<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How does SSL inbound decryption work exactly? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-does-ssl-inbound-decryption-work-exactly/m-p/888#M684</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From &lt;A __default_attr="2401" __jive_macro_name="document" class="jive_macro jive_macro_document" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt; -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;No decrypt where diffie hellman is used in the key establishment&lt;/STRONG&gt;, so I think you are right.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 21 Jun 2013 07:45:31 GMT</pubDate>
    <dc:creator>Jia</dc:creator>
    <dc:date>2013-06-21T07:45:31Z</dc:date>
    <item>
      <title>How does SSL inbound decryption work exactly?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-does-ssl-inbound-decryption-work-exactly/m-p/881#M677</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not looking for a guide on how to configure it, there are plenty. What I want to know is how SSL inbound decryption works from an architectural point of view. In the docs it says that once you loaded the webserver's certificate onto the PAN device and enable inbound decryption, the traffic between client and server remains untouched. How is this done? Is the PAN working like a reverse proxy, e.g. the client connection is actually terminated on the PAN firewall and not the webserver behind it?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jun 2013 19:29:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-does-ssl-inbound-decryption-work-exactly/m-p/881#M677</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-06-19T19:29:56Z</dc:date>
    </item>
    <item>
      <title>Re: How does SSL inbound decryption work exactly?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-does-ssl-inbound-decryption-work-exactly/m-p/882#M678</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Cryptochrome,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its very intelligent question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Topology:&lt;/P&gt;&lt;P&gt;Server-------PAN------Internet----Client&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Digital certificate exported from Server is Imported on PAN, which means PAN and server have same certificate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client generate connection with Server, now PAN can intercept each and every packet. PAN has digital certificate of Servers, so it can read everything which server can.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if you need more information on this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jun 2013 01:53:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-does-ssl-inbound-decryption-work-exactly/m-p/882#M678</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2013-06-20T01:53:51Z</dc:date>
    </item>
    <item>
      <title>Re: How does SSL inbound decryption work exactly?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-does-ssl-inbound-decryption-work-exactly/m-p/883#M679</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Isnt Diffie-Hellman supposed to block such eavesdropping even if the attacker has the private key of the server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The inbound decryption is like if you take a tcpdump of the traffic into a pcap file and load that into wireshark while you give the private key to the wireshark aswell. Unless DH is being used the wireshark will be able to decrypt the traffic. Same goes with PA which then can apply IPS filtering, logging etc on the decrypted traffic and if something bad is found it can block the session.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As already mentioned the client will have its ssl session straight to the server (and by that also be able to use client certs etc) - compared to when ssl-proxy is being used in PA which will have one ssl session between client and PA and another ssl session between PA and server (ssl-proxy wont work with client certs).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jun 2013 05:58:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-does-ssl-inbound-decryption-work-exactly/m-p/883#M679</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-06-20T05:58:00Z</dc:date>
    </item>
    <item>
      <title>Re: How does SSL inbound decryption work exactly?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-does-ssl-inbound-decryption-work-exactly/m-p/884#M680</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;in fact between client and server only one session key is used.&lt;/P&gt;&lt;P&gt;and the private key have yo be present on the firewall that allow it to decrypt packets on the flow and the firewall decide to forward packet base on security profile that authorise the traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no decryption and reencryption on the fly but only decryption! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jun 2013 06:59:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-does-ssl-inbound-decryption-work-exactly/m-p/884#M680</guid>
      <dc:creator>Gregoux</dc:creator>
      <dc:date>2013-06-20T06:59:19Z</dc:date>
    </item>
    <item>
      <title>Re: How does SSL inbound decryption work exactly?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-does-ssl-inbound-decryption-work-exactly/m-p/885#M681</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks all. Makes sense. Interesting point about Diffie-Hellman though! &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jun 2013 07:52:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-does-ssl-inbound-decryption-work-exactly/m-p/885#M681</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-06-20T07:52:27Z</dc:date>
    </item>
    <item>
      <title>Re: How does SSL inbound decryption work exactly?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-does-ssl-inbound-decryption-work-exactly/m-p/886#M682</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Its often said that when using Diffie-Hellman for the sessionkey exchange the attacker must have access to the RAM contents in order to break that (well sort of &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone with a bit more knowledge of DH which could confirm my assumption that ssl inbound decryption wont work if the server uses DH?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jun 2013 08:23:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-does-ssl-inbound-decryption-work-exactly/m-p/886#M682</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-06-20T08:23:07Z</dc:date>
    </item>
    <item>
      <title>Re: How does SSL inbound decryption work exactly?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-does-ssl-inbound-decryption-work-exactly/m-p/887#M683</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you right &lt;/P&gt;&lt;P&gt;A DH key exchange is by design resistant to eavesdropping, although can be susceptible to a man-in-the-middle attack unless both parties identify themselves with certificates. It’s also, as we’ve seen, not universally supported by common SSL clients. But at least it rules out the possibility of some wiseguy with Wireshark sticking his fins where they’re not wanted!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but When you create your RSA key you need to precise the cipher that use the DH and it not used as default.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jun 2013 10:29:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-does-ssl-inbound-decryption-work-exactly/m-p/887#M683</guid>
      <dc:creator>Gregoux</dc:creator>
      <dc:date>2013-06-20T10:29:20Z</dc:date>
    </item>
    <item>
      <title>Re: How does SSL inbound decryption work exactly?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-does-ssl-inbound-decryption-work-exactly/m-p/888#M684</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From &lt;A __default_attr="2401" __jive_macro_name="document" class="jive_macro jive_macro_document" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt; -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;No decrypt where diffie hellman is used in the key establishment&lt;/STRONG&gt;, so I think you are right.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Jun 2013 07:45:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-does-ssl-inbound-decryption-work-exactly/m-p/888#M684</guid>
      <dc:creator>Jia</dc:creator>
      <dc:date>2013-06-21T07:45:31Z</dc:date>
    </item>
  </channel>
</rss>

