<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TLS 1.3 support in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/251335#M71468</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/60153"&gt;@Jan_Linhart&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PA is doing proxy for DH/ECDH key exchange now also. so if you have a PanOS version supports TLS 1.3, things should work i feel.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have a trustable source which says 'Pan OS wont support decryption for TLS 1.3' ?.&lt;/P&gt;</description>
    <pubDate>Tue, 26 Feb 2019 13:13:32 GMT</pubDate>
    <dc:creator>Abdul_Razaq</dc:creator>
    <dc:date>2019-02-26T13:13:32Z</dc:date>
    <item>
      <title>TLS 1.3 support</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/251210#M71437</link>
      <description>&lt;P&gt;Hi everybody,&lt;/P&gt;&lt;P&gt;any news regarding change of decryption from passive to proxy mode to support TLS 1.3 decryption?&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Jan&lt;/P&gt;</description>
      <pubDate>Mon, 25 Feb 2019 20:13:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/251210#M71437</guid>
      <dc:creator>Jan_Linhart</dc:creator>
      <dc:date>2019-02-25T20:13:17Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.3 support</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/251306#M71457</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/60153"&gt;@Jan_Linhart&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is below document addresses your query?&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Customer-Advisories/Action-required-if-you-have-enabled-SSL-decryption-forward-proxy/ta-p/236596" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Customer-Advisories/Action-required-if-you-have-enabled-SSL-decryption-forward-proxy/ta-p/236596&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Added to above, As of my knowledge, PA will be doing proxy by default for all connections matching with forward proxy rule,&lt;/P&gt;&lt;P&gt;But inbound inspection is different, it was passive eveasdropping till PanOS 8.0, so if key exchange is DH/ECDH, the decryption fails before 8.0. But after 8.0 they changed the behaviour, so that PA will be active in MITM. if key exchange is RSA, PA wont be proxying the connection, but if key exchange is DH/ECDH, PA will involk the proxy module.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 07:40:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/251306#M71457</guid>
      <dc:creator>Abdul_Razaq</dc:creator>
      <dc:date>2019-02-26T07:40:14Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.3 support</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/251314#M71461</link>
      <description>&lt;P&gt;Hi Abdul,&lt;/P&gt;&lt;P&gt;unfortunately, there is no answer for my question. PAN-OS has support for TLS1.3 now, but not support for decryption.&lt;/P&gt;&lt;P&gt;Please look at this link:&lt;/P&gt;&lt;P&gt;&lt;A href="https://blog.gigamon.com/2018/05/10/tls-1-3-is-moving-forward-what-you-need-to-know-today-to-get-ready/" target="_blank"&gt;https://blog.gigamon.com/2018/05/10/tls-1-3-is-moving-forward-what-you-need-to-know-today-to-get-ready/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Most important part is:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;With TLS 1.3, this passive mode decryption (the one PANW is using - transparent for clients) will no longer be possible since the RSA key exchange has been removed.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Jan&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 09:05:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/251314#M71461</guid>
      <dc:creator>Jan_Linhart</dc:creator>
      <dc:date>2019-02-26T09:05:07Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.3 support</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/251335#M71468</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/60153"&gt;@Jan_Linhart&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PA is doing proxy for DH/ECDH key exchange now also. so if you have a PanOS version supports TLS 1.3, things should work i feel.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have a trustable source which says 'Pan OS wont support decryption for TLS 1.3' ?.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 13:13:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/251335#M71468</guid>
      <dc:creator>Abdul_Razaq</dc:creator>
      <dc:date>2019-02-26T13:13:32Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.3 support</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/251336#M71469</link>
      <description>&lt;P&gt;23.10.2018:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dear valued Palo Alto Networks customer,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please take the action recommended below if you have enabled SSL decryption forward proxy. This is required for users to access Gmail and other websites and applications using web browsers that implement strict TLS 1.3 compliance. We have been informed that Google Chrome is planning to implement strict TLS 1.3 compliance in their upcoming version 72. The stable build of Google Chrome version 72 may be available in January 2019, and if your users use a pre-stable build of Google Chrome, they will experience the issue outlined below earlier.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Applies to&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;All supported PAN-OS releases&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Action Required&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;If you run PAN-OS 8.1:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Upgrade to PAN-OS 8.1.4 (available now)&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Tue, 26 Feb 2019 13:24:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/251336#M71469</guid>
      <dc:creator>Chacko42</dc:creator>
      <dc:date>2019-02-26T13:24:54Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.3 support</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/251344#M71471</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/101029"&gt;@Abdul_Razaq&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/79934"&gt;@Chacko42&lt;/a&gt;&amp;nbsp; I think what&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/60153"&gt;@Jan_Linhart&lt;/a&gt;&amp;nbsp; is asking is not so much about the ability for PAN-OS to just merely support the protocol, but rather the ability to actually DECRYPT the TLS1.3 session.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think that it something that is being targeted for PAN-OS 9.1, but who knows if it'll actually make it in the release...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BTW this is another reason I bet Palo came out with the X2XX hardware.&amp;nbsp; I doubt the legacy HW would have been able to handle TLS1.3 decryption.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 13:39:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/251344#M71471</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2019-02-26T13:39:43Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.3 support</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/251348#M71473</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/101029"&gt;@Abdul_Razaq&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/60153"&gt;@Jan_Linhart&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have a trustable source which says 'Pan OS wont support decryption for TLS 1.3' ?.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yeah PAN-OS software itself.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Decrypt.png" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18873iF925D4A57F79E077/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Decrypt.png" alt="Decrypt.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 13:44:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/251348#M71473</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2019-02-26T13:44:24Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.3 support</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/251378#M71487</link>
      <description>&lt;P&gt;So it's important to note here the difference between supporting the protocol and actively being able to decrypt TLS 1.3.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Palo Alto has now added support for TLS1.3 and has made the required changes so that the firewall will no-longer attempt to decrypt TLS 1.3 traffic, which was causing issues for customers with decryption enabled running PAN-OS versions prior to 8.0.14 in the 8.0 code branch or 8.1.4 in the 8.1 code branch.&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;Palo Alto&amp;nbsp;&lt;STRONG&gt;can't&lt;/STRONG&gt; actually decrypt TLS1.3 traffic just yet and as&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;&amp;nbsp;mentioned it's something being targeted for a future update. Whether or not it actually makes it into 9.1 or not we'll have to wait and see.&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Tue, 26 Feb 2019 15:30:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/251378#M71487</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-02-26T15:30:25Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.3 support</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/251443#M71500</link>
      <description>&lt;P&gt;Hi guys,&amp;nbsp;&lt;/P&gt;&lt;P&gt;as you wrote before - I'm aware of protocol support, but I was asking about plans for decryption support. It is not going to be easy at all and PANW will have to completely change decryption concept from "passive" to real proxy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jan&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 20:14:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/251443#M71500</guid>
      <dc:creator>Jan_Linhart</dc:creator>
      <dc:date>2019-02-26T20:14:58Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.3 support</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/275325#M75263</link>
      <description>&lt;P&gt;ok, so did this one ever get answered?&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2019 14:02:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/275325#M75263</guid>
      <dc:creator>Sec101</dc:creator>
      <dc:date>2019-07-08T14:02:16Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.3 support</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/275552#M75280</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/59122"&gt;@Sec101&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;What exactly are you still wondering? The basis of this post still remains the same, PAN does not currently support the decryption of TLS1.3 traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jul 2019 14:20:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/275552#M75280</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-07-09T14:20:51Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.3 support</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/275586#M75284</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;-Thank you for the quick reponse.&amp;nbsp; &amp;nbsp;I didn't completely understand the fact that palo was supporting but not decrypting on this as of yet.&amp;nbsp; I think it was mentioned in this post, but I'm guessing most are eagerly awaiting hearing how this will work in the future, being transparent/explicit, or however it will work/if it will work...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From a pure security perspective, do you forsee more and more dependence on the endpoint logging and detection, and less and less from the firewall perspective moving forwared?&amp;nbsp; Without decryption, it seems like the ACC would be a block of SSL and dns.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jul 2019 16:08:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/275586#M75284</guid>
      <dc:creator>Sec101</dc:creator>
      <dc:date>2019-07-09T16:08:14Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.3 support</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/275588#M75285</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/59122"&gt;@Sec101&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I'm running under the assumption that there will be a break in time in which we need to follow current guidance and disable TLS1.3 on endpoints to ensure&amp;nbsp;it only utilizes something that can be decrypted.&amp;nbsp;&lt;/P&gt;&lt;P&gt;From a pure fundamental standpoint decrypting TLS1.3 doesn't actually change, it's still very possible. The ability to passively decrypt the connection with a private key however does. PAN just needs to make some adjustments to the way they are decrypting traffic and this will function from a firewall level perfectly fine. This is already targeted for a public release in 9.1 (that could get pushed back), so until the time comes that you can install whatever release TLS1.3 decryption is enabled in, simply force your clients to fall back to 1.2.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jul 2019 16:22:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/275588#M75285</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-07-09T16:22:15Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.3 support</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/282251#M76059</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11943"&gt;@kiwi&lt;/a&gt;&amp;nbsp;Can you post a statement to the current TLS 1.3 decryption situation?&lt;/P&gt;</description>
      <pubDate>Mon, 12 Aug 2019 09:24:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/282251#M76059</guid>
      <dc:creator>Chacko42</dc:creator>
      <dc:date>2019-08-12T09:24:33Z</dc:date>
    </item>
    <item>
      <title>Re: TLS 1.3 support</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/282306#M76070</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/79934"&gt;@Chacko42&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11943"&gt;@kiwi&lt;/a&gt;&amp;nbsp;Can you post a statement to the current TLS 1.3 decryption situation?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Nothing has changed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Support of decrypting TLS versions will only come in the release of new PAN-OS versions other than patch updates (so X.X).&amp;nbsp; It wasn't supported on 8.0.X, it's not supported on 8.1.X nor is it supported on 9.0.X.&amp;nbsp; The community is currently waiting on a public release as to if it'll be support in 9.1.X or if even somtime in a future release.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Aug 2019 15:08:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tls-1-3-support/m-p/282306#M76070</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2019-08-12T15:08:35Z</dc:date>
    </item>
  </channel>
</rss>

