<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Default Action for Revoked Certificates via OCSP and CRL in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/default-action-for-revoked-certificates-via-ocsp-and-crl/m-p/270278#M74707</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/24154"&gt;@dan731028&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately this is not possible to enable this in log-mode. But enabling this option does in all cases have a really low impact. Much more commonthan revoked certs are self signed certificates. This applies to the CRL option.&lt;/P&gt;&lt;P&gt;Enabling the OCSP option will almost for sure have a medium to high impact. This impact ist not because of blocked websites because of revoked certs, this impact will be about the performance when accessing normal websites. Thisnis because the firewall pretty often has to check the ocsp servers if the cert is still valid. This could dramatically increase page load times. Probably this depends on the hardware you are using. On a PA-3200 or 5200 series firewall it may be worth a try but do not enable the option an the 5000 and 3000 or lower series - this is my personal recommendation based on my experience and nothing official from PaloAlto.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Remo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 15 Jun 2019 21:08:57 GMT</pubDate>
    <dc:creator>Remo</dc:creator>
    <dc:date>2019-06-15T21:08:57Z</dc:date>
    <item>
      <title>Default Action for Revoked Certificates via OCSP and CRL</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/default-action-for-revoked-certificates-via-ocsp-and-crl/m-p/269676#M74647</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;When you enable OCSP and CRL revocation checking on the firewall, if a certificate is revoked the default behavior is to block the connection.&amp;nbsp; Is there any way to change that behavior so that maybe the revoked log is written in the system log, but still allow the browser to connect through.&amp;nbsp; I was hoping it would be as simple as allowing connections with timeout or status unknown, but doesn't appear to be the case.&amp;nbsp; We're trying to get an idea of impact on our environment before we just outright block these connections.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jun 2019 16:35:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/default-action-for-revoked-certificates-via-ocsp-and-crl/m-p/269676#M74647</guid>
      <dc:creator>dan731028</dc:creator>
      <dc:date>2019-06-13T16:35:02Z</dc:date>
    </item>
    <item>
      <title>Re: Default Action for Revoked Certificates via OCSP and CRL</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/default-action-for-revoked-certificates-via-ocsp-and-crl/m-p/270278#M74707</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/24154"&gt;@dan731028&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately this is not possible to enable this in log-mode. But enabling this option does in all cases have a really low impact. Much more commonthan revoked certs are self signed certificates. This applies to the CRL option.&lt;/P&gt;&lt;P&gt;Enabling the OCSP option will almost for sure have a medium to high impact. This impact ist not because of blocked websites because of revoked certs, this impact will be about the performance when accessing normal websites. Thisnis because the firewall pretty often has to check the ocsp servers if the cert is still valid. This could dramatically increase page load times. Probably this depends on the hardware you are using. On a PA-3200 or 5200 series firewall it may be worth a try but do not enable the option an the 5000 and 3000 or lower series - this is my personal recommendation based on my experience and nothing official from PaloAlto.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Remo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 15 Jun 2019 21:08:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/default-action-for-revoked-certificates-via-ocsp-and-crl/m-p/270278#M74707</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2019-06-15T21:08:57Z</dc:date>
    </item>
    <item>
      <title>Re: Default Action for Revoked Certificates via OCSP and CRL</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/default-action-for-revoked-certificates-via-ocsp-and-crl/m-p/270970#M74783</link>
      <description>&lt;P&gt;Thanks Remo.&amp;nbsp; This is what I thought.&amp;nbsp; Thanks for the verification.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2019 16:15:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/default-action-for-revoked-certificates-via-ocsp-and-crl/m-p/270970#M74783</guid>
      <dc:creator>dan731028</dc:creator>
      <dc:date>2019-06-18T16:15:55Z</dc:date>
    </item>
  </channel>
</rss>

