<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ssl decrypt exempt and C2C in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decrypt-exempt-and-c2c/m-p/254348#M72184</link>
    <description>&lt;P&gt;thanks for great explanation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;one follow up is why PA can not block&amp;nbsp;&lt;SPAN&gt;example.com/malware?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;is this because PA can only see example.com in the certificate?&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 20 Mar 2019 03:27:26 GMT</pubDate>
    <dc:creator>MP18</dc:creator>
    <dc:date>2019-03-20T03:27:26Z</dc:date>
    <item>
      <title>ssl decrypt exempt and C2C</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decrypt-exempt-and-c2c/m-p/254329#M72177</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we need to do do ssl decrypt exempt for number of domains.&lt;BR /&gt;this we are doing as per vendor requirement so that application can run without ssl decrypt&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1&amp;gt;Need to know if traffic is not decrypted and end user pc gets infected&lt;BR /&gt;can c2c in url filtering profile can block this traffic?&lt;BR /&gt;we have action of c2c as block right now.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2&amp;gt;if for example the domain live.com is not decrypted and say&lt;BR /&gt;someone puts bad data in that domain example like gambling or malware etc&lt;/P&gt;&lt;P&gt;will PA url filtering block the gambling data if url filtering is set to block?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;if this pc gets infected will 2c block the in fected pc traffic back to internet?&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 00:07:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decrypt-exempt-and-c2c/m-p/254329#M72177</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2019-03-20T00:07:41Z</dc:date>
    </item>
    <item>
      <title>Re: ssl decrypt exempt and C2C</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decrypt-exempt-and-c2c/m-p/254338#M72180</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we need to do do ssl decrypt exempt for number of domains.&lt;BR /&gt;this we are doing as per vendor requirement so that application can run without ssl decrypt&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1&amp;gt;Need to know if traffic is not decrypted and end user pc gets infected&lt;BR /&gt;can c2c in url filtering profile can block this traffic?&lt;BR /&gt;we have action of c2c as block right now.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2&amp;gt;if for example the domain live.com is not decrypted and say&lt;BR /&gt;someone puts bad data in that domain example like gambling or malware etc&lt;/P&gt;&lt;P&gt;will PA url filtering block the gambling data if url filtering is set to block?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;if this pc gets infected will 2c block the in fected pc traffic back to internet?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;1) Only if the traffic can actually be identified via the information the firewall can see in a non-decrypted traffic session. So if example.com is labeled&amp;nbsp;as c2c then yes it will be blocked as even unencrypted traffic we can get the domain from the certificate.&amp;nbsp;&lt;/P&gt;&lt;P&gt;An example of where this wouldn't work is if example.com/malware was labeled&amp;nbsp;as c2c. The only thing the firewall can see with unencrypted traffic would be example.com, so you'd miss that one and the traffic would be allowed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) URL Filtering will only see live.com and not necessary&amp;nbsp;the content from anything actually served by the URL in question as it doesn't get the full path.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Essentially encrypted URL Filtering the firewall only has limited visability into the URL information. Usually only the server certificate that is passed to the client during the handshake is analyzed as that's the only visible part of the traffic. So while it would be able to see example.com, it wouldn't be able to see example.com/malware.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 02:28:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decrypt-exempt-and-c2c/m-p/254338#M72180</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-03-20T02:28:21Z</dc:date>
    </item>
    <item>
      <title>Re: ssl decrypt exempt and C2C</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decrypt-exempt-and-c2c/m-p/254340#M72182</link>
      <description>&lt;P&gt;Multiple points for consideration:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1.&lt;/P&gt;&lt;P&gt;Usually PA will block the URL you are planning to add in no decrypt policy if it marked as malicious/threat by URL database in PA FW. Moreover if a Company security policy allowing this which means its a allowed legitimate domain or unless some home grown application is cultured by your company for its customised testing and implementaion.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lets assume the Domain you are about to include in "no-decrypt" policy is not legitimate and somehow bypassed the access profiling of your network and HIPS and caused end device compromised.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now for any C2C operation, the malware will try to connect to public domain for further action at some stage. Their are multiple checks in place in PA FW when it comes network traffic profiling, DNS Sinkholing config is one of the example.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As long as necessary Virus, spyware, fileblocking and wildfire profiles are in place for the traffic reaching out to Internet and Saas/DC environment, it should be okay.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;PA FW will not block the URL "without decryption" provided:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-URL is not in block list in FW url database and is not reported malicious by Wildfire&lt;/P&gt;&lt;P&gt;-URL is not blocked in custom "BLACKLIST-URL" list&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Moreover any malicious site comes with some bad intention of malign purpose. Though the URL wont be dropped at PA firewall level but the moment this traffic decrypted at user computer, action will be blocked at that level depend upon the user action related to that site and security parameters in place.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 02:49:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decrypt-exempt-and-c2c/m-p/254340#M72182</guid>
      <dc:creator>atul.srivastava</dc:creator>
      <dc:date>2019-03-20T02:49:31Z</dc:date>
    </item>
    <item>
      <title>Re: ssl decrypt exempt and C2C</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decrypt-exempt-and-c2c/m-p/254348#M72184</link>
      <description>&lt;P&gt;thanks for great explanation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;one follow up is why PA can not block&amp;nbsp;&lt;SPAN&gt;example.com/malware?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;is this because PA can only see example.com in the certificate?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 03:27:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decrypt-exempt-and-c2c/m-p/254348#M72184</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2019-03-20T03:27:26Z</dc:date>
    </item>
    <item>
      <title>Re: ssl decrypt exempt and C2C</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decrypt-exempt-and-c2c/m-p/254356#M72186</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Correct, the handshake only exposes the server certificate, it does not expose the exact URL the endpoint is visiting.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 03:41:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decrypt-exempt-and-c2c/m-p/254356#M72186</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-03-20T03:41:55Z</dc:date>
    </item>
    <item>
      <title>Re: ssl decrypt exempt and C2C</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decrypt-exempt-and-c2c/m-p/254357#M72187</link>
      <description>&lt;P&gt;PA FW method of dealing any&amp;nbsp; packet is very impressive. The moment PA see the traffic as tunneled SSL traffic and found that Content inspection is not allowed(as no-decrypt is configured), it wont care the payload inside the establised encrypted SSL connection. From PA point of view, it just see the layer 3 and layer 4 information and not even care of the certificate since the client server authetication establishment is already done between client browser and the server hosting the webpage. The entire path is now encrypted between client machine and server. PA will check the server trusted digital signature and will take appropriate action if its performing SSL forwarding or SSL inbound inspection between Client and destination domain.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hence for your question, PA will only see IP address of&amp;nbsp;&lt;SPAN&gt;example.com in this case and nothing else. It can only see any extention if it can check the content.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 03:48:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decrypt-exempt-and-c2c/m-p/254357#M72187</guid>
      <dc:creator>atul.srivastava</dc:creator>
      <dc:date>2019-03-20T03:48:08Z</dc:date>
    </item>
  </channel>
</rss>

