:52:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/224829#M64536</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-08-05T21:52:32Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome Quic SSL proxy / deep inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/224830#M64537</link>
      <description>&lt;P&gt;I would have thought PA and google would have some sort of working relationship.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Guess it would be in googles interest as well. otherwise sys admins like me are just going to block it..&lt;/P&gt;</description>
      <pubDate>Sun, 05 Aug 2018 21:56:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/224830#M64537</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2018-08-05T21:56:12Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome Quic SSL proxy / deep inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/224831#M64538</link>
      <description>&lt;P&gt;If/when it becomes more main stream wouldn't it be rather late.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I get the impression PA haven't taken a rather big bit of the pie and some rather basic things have been forgotten. Not this, but have you triee renewing a cert with altname attributes - doesn't work in PA, the PA's drop the alt attributes. Not a main thing but a rather silly thing to forget to do and I am told its not a trival thing to fix for PA ... sigh ....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If it speeds up browsing when will it go from 1% to ...&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 05 Aug 2018 21:58:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/224831#M64538</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2018-08-05T21:58:34Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome Quic SSL proxy / deep inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/224832#M64539</link>
      <description>&lt;P&gt;I agree with the point about some (basic) things. Some of them are silly bugs and some of them features that would be nice.&amp;nbsp;&lt;/P&gt;&lt;P&gt;PA and Gpogle have some sort relationship with the deployment of paloalto firewalls in the google cloud, but with Quic I think Google simply does not really care. Their goal is to make browsing fast and secure. A Man-in-the-middle per definition isn't that &lt;span class="lia-unicode-emoji" title=":face_with_tongue:"&gt;😛&lt;/span&gt;&lt;/P&gt;&lt;P&gt;But about Quic itself, I personally don't think this will rapidly grow (it made 0.2% in the last 8 months). Yes, quic does speed up browsing and adds also some other features, but almost the same you will get with http/2 (official benchmarks show that browsing with http/2 AND TLS encryption is faster than http 1.1 without encryption). And http/2 is already at 28.9%.&lt;/P&gt;&lt;P&gt;One really big thing(/problem) for Paloalto will be TLS1.3 ...&lt;/P&gt;</description>
      <pubDate>Sun, 05 Aug 2018 23:12:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/224832#M64539</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-08-05T23:12:02Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome Quic SSL proxy / deep inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/329218#M83595</link>
      <description>&lt;P&gt;Ok so what now that HTTP3 is based on QUIC?&lt;/P&gt;</description>
      <pubDate>Thu, 21 May 2020 15:21:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/329218#M83595</guid>
      <dc:creator>TyronF</dc:creator>
      <dc:date>2020-05-21T15:21:18Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome Quic SSL proxy / deep inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/507019#M105699</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nowadays, HTTP/3 is&amp;nbsp;announced which&amp;nbsp;&lt;SPAN&gt;runs over QUIC and&amp;nbsp;according to W3Techs HTTP/3 is used by 25.1% of all the websites. (on 29-Jun-22, &lt;A href="https://w3techs.com/technologies/details/ce-http3" target="_blank"&gt;https://w3techs.com/technologies/details/ce-http3&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I would like to know that is HTTP/3 supported such as&amp;nbsp;&lt;/SPAN&gt;SSL Forward Proxy Mode&amp;nbsp;&lt;SPAN&gt;from Palo Alto firewall?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I cannot find any document mention HTTP/3 on Palo Alto Networks.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Since I found that some load balancer such as F5 already support HTTP/3 for load balancing. I think it is similar principle&amp;nbsp;for&amp;nbsp;SSL Forward Proxy?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://support.f5.com/csp/article/K05822509" target="_blank"&gt;https://support.f5.com/csp/article/K05822509&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;QUIC has a "connection ID" instead of traditional IP address used for load balancing&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Furthermore, cloudflare also claim that it support HTTP/3 inspection&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://blog.cloudflare.com/cloudflare-gateway-http3-inspection/" target="_blank"&gt;https://blog.cloudflare.com/cloudflare-gateway-http3-inspection/&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2022 10:30:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/507019#M105699</guid>
      <dc:creator>JoeKwok</dc:creator>
      <dc:date>2022-06-29T10:30:10Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome Quic SSL proxy / deep inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/563457#M114106</link>
      <description>&lt;P&gt;I see how quic has it's used case in the finical, social media, or anywhere privacy is a concern. People would only want to use TLS1.3 for this reason alone.&lt;/P&gt;
&lt;P&gt;Gov agency may stick to TLS1.2 until it's deprecated , but that's not something around the corner.&lt;/P&gt;
&lt;P&gt;Although there is the question of the free world vs the big brother, and that's why I see how quic can become the norm and will take over quickly than anticipated not just for mobility, fast browsing and communication but mainly for protecting users privacy.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 28 Oct 2023 19:54:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/chrome-quic-ssl-proxy-deep-inspection/m-p/563457#M114106</guid>
      <dc:creator>Ahmed_K</dc:creator>
      <dc:date>2023-10-28T19:54:39Z</dc:date>
    </item>
  </channel>
</rss>

