<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic URL Filtering - TLS 1.3 Website in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-tls-1-3-website/m-p/244821#M69839</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am new to Palo Alto Firewalls and am in the middle of testing some of the functionalities provided. One of which is URL Filtering.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been able to clone the default URL Filtering Profile. I then added a website to the blocked list. Then assigned the profile to a security policy. And it worked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I found this knowledge base article confirming URL for HTTPS is determind by checking certificate:&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRZCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRZCA0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;"For HTTPS traffic, since this protocol is being encrypted, the firewall usually looks at data inside the Server Certificate that is presented to the client during the SSL handshake. In the case of decryption, this traffic will be treated as normal HTTP traffic when it comes to identifying the category."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why are URLs for TLS 1.3 recognized? With TLS 1.3&amp;nbsp; (as far as I understand) the certificate itself is not transferred in plain text anymore?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Happy to hear from you guys soon,&lt;BR /&gt;Regards Eve&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 04 Jan 2019 13:59:43 GMT</pubDate>
    <dc:creator>tpmeier</dc:creator>
    <dc:date>2019-01-04T13:59:43Z</dc:date>
    <item>
      <title>URL Filtering - TLS 1.3 Website</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-tls-1-3-website/m-p/244821#M69839</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am new to Palo Alto Firewalls and am in the middle of testing some of the functionalities provided. One of which is URL Filtering.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been able to clone the default URL Filtering Profile. I then added a website to the blocked list. Then assigned the profile to a security policy. And it worked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I found this knowledge base article confirming URL for HTTPS is determind by checking certificate:&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRZCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRZCA0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;"For HTTPS traffic, since this protocol is being encrypted, the firewall usually looks at data inside the Server Certificate that is presented to the client during the SSL handshake. In the case of decryption, this traffic will be treated as normal HTTP traffic when it comes to identifying the category."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why are URLs for TLS 1.3 recognized? With TLS 1.3&amp;nbsp; (as far as I understand) the certificate itself is not transferred in plain text anymore?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Happy to hear from you guys soon,&lt;BR /&gt;Regards Eve&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jan 2019 13:59:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-tls-1-3-website/m-p/244821#M69839</guid>
      <dc:creator>tpmeier</dc:creator>
      <dc:date>2019-01-04T13:59:43Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering - TLS 1.3 Website</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-tls-1-3-website/m-p/244931#M69855</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/99633"&gt;@tpmeier&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The firewall does not only check the certificate in TLS connections for URL filtering - it also (or primary) uses the SNI extension (server name indication) in a TLS handshake. This extension contains the fqdn in cleartext - als in TLS1.3 connections (even though starting with TLS1.3 it is possible to encrypt this value with additional config steps).&lt;/P&gt;&lt;P&gt;That's the reason why URL filtering still works for a lot of websites that use TLS1.3.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Remo&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jan 2019 18:32:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-tls-1-3-website/m-p/244931#M69855</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2019-01-04T18:32:54Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering - TLS 1.3 Website</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-tls-1-3-website/m-p/531657#M109645</link>
      <description>&lt;P&gt;Vsys_remo is correct. Here are the three relevant points from this kb with title "&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PObsCAG&amp;amp;lang=en_US%E2%80%A9&amp;amp;refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail" target="_self"&gt;HOW TO IDENTIFY URL INFORMATION ON SSL TRAFFIC WITHOUT DECRYPTION&lt;/A&gt;":&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The SNI is used for URL categorization when SSL decryption is not enabled.&lt;/LI&gt;
&lt;LI&gt;If the client does not send the SNI, then the &amp;nbsp;Common Name (CN) which represents the server name protected by the SSL certificate &amp;nbsp;is used for URL categorization.&lt;/LI&gt;
&lt;LI&gt;Putting the hostname of the web server in the allow or block list of a URL filtering profile will essentially accomplish the same goal as using the CN to enforce policy.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Sun, 19 Feb 2023 12:39:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-tls-1-3-website/m-p/531657#M109645</guid>
      <dc:creator>RizwanJamil</dc:creator>
      <dc:date>2023-02-19T12:39:45Z</dc:date>
    </item>
  </channel>
</rss>

