<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS URL Filtering without decryption in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/https-url-filtering-without-decryption/m-p/229101#M65864</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/44973"&gt;@rjdahav163&lt;/a&gt;&lt;/P&gt;&lt;P&gt;The firewall only sees the full FQDN if the TLS handshake uses the SNI extension. In this extension the client tells the server where it connects to the exact FQDN so the server is able to choose the apropriate certificate to use for the connection (in case there are more than one websites with different names on the same server). If this SNI extension is not predent in the TLS handshake (probably the case with your application) then the firewall will use the CN of the certificate for URL filtering - and URL logs. Sometimes the CN matches the FQDN but not when the server uses a wildcard certificate - like in your example.&lt;/P&gt;</description>
    <pubDate>Sat, 01 Sep 2018 13:54:34 GMT</pubDate>
    <dc:creator>Remo</dc:creator>
    <dc:date>2018-09-01T13:54:34Z</dc:date>
    <item>
      <title>HTTPS URL Filtering without decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-url-filtering-without-decryption/m-p/228518#M65689</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to implement URL Filtering for HTTPS websites but without decryption. I found a post on how to deliver response pages to Users. (&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Serve-a-URL-Response-Page-Over-an-HTTPS-Session-Without/ta-p/55998" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Serve-a-URL-Response-Page-Over-an-HTTPS-Session-Without/ta-p/55998&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The URL Filtering is working for me but I dont understand the flow. What is the Firewall exactly doing?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Is forward trust certificate used to read the HTTPS header?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. We dont have any decryption profiles. Is any kind of decryption happening?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. The URL Filtering works if the user is using a browser to open an application. But when the user uses an application to access a URL then the connection fails. Any ideas what could be going wrong here?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;RJ&lt;/P&gt;</description>
      <pubDate>Tue, 28 Aug 2018 10:24:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-url-filtering-without-decryption/m-p/228518#M65689</guid>
      <dc:creator>rjdahav163</dc:creator>
      <dc:date>2018-08-28T10:24:10Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS URL Filtering without decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-url-filtering-without-decryption/m-p/228601#M65704</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;When you are not decrypting https traffic, the firewall is only reading the headers. The headers in ssl traffic are not encrypted and only contain info such as source and destination. The payload of the packet is the part that is encrypted.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Aug 2018 16:54:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-url-filtering-without-decryption/m-p/228601#M65704</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-08-28T16:54:16Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS URL Filtering without decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-url-filtering-without-decryption/m-p/228605#M65705</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/44973"&gt;@rjdahav163&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;1. Is forward trust certificate used to read the HTTPS header?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;No, as &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;already wrote, the headers are sent in cleartext so the firewall can simply read them without any additional steps. In these headers (-&amp;gt;TLS handshake) the client also sends the fqdn where it wants to connect to so the firewall is able to see the URL without decrypting the traffic and apply the configured URL filtering rules.&lt;/P&gt;&lt;P&gt;The forward trust certificate is (in your case without TLS decryption) used to dynamically generate certificates for the domains where the client tries to connect to. This generation the firewall does only for domains that are set to block/continue or for all domains where a response page is required. And this generation is required to properly present this repsonse page to the user as the firewall cannot inject the response page into the http connection without decryption so it has to do it this way.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/44973"&gt;@rjdahav163&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;2. We dont have any decryption profiles. Is any kind of decryption happening?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;No, there is no decryption of actual usertraffic happening.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/44973"&gt;@rjdahav163&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;3. The URL Filtering works if the user is using a browser to open an application. But when the user uses an application to access a URL then the connection fails. Any ideas what could be going wrong here?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Is the application connecting to an URL that is blocked?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Aug 2018 17:29:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-url-filtering-without-decryption/m-p/228605#M65705</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-08-28T17:29:02Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS URL Filtering without decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-url-filtering-without-decryption/m-p/228697#M65746</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;!! Your answers are just what I was looking for.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As far as No. 3 goes, when we access the URL for example, &lt;STRONG&gt;abc.def.com&lt;/STRONG&gt; then in the URL logging we see&amp;nbsp;&lt;STRONG&gt;abc.def.com.&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;But when the user access it using his application we see *&lt;STRONG&gt;.def.com&amp;nbsp;&lt;/STRONG&gt;in the URL filtering logs. The application logs say that the connection is being initiated to&amp;nbsp;&lt;STRONG&gt;abc.def.com.&amp;nbsp;&lt;/STRONG&gt; But something is fishy I guess in the application. It is trying to connect to *&lt;STRONG&gt;.def.com&amp;nbsp;&lt;/STRONG&gt;somehow but we are not seeing it in logs. Probably wireshark will help.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Aug 2018 08:49:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-url-filtering-without-decryption/m-p/228697#M65746</guid>
      <dc:creator>rjdahav163</dc:creator>
      <dc:date>2018-08-29T08:49:05Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS URL Filtering without decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-url-filtering-without-decryption/m-p/229101#M65864</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/44973"&gt;@rjdahav163&lt;/a&gt;&lt;/P&gt;&lt;P&gt;The firewall only sees the full FQDN if the TLS handshake uses the SNI extension. In this extension the client tells the server where it connects to the exact FQDN so the server is able to choose the apropriate certificate to use for the connection (in case there are more than one websites with different names on the same server). If this SNI extension is not predent in the TLS handshake (probably the case with your application) then the firewall will use the CN of the certificate for URL filtering - and URL logs. Sometimes the CN matches the FQDN but not when the server uses a wildcard certificate - like in your example.&lt;/P&gt;</description>
      <pubDate>Sat, 01 Sep 2018 13:54:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-url-filtering-without-decryption/m-p/229101#M65864</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-09-01T13:54:34Z</dc:date>
    </item>
  </channel>
</rss>

