<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How are passwords and keys stored in PAN xml config files in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9301#M6808</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Given that PA recently got approved for various security oriented certificates I sure do hope this has been fixed or at least noted in these tests:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://researchcenter.paloaltonetworks.com/2013/06/usgv6-for-ipv6-common-criteria-eal-4-and-certifications-that-matter-for-cybersecurity/"&gt;http://researchcenter.paloaltonetworks.com/2013/06/usgv6-for-ipv6-common-criteria-eal-4-and-certifications-that-matter-for-cybersecurity/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://researchcenter.paloaltonetworks.com/2013/07/update-on-certifications-dept-of-defense-uc-apl/"&gt;http://researchcenter.paloaltonetworks.com/2013/07/update-on-certifications-dept-of-defense-uc-apl/&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 30 Aug 2013 21:39:44 GMT</pubDate>
    <dc:creator>mikand</dc:creator>
    <dc:date>2013-08-30T21:39:44Z</dc:date>
    <item>
      <title>How are passwords and keys stored in PAN xml config files</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9283#M6790</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are they hashed before storing them in the config files? By the looks of them, it seems like the PAN appliance is storing them in an encrypted format. If so, can they be decrypted?&lt;/P&gt;&lt;P&gt;For example, an OSPF key is stored as follows&lt;/P&gt;&lt;P&gt;"-AQ==xxxxxxxxxxxxx=xxxxxxxxxxxxx=="&lt;/P&gt;&lt;P&gt;This pattern can be observed in almost all of the keys/passwords stored in the XML config. Is there a way to decrypt these keys. I am particularly interested in the OSPF MD5 keys as I need to add new routers to our network but I don't know the key.&lt;/P&gt;&lt;P&gt;Has anyone successfully decrypted a PAN key?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Dec 2011 19:20:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9283#M6790</guid>
      <dc:creator>rajqfs</dc:creator>
      <dc:date>2011-12-12T19:20:28Z</dc:date>
    </item>
    <item>
      <title>Re: How are passwords and keys stored in PAN xml config files</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9284#M6791</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes the passwords are hashed on the config file. &lt;/P&gt;&lt;P&gt;I have not heard of any case where someone has every decrypted the password or keys.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is a password policy document that might assist with&amp;nbsp; your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Al&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="padding: 1px 0px 0px; height: 15px; font-size: 1.1111em; display: block; color: #555555;"&gt;&lt;A href="https://live.paloaltonetworks.com/message/7421#7421" style="text-decoration:none;color:#555555"&gt;Re: Password Policy&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV style="margin: 0px 0px 15px; padding: 2px; overflow: visible; clear: none; position: relative; width: 423px;"&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;This option is available by enabling FIPS mode (FIPS 140-2) on the FW, though the following options will also apply:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size:12pt"&gt;Federal Information Processing Standards Support:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;• To log into the firewall, the browser must be TLS 1.0 compatible.&lt;/P&gt;&lt;P&gt;• All passwords on the firewall must be at least six characters.&lt;/P&gt;&lt;P&gt;• Accounts are locked after the number of failed attempts that is configured on theDevice &amp;gt; Setup &amp;gt; Management page. If the firewall is not in FIPS mode, it can be configured so that it never locks out; however in FIPS mode, and lockout time is required.&lt;/P&gt;&lt;P&gt;• The firewall automatically determines the appropriate level of self-testing and enforces the appropriate level of strength in encryption algorithms and cipher suites.&lt;/P&gt;&lt;P&gt;• Non-FIPS approved algorithms are not decrypted and are thus ignored during decryption.&lt;/P&gt;&lt;P&gt;• When configuring IPSec, a subset of the normally available cipher suites is available.&lt;/P&gt;&lt;P&gt;• Self-generated and imported certificates must contain public keys that are 2048 bits (or more).&lt;/P&gt;&lt;P&gt;• The serial port is disabled.&lt;/P&gt;&lt;P&gt;• Telnet, TFTP, and HTTP management connections are unavailable.&lt;/P&gt;&lt;P&gt;• Surf control is not supported.&lt;/P&gt;&lt;P&gt;• High availability (HA) encryption is required.&lt;/P&gt;&lt;P&gt;• PAP authentication is disabled..&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Below is a Knowledgepoint Article regarding FIPS Mode:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1536" style="text-decoration:none;color:#355491;outline-style:none"&gt;https://live.paloaltonetworks.com/docs/DOC-1536&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;FIPS mode (enabling/details) can be referenced as well via your Admin Guide.&lt;/P&gt; &lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Dec 2011 18:57:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9284#M6791</guid>
      <dc:creator>acamacho</dc:creator>
      <dc:date>2011-12-15T18:57:19Z</dc:date>
    </item>
    <item>
      <title>Re: How are passwords and keys stored in PAN xml config files</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9285#M6792</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi. Thank you for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After going through the config files of different devices, I am pretty sure the passwords are not hashed but are encrypted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What we see in the configuration files are definitely not hashes. So the PAN device must be doing something behind the scenes to decrypt these when using them. The question is what encryption/decryption scheme is being used in this case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Dec 2011 19:02:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9285#M6792</guid>
      <dc:creator>rajqfs</dc:creator>
      <dc:date>2011-12-15T19:02:28Z</dc:date>
    </item>
    <item>
      <title>Re: How are passwords and keys stored in PAN xml config files</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9286#M6793</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PAN documentation seems to be clear about it : XML config stored "encrypted" passwords and private keys:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P style="color:#000000;font-family:'Tw Cen MT';font-size:18pt;font-weight:bold;margin-bottom:5pt;margin-left:0pt;margin-right:0pt;margin-top:22pt;vertical-align:baseline"&gt;&lt;A name="1539232"&gt;Encrypting Private Keys and Passwords on the Firewall&lt;/A&gt;&lt;/P&gt;
&lt;P style="color:#000000;font-family:'Microsoft Sans Serif';font-size:10pt;font-style:italic;font-weight:bold;margin-bottom:10pt;margin-left:0pt;margin-right:0pt;margin-top:0pt;vertical-align:baseline"&gt;*&lt;A name="1539247"&gt;Device &amp;gt; Master Key and Diagnostics&lt;/A&gt;&lt;/P&gt;
&lt;P style="color:#000000;font-family:'Microsoft Sans Serif';font-size:10pt;margin-bottom:7pt;margin-left:0pt;margin-right:0pt;margin-top:0pt;vertical-align:baseline"&gt;&lt;A name="1539291"&gt;Use the &lt;/A&gt;Master Key and Diagnostics page to specify a master key to encrypt private keys on the firewall. Private keys are stored in encrypted form by default even if a new master key is not specified.&lt;/P&gt;
&lt;P style="color:#000000;font-family:'Microsoft Sans Serif';font-size:2pt;font-weight:bold;line-height:2pt;margin-bottom:0pt;margin-left:0pt;margin-right:0pt;margin-top:0pt;padding-bottom:0pt;padding-left:0pc;padding-right:0pt;padding-top:0pt;vertical-align:baseline"&gt;&lt;A name="1539350"&gt; &lt;/A&gt;&lt;/P&gt;
&lt;TABLE cellspacing="0" id="1539292" style="margin-bottom: 12pt; margin-left: 0pt; margin-right: 0pt; margin-top: 10pt; color: #000000; font-family: 'Times New Roman'; font-size: medium; width: 415.64952000000005pt;"&gt;
&lt;CAPTION&gt;&lt;/CAPTION&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD id="tc1539299" style="border-bottom-color: #000000; border-bottom-style: solid; border-bottom-width: 1px; border-top-color: #000000; border-top-style: solid; border-top-width: thin; vertical-align: middle; width: 111.60648pt;"&gt;
&lt;P style="font-family:'Tw Cen MT';font-size:11pt;font-weight:bold;margin-bottom:0pt;margin-left:0pt;margin-right:0pt;margin-top:0pt;text-indent:0pt;vertical-align:baseline"&gt;&lt;A name="1539299"&gt;Field&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD id="tc1539301" style="border-bottom-color: #000000; border-bottom-style: solid; border-bottom-width: 1px; border-top-color: #000000; border-top-style: solid; border-top-width: thin; vertical-align: middle; width: 304.04304pt;"&gt;
&lt;P style="font-family:'Tw Cen MT';font-size:11pt;font-weight:bold;margin-bottom:0pt;margin-left:0pt;margin-right:0pt;margin-top:0pt;text-indent:0pt;vertical-align:baseline"&gt;&lt;A name="1539301"&gt;Description&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD id="tc1539303" style="border-bottom-color:black;border-bottom-style:solid;border-bottom-width:1pt;border-left-color:black;border-left-style:none;border-left-width:1px;border-right-color:black;border-right-style:none;border-right-width:1px;border-top-color:black;border-top-style:none;border-top-width:thin;vertical-align:top"&gt;
&lt;P style="border-bottom-color:white;border-left-color:white;border-right-color:white;border-top-color:white;font-family:'Microsoft Sans Serif';font-size:9pt;margin-bottom:3pt;margin-left:0pt;margin-right:0pt;margin-top:0pt;text-indent:0pt;vertical-align:baseline"&gt;&lt;A name="1539303"&gt;Master Key&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD id="tc1539305" style="border-bottom-color:black;border-bottom-style:solid;border-bottom-width:1pt;border-left-color:black;border-left-style:none;border-left-width:1px;border-right-color:black;border-right-style:none;border-right-width:1px;border-top-color:black;border-top-style:none;border-top-width:thin;vertical-align:top"&gt;
&lt;P style="border-bottom-color:white;border-left-color:white;border-right-color:white;border-top-color:white;font-family:'Microsoft Sans Serif';font-size:9pt;margin-bottom:3pt;margin-left:0pt;margin-right:0pt;margin-top:0pt;text-indent:0pt;vertical-align:baseline"&gt;&lt;A name="1539305"&gt;Specify the key that is currently used to encrypt all of the private keys and&lt;/A&gt;passwords on the firewall.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD id="tc1539716" style="border-bottom-color:black;border-bottom-style:solid;border-bottom-width:1pt;border-left-color:black;border-left-style:none;border-left-width:1px;border-right-color:black;border-right-style:none;border-right-width:1px;border-top-color:black;border-top-style:none;border-top-width:thin;vertical-align:top"&gt;
&lt;P style="border-bottom-color:white;border-left-color:white;border-right-color:white;border-top-color:white;font-family:'Microsoft Sans Serif';font-size:9pt;margin-bottom:3pt;margin-left:0pt;margin-right:0pt;margin-top:0pt;text-indent:0pt;vertical-align:baseline"&gt;&lt;A name="1539307"&gt;New Master Key&lt;/A&gt;&lt;/P&gt;
&lt;P style="border-bottom-color:white;border-left-color:white;border-right-color:white;border-top-color:white;font-family:'Microsoft Sans Serif';font-size:9pt;margin-bottom:3pt;margin-left:0pt;margin-right:0pt;margin-top:0pt;text-indent:0pt;vertical-align:baseline"&gt;&lt;A name="1539716"&gt;Confirm Master Key&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD id="tc1539309" style="border-bottom-color:black;border-bottom-style:solid;border-bottom-width:1pt;border-left-color:black;border-left-style:none;border-left-width:1px;border-right-color:black;border-right-style:none;border-right-width:1px;border-top-color:black;border-top-style:none;border-top-width:thin;vertical-align:top"&gt;
&lt;P style="border-bottom-color:white;border-left-color:white;border-right-color:white;border-top-color:white;font-family:'Microsoft Sans Serif';font-size:9pt;margin-bottom:3pt;margin-left:0pt;margin-right:0pt;margin-top:0pt;text-indent:0pt;vertical-align:baseline"&gt;&lt;A name="1539309"&gt;To change the master key, enter and confirm a new key.&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD id="tc1539315" style="border-bottom-color:black;border-bottom-style:solid;border-bottom-width:1pt;border-left-color:black;border-left-style:none;border-left-width:1px;border-right-color:black;border-right-style:none;border-right-width:1px;border-top-color:black;border-top-style:none;border-top-width:thin;vertical-align:top"&gt;
&lt;P style="border-bottom-color:white;border-left-color:white;border-right-color:white;border-top-color:white;font-family:'Microsoft Sans Serif';font-size:9pt;margin-bottom:3pt;margin-left:0pt;margin-right:0pt;margin-top:0pt;text-indent:0pt;vertical-align:baseline"&gt;&lt;A name="1539315"&gt;Life Time&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD id="tc1539317" style="border-bottom-color:black;border-bottom-style:solid;border-bottom-width:1pt;border-left-color:black;border-left-style:none;border-left-width:1px;border-right-color:black;border-right-style:none;border-right-width:1px;border-top-color:black;border-top-style:none;border-top-width:thin;vertical-align:top"&gt;
&lt;P style="border-bottom-color:white;border-left-color:white;border-right-color:white;border-top-color:white;font-family:'Microsoft Sans Serif';font-size:9pt;margin-bottom:3pt;margin-left:0pt;margin-right:0pt;margin-top:0pt;text-indent:0pt;vertical-align:baseline"&gt;&lt;A name="1539317"&gt;Specify the number of days and hours after which the master key expires.&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD id="tc1539319" style="border-bottom-color:black;border-bottom-style:solid;border-bottom-width:1pt;border-left-color:black;border-left-style:none;border-left-width:1px;border-right-color:black;border-right-style:none;border-right-width:1px;border-top-color:black;border-top-style:none;border-top-width:thin;vertical-align:top"&gt;
&lt;P style="border-bottom-color:white;border-left-color:white;border-right-color:white;border-top-color:white;font-family:'Microsoft Sans Serif';font-size:9pt;margin-bottom:3pt;margin-left:0pt;margin-right:0pt;margin-top:0pt;text-indent:0pt;vertical-align:baseline"&gt;&lt;A name="1539319"&gt;Time for Reminder&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD id="tc1539321" style="border-bottom-color:black;border-bottom-style:solid;border-bottom-width:1pt;border-left-color:black;border-left-style:none;border-left-width:1px;border-right-color:black;border-right-style:none;border-right-width:1px;border-top-color:black;border-top-style:none;border-top-width:thin;vertical-align:top"&gt;
&lt;P style="border-bottom-color:white;border-left-color:white;border-right-color:white;border-top-color:white;font-family:'Microsoft Sans Serif';font-size:9pt;margin-bottom:3pt;margin-left:0pt;margin-right:0pt;margin-top:0pt;text-indent:0pt;vertical-align:baseline"&gt;&lt;A name="1539321"&gt;Specify the number of days and hours before expiration when the user is&lt;/A&gt;notified of the impending expiration.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD id="tc1539323" style="border-bottom-color:black;border-bottom-style:solid;border-bottom-width:1pt;border-left-color:black;border-left-style:none;border-left-width:1px;border-right-color:black;border-right-style:none;border-right-width:1px;border-top-color:black;border-top-style:none;border-top-width:thin;vertical-align:top"&gt;
&lt;P style="border-bottom-color:white;border-left-color:white;border-right-color:white;border-top-color:white;font-family:'Microsoft Sans Serif';font-size:9pt;margin-bottom:3pt;margin-left:0pt;margin-right:0pt;margin-top:0pt;text-indent:0pt;vertical-align:baseline"&gt;&lt;A name="1539323"&gt;Common Criteria&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD id="tc1539325" style="border-bottom-color:black;border-bottom-style:solid;border-bottom-width:1pt;border-left-color:black;border-left-style:none;border-left-width:1px;border-right-color:black;border-right-style:none;border-right-width:1px;border-top-color:black;border-top-style:none;border-top-width:thin;vertical-align:top"&gt;
&lt;P style="border-bottom-color:white;border-left-color:white;border-right-color:white;border-top-color:white;font-family:'Microsoft Sans Serif';font-size:9pt;margin-bottom:3pt;margin-left:0pt;margin-right:0pt;margin-top:0pt;text-indent:0pt;vertical-align:baseline"&gt;&lt;A name="1539325"&gt;In Common Criteria mode, additional buttons are available to run a&lt;/A&gt;cryptographic algorithm self-test and software integrity self-test. A scheduler is also included to specify the times at which the two self-tests will run.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My understanding : PaloAlto is using some kind of secret passphrase that is used to encrypt passwords and private keys. If they are using right algorithms, it could be strong protection (AES-256 for example) as long as that passphrase doesn't get out of PA office or it's generated for each box out of factory. If you want extra security, go in Device -&amp;gt; Master Key and diagnostics and change the master key, but make sure you never loose that passphrase or you won't be able to restore from a cold backup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you create a case at PA support, you bring them your config XML or tech dump (which contains config). But they never ask you for a password to run their tests, 2 solutions : they change passwords in XML before importing, or they have default master key of all device they sell. I tend to believe second solution &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Dec 2011 10:31:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9286#M6793</guid>
      <dc:creator>essnet</dc:creator>
      <dc:date>2011-12-16T10:31:42Z</dc:date>
    </item>
    <item>
      <title>Re: How are passwords and keys stored in PAN xml config files</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9287#M6794</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you. This is what I was looking for. Let me see if I can find out what encryption scheme is being used in this case. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Dec 2011 16:11:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9287#M6794</guid>
      <dc:creator>rajqfs</dc:creator>
      <dc:date>2011-12-16T16:11:06Z</dc:date>
    </item>
    <item>
      <title>Re: How are passwords and keys stored in PAN xml config files</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9288#M6795</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would like it to be documented as well because I found something that disturbs me :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PaloAlto support interface is based on cloud Salesforce.com solution and all attachments to cases (config file and tech dumps for example) are stored on Amazon S3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It means that beside PaloAlto, SalesForce and Amazon employees may also have access to my configuration files which include some passwords and private keys (in addition of my filtering policies).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Dec 2011 16:14:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9288#M6795</guid>
      <dc:creator>essnet</dc:creator>
      <dc:date>2011-12-16T16:14:51Z</dc:date>
    </item>
    <item>
      <title>Re: How are passwords and keys stored in PAN xml config files</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9289#M6796</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can sanitize the files before shipping them to PAN.&amp;nbsp; I have not had any support problems caused by doing this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Dec 2011 16:59:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9289#M6796</guid>
      <dc:creator>holmesw</dc:creator>
      <dc:date>2011-12-20T16:59:24Z</dc:date>
    </item>
    <item>
      <title>Re: How are passwords and keys stored in PAN xml config files</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9290#M6797</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; what do you mean by "sanitize" ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Dec 2011 17:21:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9290#M6797</guid>
      <dc:creator>essnet</dc:creator>
      <dc:date>2011-12-20T17:21:51Z</dc:date>
    </item>
    <item>
      <title>Re: How are passwords and keys stored in PAN xml config files</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9291#M6798</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For sanitization, we use a sed script to remove the encryption strings and usernames from the XML configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;s/&amp;lt;phash&amp;gt;.*&amp;lt;\/phash&amp;gt;/&amp;lt;phash&amp;gt;xxxxxxxxxxxxxxxxxxxxxxxxxxx&amp;lt;\/phash&amp;gt;/&lt;BR /&gt;s/&amp;lt;secret&amp;gt;.*&amp;lt;\/secret&amp;gt;/&amp;lt;secret&amp;gt;xxxxxxxxxxxxxxxxxxxxxxxxxxx&amp;lt;\/secret&amp;gt;/&lt;BR /&gt;s/&amp;lt;key&amp;gt;.*&amp;lt;\/key&amp;gt;/&amp;lt;key&amp;gt;xxxxxxxxxxxxxxxxxxxxxxxxxxx&amp;lt;\/key&amp;gt;/&lt;BR /&gt;s/bubba/user1/&lt;BR /&gt;s/jimbob/user2/&lt;BR /&gt;s/pambob/user3/&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;...&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Dec 2011 19:11:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9291#M6798</guid>
      <dc:creator>holmesw</dc:creator>
      <dc:date>2011-12-20T19:11:02Z</dc:date>
    </item>
    <item>
      <title>Re: How are passwords and keys stored in PAN xml config files</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9292#M6799</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So what if you would want to add users via the XML rest API ?&lt;/P&gt;&lt;P&gt;Do you have to create the users with password in clear text or with the hashed password ? &lt;BR /&gt;If the answer is hashed-password, how could one generate this hash ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Dec 2011 09:02:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9292#M6799</guid>
      <dc:creator>Bart_Jocque</dc:creator>
      <dc:date>2011-12-26T09:02:37Z</dc:date>
    </item>
    <item>
      <title>Re: How are passwords and keys stored in PAN xml config files</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9293#M6800</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you remove private keys also ? I have many private keys here for SSL decryption and VPN.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Dec 2011 09:05:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9293#M6800</guid>
      <dc:creator>essnet</dc:creator>
      <dc:date>2011-12-26T09:05:01Z</dc:date>
    </item>
    <item>
      <title>Re: How are passwords and keys stored in PAN xml config files</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9294#M6801</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, we have removed the public and private keys.&amp;nbsp; These seem to be at the beginning of the XML configuration file and can be manually removed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Dec 2011 12:55:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9294#M6801</guid>
      <dc:creator>holmesw</dc:creator>
      <dc:date>2011-12-27T12:55:14Z</dc:date>
    </item>
    <item>
      <title>Re: How are passwords and keys stored in PAN xml config files</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9295#M6802</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;After some investigations, the techdump.tgz file seems to be cleaned of its passwords and private keys, so techdumps are not a threat. Just be careful when you export the config.xml , this one has them all.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Dec 2011 12:57:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9295#M6802</guid>
      <dc:creator>essnet</dc:creator>
      <dc:date>2011-12-27T12:57:34Z</dc:date>
    </item>
    <item>
      <title>Re: How are passwords and keys stored in PAN xml config files</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9296#M6803</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hashed password. You can use openssl passwd to compute the md5 phash.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Dec 2011 03:15:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9296#M6803</guid>
      <dc:creator>SRA</dc:creator>
      <dc:date>2011-12-29T03:15:09Z</dc:date>
    </item>
    <item>
      <title>Re: How are passwords and keys stored in PAN xml config files</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9297#M6804</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, administrator passwords for login to the firewall are hashed (looks like standard Linux/FreeBSD salted MD5), but what about passwords used externally? For example, the bind-password for LDAP or ActiveDirectory service accounts. Mine starts with &amp;lt;bind-password&amp;gt;-AQ==&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Dec 2011 03:58:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9297#M6804</guid>
      <dc:creator>rgraves</dc:creator>
      <dc:date>2011-12-29T03:58:17Z</dc:date>
    </item>
    <item>
      <title>Re: How are passwords and keys stored in PAN xml config files</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9298#M6805</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you can also use the 'request password-hash' operational mode CLI command.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Jan 2012 03:29:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9298#M6805</guid>
      <dc:creator>ksteves1</dc:creator>
      <dc:date>2012-01-03T03:29:23Z</dc:date>
    </item>
    <item>
      <title>Re: How are passwords and keys stored in PAN xml config files</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9299#M6806</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I also noticed that when I create users via the API in 4.1, I can send the passwords in clear. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Jan 2012 08:11:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9299#M6806</guid>
      <dc:creator>Bart_Jocque</dc:creator>
      <dc:date>2012-01-03T08:11:02Z</dc:date>
    </item>
    <item>
      <title>Re: How are passwords and keys stored in PAN xml config files</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9300#M6807</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;guys, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this still the case for 5.0.X PAs ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 21:33:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9300#M6807</guid>
      <dc:creator>IkramBaharum</dc:creator>
      <dc:date>2013-08-29T21:33:37Z</dc:date>
    </item>
    <item>
      <title>Re: How are passwords and keys stored in PAN xml config files</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9301#M6808</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Given that PA recently got approved for various security oriented certificates I sure do hope this has been fixed or at least noted in these tests:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://researchcenter.paloaltonetworks.com/2013/06/usgv6-for-ipv6-common-criteria-eal-4-and-certifications-that-matter-for-cybersecurity/"&gt;http://researchcenter.paloaltonetworks.com/2013/06/usgv6-for-ipv6-common-criteria-eal-4-and-certifications-that-matter-for-cybersecurity/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://researchcenter.paloaltonetworks.com/2013/07/update-on-certifications-dept-of-defense-uc-apl/"&gt;http://researchcenter.paloaltonetworks.com/2013/07/update-on-certifications-dept-of-defense-uc-apl/&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 21:39:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-are-passwords-and-keys-stored-in-pan-xml-config-files/m-p/9301#M6808</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-08-30T21:39:44Z</dc:date>
    </item>
  </channel>
</rss>

