<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ssl inbound inspection in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/246116#M70106</link>
    <description>&lt;P&gt;Starting with PAN-OS 8.0, it supports inbound with DHE/ECDHE. See this in the new features guide:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-new-features/decryption-features/perfect-forward-secrecy-pfs-for-inbound-ssl-sessions" target="_blank"&gt;8.0 Inbound PFS&lt;/A&gt;&lt;/P&gt;&lt;P&gt;It is proxying the TLS traffic. That is the only way to decrypt DHE/ECDHE, since (by design of the exchange mechanism) it cannot be decrypted passively even with the private key.&lt;/P&gt;</description>
    <pubDate>Tue, 15 Jan 2019 16:52:02 GMT</pubDate>
    <dc:creator>gwesson</dc:creator>
    <dc:date>2019-01-15T16:52:02Z</dc:date>
    <item>
      <title>ssl inbound inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/246059#M70094</link>
      <description>&lt;P&gt;Hi community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will PA support inbound ispection if key exchnge mechanism is DHE/ECDHE ?.&lt;/P&gt;&lt;P&gt;i hope PA wont be proxying inbound SSL connection. whether PA changed this behaviour from any versions?&lt;/P&gt;&lt;P&gt;is there is a way to configure PA as proxy( we have server certificate/key installed in PA, only issue is PA resources. So if my website traffic is usually less, will i able to do proxying ?)&lt;/P&gt;&lt;P&gt;what if i need to do inbound decryption for servers using DHE ?&lt;/P&gt;&lt;P&gt;is it nessossary to change the behaviour in server that to use only RSA as key exchange ?&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jan 2019 13:13:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/246059#M70094</guid>
      <dc:creator>Abdul_Razaq</dc:creator>
      <dc:date>2019-01-15T13:13:05Z</dc:date>
    </item>
    <item>
      <title>Re: ssl inbound inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/246116#M70106</link>
      <description>&lt;P&gt;Starting with PAN-OS 8.0, it supports inbound with DHE/ECDHE. See this in the new features guide:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-new-features/decryption-features/perfect-forward-secrecy-pfs-for-inbound-ssl-sessions" target="_blank"&gt;8.0 Inbound PFS&lt;/A&gt;&lt;/P&gt;&lt;P&gt;It is proxying the TLS traffic. That is the only way to decrypt DHE/ECDHE, since (by design of the exchange mechanism) it cannot be decrypted passively even with the private key.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jan 2019 16:52:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/246116#M70106</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2019-01-15T16:52:02Z</dc:date>
    </item>
    <item>
      <title>Re: ssl inbound inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/246124#M70110</link>
      <description>Thanks gwesson&lt;BR /&gt;I am running 8.0.13 in my device, still i am getting decryption error. If PA is working as proxy, we should not get any unsupported parameter error as PA will be involved in selecting ciphersuit. I feel PA still trying to do decryption passively as i am getting parameter error, which contradicting PA document. do i need to enable it anywere? (i already selected all options in ssl protocole section). I understand if DHE is the key exchange, PA wont be able to see key as key is not shared as such, but end systems generate it with value exchange and math operations, PA should be proxy in this situation which is there in doc. Do i have an option to manually enable proxying?&lt;BR /&gt;</description>
      <pubDate>Tue, 15 Jan 2019 17:56:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/246124#M70110</guid>
      <dc:creator>Abdul_Razaq</dc:creator>
      <dc:date>2019-01-15T17:56:53Z</dc:date>
    </item>
    <item>
      <title>Re: ssl inbound inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/246173#M70122</link>
      <description>&lt;P&gt;&lt;FONT color="#339966"&gt;&amp;gt;&amp;nbsp;&lt;SPAN&gt;If PA is working as proxy, we should not get any unsupported parameter error as PA will be involved in selecting ciphersuit.&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Not quite right. The firewall supports a specific subset of ciphers, and if your client is only presenting non-matching ciphers you'll fail to establish the connection. The full list is here, with the ECDHE and DHE on the bottom:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/compatibility-matrix/supported-cipher-suites/cipher-suites-supported-in-pan-os-8-0/cipher-suites-supported-in-pan-os-8-0-decryption.html" target="_blank"&gt;https://docs.paloaltonetworks.com/compatibility-matrix/supported-cipher-suites/cipher-suites-supported-in-pan-os-8-0/cipher-suites-supported-in-pan-os-8-0-decryption.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You don't need to manually enable proxying, it's always a proxy. Starting in 8.0, both inbound and outbound is acting as a proxy.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I didn't see any specific error message in your original post, so I don't know what "parameter error" you're referring to, but the ciphers is typically the easiest to confirm.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If your site is public, you can use Qualys SSL scaner or even nmap to see what ciphers are supported.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jan 2019 23:31:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/246173#M70122</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2019-01-15T23:31:51Z</dc:date>
    </item>
    <item>
      <title>Re: ssl inbound inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/246218#M70134</link>
      <description>&lt;P&gt;Hi gwesson, appreciate your kind support.&lt;/P&gt;&lt;P&gt;without inbound decryption, client and server was aggying on&amp;nbsp;TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, which is supported in PanOS 8.0 ,&lt;/P&gt;&lt;P&gt;i am able to brows the website if i do a forward proxy( configured forward proxy from one internet ip to webserver for testing eventhough it is not the use of forward proxy), means there is atleast one matching ciphersuit in between client-PA and PA-server.&lt;/P&gt;&lt;P&gt;So i feel if PA was doing a inbound as a proxy as in the document, i wont face any issue. is there any known bug or something, which solved in later versions ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The following is the error PA sends to both server and client once he recieves server hello packet,&lt;/P&gt;&lt;P&gt;TLSv1.2 Record Layer: Alert (Level: Fatal, Description: Handshake Failure)&lt;BR /&gt;Content Type: Alert (21)&lt;BR /&gt;Version: TLS 1.2 (0x0303)&lt;BR /&gt;Length: 2&lt;BR /&gt;Alert Message&lt;BR /&gt;Level: Fatal (2)&lt;BR /&gt;Description: Handshake Failure (40)&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jan 2019 06:03:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/246218#M70134</guid>
      <dc:creator>Abdul_Razaq</dc:creator>
      <dc:date>2019-01-16T06:03:35Z</dc:date>
    </item>
    <item>
      <title>Re: ssl inbound inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/246316#M70155</link>
      <description>&lt;P&gt;A handshake failure is unfortunately very generic and doesn't explain *why* there was an error, just that there *was* an error. It's the nature of the encryption so there's not much you can typically learn from just that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You'll likely want to open a support ticket, as there may be more troubleshooting steps that can fork depending on some results. Generally, the times I see a handshake failure are:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- An unsupported cipher&lt;/P&gt;&lt;P&gt;- A blocked cipher (via the Decryption Profile)&lt;/P&gt;&lt;P&gt;- The server requires client certificate authentication&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But beyond those three, you'll probably want some official support in troubleshooting it.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jan 2019 17:46:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/246316#M70155</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2019-01-16T17:46:21Z</dc:date>
    </item>
    <item>
      <title>Re: ssl inbound inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/246530#M70187</link>
      <description>Thank gwesdon,&lt;BR /&gt;I really appreciate your help. I feel i am having little confution at how decryption profile works,&lt;BR /&gt;-what if PA finds that client and server agrees on a ciphersuit PA doest support, PA will put it no decrypt or block session ?(i didnt checke 'block unsupported ciphersuit' under ssl inbound.&lt;BR /&gt;-in my case if i select only 'DHE' in key echange, communication happens properly( i am not selected any blocking options under decryption profile inbound inspection) , is PA is actually decryptiong traffic?. Because in same profile if i just check 'block unsupported ciphersuit', communication fails. Which makes me feel like PA wont support on agreeying ciphersuit, and if that is the case PA wont be able to proxy and decrypt no?(but in Traffic field it shows decrypted), makes bit confusion about how this works.</description>
      <pubDate>Thu, 17 Jan 2019 19:03:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/246530#M70187</guid>
      <dc:creator>Abdul_Razaq</dc:creator>
      <dc:date>2019-01-17T19:03:20Z</dc:date>
    </item>
    <item>
      <title>Re: ssl inbound inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/246796#M70264</link>
      <description>&lt;P&gt;Added to above all,&lt;/P&gt;&lt;P&gt;i found that server was sending hello packet with '&lt;SPAN&gt;Master Secret Extension', 'ALPN' extentions enabled, upon checking some document, i am seeing&amp;nbsp;'Master Secret Extension' may cause decryption to break if proxied. is it the issue i am hitting on?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;is this solved in any of new versions( i am running 8.0.13 currently).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;i have seen that PA wont modify the client hello to allowed algorithms configured in decryption profile while i am doing ssl inbound inspection. But it does modify and delete unconfigured ciphersuits for forward proxy.. Is this intended behaviur ?..or is it a bug or MITM cannot modify hello if he is not doing proxy?.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks in advance.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jan 2019 08:34:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/246796#M70264</guid>
      <dc:creator>Abdul_Razaq</dc:creator>
      <dc:date>2019-01-22T08:34:34Z</dc:date>
    </item>
    <item>
      <title>Re: ssl inbound inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/249128#M70860</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/28203"&gt;@gwesson&lt;/a&gt;&amp;nbsp;,&amp;nbsp; Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I found the issue, as i was running PanOS 8.0.13, PA should be doing proxy,&lt;/P&gt;&lt;P&gt;The issue was, the web server was on windows 2016 and the default elliptic curve it was using was 25519, which i hope currently not supported by PA. post disabling/changing priority of curve, i am able to do inbound inspection successfully.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Feb 2019 05:27:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/249128#M70860</guid>
      <dc:creator>Abdul_Razaq</dc:creator>
      <dc:date>2019-02-07T05:27:01Z</dc:date>
    </item>
    <item>
      <title>Re: ssl inbound inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/321850#M82347</link>
      <description>&lt;P&gt;I am also facing SSL in bound decryption error . In Packet capture ''named Curve : x25519 is showing . When i have asked with Server team they are using default cipher suit in their windows server 2016 . Its mean default setting is using 25519 curve ? its need to be disabled from server end ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Right now any work around in Palo alto ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2020 11:39:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/321850#M82347</guid>
      <dc:creator>1LinkNetwork</dc:creator>
      <dc:date>2020-04-09T11:39:21Z</dc:date>
    </item>
    <item>
      <title>Re: ssl inbound inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/321851#M82348</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/117233"&gt;@1LinkNetwork&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looks like the issue is not addressed yet. What if you disable thee curve&amp;nbsp;&lt;SPAN&gt;25519 ? is it working ?. You can add 25519 as last in the sequence.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://docs.microsoft.com/en-us/powershell/module/tls/disable-tlsecccurve?view=win10-ps" target="_blank"&gt;https://docs.microsoft.com/en-us/powershell/module/tls/disable-tlsecccurve?view=win10-ps&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2020 11:54:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/321851#M82348</guid>
      <dc:creator>Abdul_Razaq</dc:creator>
      <dc:date>2020-04-09T11:54:16Z</dc:date>
    </item>
    <item>
      <title>Re: ssl inbound inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/408914#M92400</link>
      <description>&lt;P&gt;You may find the supported ECC curve in the below link.&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/compatibility-matrix/supported-cipher-suites/cipher-suites-supported-in-pan-os-10-0/cipher-suites-supported-in-pan-os-10-0-decryption.html#id11638f8b-8bc0-4189-800d-43f1567339b6_id17C8FH070PP" target="_blank"&gt;https://docs.paloaltonetworks.com/compatibility-matrix/supported-cipher-suites/cipher-suites-supported-in-pan-os-10-0/cipher-suites-supported-in-pan-os-10-0-decryption.html#id11638f8b-8bc0-4189-800d-43f1567339b6_id17C8FH070PP&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As of now 25519 is not supported and by default it is enabled in Windows 2016.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You may disable it in the server by using the below command.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/powershell/module/tls/disable-tlsecccurve?view=windowsserver2016-ps" target="_blank"&gt;https://docs.microsoft.com/en-us/powershell/module/tls/disable-tlsecccurve?view=windowsserver2016-ps&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 May 2021 09:30:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/408914#M92400</guid>
      <dc:creator>AnasIsmailKutty</dc:creator>
      <dc:date>2021-05-25T09:30:23Z</dc:date>
    </item>
  </channel>
</rss>

