<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Data filter with SSH proxy decryption in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/data-filter-with-ssh-proxy-decryption/m-p/9591#M7025</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am use to Bitvise SSH Server.(Personal version)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and I don't know;;&lt;/P&gt;&lt;P&gt;SSH Server is being normally&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SSH2 is right;;&lt;/P&gt;&lt;P&gt;maybe It seems that Supported ciphers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Supported ciphers&lt;/P&gt;&lt;P&gt;AES128 CTR, AES196 CTR, AES256 CTR, AES128 CBC, AES192 CBC, AES256 CBC&lt;/P&gt;&lt;P&gt;Supported message authentication functions&lt;/P&gt;&lt;P&gt;HMAC-MD5, HMAC-SHA1, HMAC-MD5-96, HMAC-SHA1-96, HMAC-RIPEMD128, HMAC-RIPEMD160&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I red document SSH tunneling &lt;/P&gt;&lt;P&gt;Do ciphers relative ciphers?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 28 Oct 2013 08:09:56 GMT</pubDate>
    <dc:creator>SilverTiger</dc:creator>
    <dc:date>2013-10-28T08:09:56Z</dc:date>
    <item>
      <title>Data filter with SSH proxy decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/data-filter-with-ssh-proxy-decryption/m-p/9589#M7023</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So, I would like to be able to enforce file blocking between our external FTP,sftp,scp server that is published in our DMZ. Users coming into the DMZ are NAT'ed from a public IP space to 172.16.0.0/16 space. I have enabled SSH proxy decryption between the outside and the DMZ interfaces and traffic is being decrypted as shown by the traffic logs. I am not however, seeing any file identification occurring between the outside and the DMZ over SSH. I only see ftp file transfers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Is the SSH proxy decryption only used in application identification to identify SSH tunneling? and cant be used in file blocking rules?&lt;/LI&gt;&lt;LI&gt;Do I have my proxy in the wrong place? Should it be between the NAT and the host in the DMZ or between the NAT and the outside?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone have any insight?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2012 01:25:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/data-filter-with-ssh-proxy-decryption/m-p/9589#M7023</guid>
      <dc:creator>BrutalDismount</dc:creator>
      <dc:date>2012-08-22T01:25:58Z</dc:date>
    </item>
    <item>
      <title>Re: Data filter with SSH proxy decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/data-filter-with-ssh-proxy-decryption/m-p/9590#M7024</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Currently it is possible to tunnel other applications through SSH by enabling port forwarding on SSH. This can be considered a security risk because a user could potentially circumvent the application based security policies on the Paloalto device. &lt;BR /&gt;The Paloalto device is able to address this risk with the ssh proxy feature. Via a decryption policy,&amp;nbsp;&amp;nbsp;&amp;nbsp; you can configure the PA to decrypt a ssh session and if the users does any ssh port forwarding, remote forwarding or X11, the session will be determined to be ssh tunnel. In turn action can be taken on the ssh tunnel application according to the security policies.&lt;/P&gt;&lt;P&gt;It is important to note the following:&lt;/P&gt;&lt;P&gt;1. The same "man in the middle" method for SSL decryption is used for SSH proxy.&lt;BR /&gt;2. Also, currently the PA only supports SSH version 2.....(if the client only supports SSH version 1, when it receives the version string from the Paloalto device, it should exit).&lt;BR /&gt;3. Content and threat inspection is not done on the SSH Tunnel session. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jan 2013 01:05:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/data-filter-with-ssh-proxy-decryption/m-p/9590#M7024</guid>
      <dc:creator>swhyte</dc:creator>
      <dc:date>2013-01-17T01:05:18Z</dc:date>
    </item>
    <item>
      <title>Re: Data filter with SSH proxy decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/data-filter-with-ssh-proxy-decryption/m-p/9591#M7025</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am use to Bitvise SSH Server.(Personal version)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and I don't know;;&lt;/P&gt;&lt;P&gt;SSH Server is being normally&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SSH2 is right;;&lt;/P&gt;&lt;P&gt;maybe It seems that Supported ciphers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Supported ciphers&lt;/P&gt;&lt;P&gt;AES128 CTR, AES196 CTR, AES256 CTR, AES128 CBC, AES192 CBC, AES256 CBC&lt;/P&gt;&lt;P&gt;Supported message authentication functions&lt;/P&gt;&lt;P&gt;HMAC-MD5, HMAC-SHA1, HMAC-MD5-96, HMAC-SHA1-96, HMAC-RIPEMD128, HMAC-RIPEMD160&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I red document SSH tunneling &lt;/P&gt;&lt;P&gt;Do ciphers relative ciphers?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Oct 2013 08:09:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/data-filter-with-ssh-proxy-decryption/m-p/9591#M7025</guid>
      <dc:creator>SilverTiger</dc:creator>
      <dc:date>2013-10-28T08:09:56Z</dc:date>
    </item>
  </channel>
</rss>

