<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL decryption troubleshooting - decrypt-cert-validation in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-troubleshooting-decrypt-cert-validation/m-p/232742#M66768</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/40971"&gt;@SShnap&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;The default list is generally refreshed during major software updates on the firewall. For the certificates that you have to manually upload on the firewall you essentially have to manage them; so updating them as they expire, deleting them when no longer needed, deleting any that you no longer considered a trusted source, all falls on you to manage.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 27 Sep 2018 15:51:06 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2018-09-27T15:51:06Z</dc:date>
    <item>
      <title>SSL decryption troubleshooting - decrypt-cert-validation</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-troubleshooting-decrypt-cert-validation/m-p/232591#M66717</link>
      <description>&lt;P&gt;I have been working with SSL decryption over 4 month on testing team.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Most of the traffic is OK but I see some of the traffic are being Aged-Out and some&amp;nbsp;and decrypt-cert-validation as the&amp;nbsp;session end reason.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tried to do packet capture without seeing the reason it being blocked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The end user receive the error:&amp;nbsp; "There is an issue with the SSL certificate of the server you are trying to contact."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The certificate on the original site look OK from comodo and it's valid and the sites are legit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope the screenshots from packet captuering will be helpful for discovering the problem.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2018_09_26_14_53_27_Certificate_Error.jpg" style="width: 740px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/16803i1D56317DE204449D/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2018_09_26_14_53_27_Certificate_Error.jpg" alt="2018_09_26_14_53_27_Certificate_Error.jpg" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2018-09-26 14_57_38-trs.pcap.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/16804i8A975B535F8AEF6A/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2018-09-26 14_57_38-trs.pcap.jpg" alt="2018-09-26 14_57_38-trs.pcap.jpg" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2018-09-26 14_56_41-rcv (2).pcap.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/16805iA268AFA1718E808F/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2018-09-26 14_56_41-rcv (2).pcap.jpg" alt="2018-09-26 14_56_41-rcv (2).pcap.jpg" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2018-09-26 14_55_59-fw (2).pcap.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/16806iFF31E5A4044CB0E2/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2018-09-26 14_55_59-fw (2).pcap.jpg" alt="2018-09-26 14_55_59-fw (2).pcap.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Sep 2018 22:01:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-troubleshooting-decrypt-cert-validation/m-p/232591#M66717</guid>
      <dc:creator>SShnap</dc:creator>
      <dc:date>2018-09-26T22:01:12Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption troubleshooting - decrypt-cert-validation</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-troubleshooting-decrypt-cert-validation/m-p/232626#M66726</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/40971"&gt;@SShnap&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;This is due to the firewall not trusting the entire certificate chain, or the site not presenting the entire certificate chain. If you look at the entire chain on a PC that is not being decrypted so that you can get the entire chain, then verify that the firewall actually trusts the Root and Intermidate CAs. If not, follow the instructions &lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/How-to-Import-the-Intermediate-CA-on-the-Firewall/ta-p/52196" target="_self"&gt;HERE&amp;nbsp;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Sep 2018 01:08:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-troubleshooting-decrypt-cert-validation/m-p/232626#M66726</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-09-27T01:08:02Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption troubleshooting - decrypt-cert-validation</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-troubleshooting-decrypt-cert-validation/m-p/232741#M66767</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;Thank you for the fast response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;when I saw the error I checked the COMODO cert in on Default Trusted Certificate Authorities list on the firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you it's working now.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you know if that list of Default Trusted Certificate Authorities get updated by Palo Alto? so in the future I will be able to remove the cert I added manually?&lt;/P&gt;</description>
      <pubDate>Thu, 27 Sep 2018 15:48:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-troubleshooting-decrypt-cert-validation/m-p/232741#M66767</guid>
      <dc:creator>SShnap</dc:creator>
      <dc:date>2018-09-27T15:48:01Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption troubleshooting - decrypt-cert-validation</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-troubleshooting-decrypt-cert-validation/m-p/232742#M66768</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/40971"&gt;@SShnap&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;The default list is generally refreshed during major software updates on the firewall. For the certificates that you have to manually upload on the firewall you essentially have to manage them; so updating them as they expire, deleting them when no longer needed, deleting any that you no longer considered a trusted source, all falls on you to manage.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Sep 2018 15:51:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-troubleshooting-decrypt-cert-validation/m-p/232742#M66768</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-09-27T15:51:06Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption troubleshooting - decrypt-cert-validation</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-troubleshooting-decrypt-cert-validation/m-p/232743#M66769</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp; So I need to downlaod from each well-known cert vendors and upload them the same way to avoid future ssl decryption failures like that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Sep 2018 15:54:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-troubleshooting-decrypt-cert-validation/m-p/232743#M66769</guid>
      <dc:creator>SShnap</dc:creator>
      <dc:date>2018-09-27T15:54:26Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption troubleshooting - decrypt-cert-validation</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-troubleshooting-decrypt-cert-validation/m-p/232774#M66778</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/40971"&gt;@SShnap&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I generally only recommend folks add the certificates they actually need. As you run into the issue then upload the cert and trust it.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Sep 2018 17:40:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-troubleshooting-decrypt-cert-validation/m-p/232774#M66778</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-09-27T17:40:11Z</dc:date>
    </item>
  </channel>
</rss>

