<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Decryption with iOS 13 Devices in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/294184#M77657</link>
    <description>&lt;P&gt;Yep! First thing we did when they came out and we started having trouble.&lt;/P&gt;</description>
    <pubDate>Thu, 24 Oct 2019 19:24:20 GMT</pubDate>
    <dc:creator>george.v.bowles</dc:creator>
    <dc:date>2019-10-24T19:24:20Z</dc:date>
    <item>
      <title>SSL Decryption with iOS 13 Devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/268497#M74554</link>
      <description>&lt;P&gt;We began testing of the iOS 13 beta last week on several test devices that are connected to our internal mobile device network.&amp;nbsp; This network passes traffic through the Palo with SSL decryption.&amp;nbsp; We are finding that iOS 13, even with our cert installed on the device via MDM, does NOT accept the decrypt cert.&amp;nbsp; We are still testing, but so far we have found several applications that will not work (some give errors, some just don't do anything), Safari will not open HTTPS sites, and our MDM environment cannot send commands to the devices.&amp;nbsp; In all cases, once we take the device off of the internal WiFi, eliminating SSL decrypt, everything works.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have not yet been able to find any documentation from Apple indicating that they are enforcing certificate pinning across the OS, but it sure seems like they might be.&amp;nbsp; Has anyone else encountered this yet?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2019 21:26:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/268497#M74554</guid>
      <dc:creator>davisjj</dc:creator>
      <dc:date>2019-06-10T21:26:55Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption with iOS 13 Devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/269063#M74586</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/115405"&gt;@davisjj&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Just curious why you would starting testing on the initial beta while things are known to be broken and not wait until at least the public preview? This release is so Devs can actually start working with the new APIs, for what you are doing the Public Preview that's due out next month is far more appropriate for your testing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you look at the release notes the MDM queries not returning properly is a known issue and is currently broken within the developer preview. If Apple is enforcing Cert Pinning throughout the OS it certaintly hasn't been documented anywhere and wasn't mentioned at WWDC.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2019 08:11:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/269063#M74586</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-06-12T08:11:54Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption with iOS 13 Devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/269659#M74640</link>
      <description>&lt;P&gt;Thanks for the reply.&amp;nbsp; I am well aware of the perils of beta 1.&amp;nbsp; That's why I have multiple devices.&amp;nbsp; My company does do internal iOS development, although that's a relatively recent addition.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That said, I think that IT professionals who support iOS in their environment should begin testing iOS releases as soon as they are available.&amp;nbsp; It seems that Apple is starting to take this approach as well, seeing as how they are going to allow customers who are enrolled in Apple Business Manager to begin downloading the betas at the same time as developer program members.&amp;nbsp; In this case, getting an early jump on things has allowed me to open up the conversation internally.&amp;nbsp; We are asking, "what if" in regards to decrypt.&amp;nbsp; We have also said we won't make any changes until later in the beta cycle to see if it is still an issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't have any problem living with a semi-working device for a few months.&amp;nbsp; I've been doing that annually for years.&amp;nbsp; My question was regarding whether or not I missed something in the WWDC presentations/docs.&amp;nbsp; It sounds like I didn't, so we will take a wait and see approach.&amp;nbsp; Frankly, I'd like to see them push the issue with cert pinning.&amp;nbsp; I don't think it is necessary to decrypt mobile device traffic.&amp;nbsp; All that leads to is users turning off their WiFi when things don't work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jun 2019 15:32:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/269659#M74640</guid>
      <dc:creator>davisjj</dc:creator>
      <dc:date>2019-06-13T15:32:15Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption with iOS 13 Devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/293295#M77556</link>
      <description>&lt;P&gt;Did you ever find a resolution to this. We are running in to the same thing on our devices that are running iOS 13.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Oct 2019 16:39:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/293295#M77556</guid>
      <dc:creator>RocRaider</dc:creator>
      <dc:date>2019-10-18T16:39:50Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption with iOS 13 Devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/293623#M77599</link>
      <description>&lt;P&gt;I'm with the same problem. There is any solution?&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2019 21:28:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/293623#M77599</guid>
      <dc:creator>lucianocf</dc:creator>
      <dc:date>2019-10-21T21:28:02Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption with iOS 13 Devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/293904#M77630</link>
      <description>&lt;P&gt;Same problem here. iOS 12.x devices are fine and have been for a long time. All other devices (Windows, Chromebooks, Linux, Android) with install cert are fine. iOS 13.x devices are broken. Cert is installed, trusted. We are stumped. Cannot figure out why this will not work. Had a 2 hour call with Apple on 10/17/2019 and they are having us send some extended logging info to them. Please reply if there is any additional information to share.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2019 16:07:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/293904#M77630</guid>
      <dc:creator>george.v.bowles</dc:creator>
      <dc:date>2019-10-23T16:07:44Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption with iOS 13 Devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/294171#M77654</link>
      <description>&lt;P&gt;We are seeing similar issues with macOS Catalina. Certificate is installed but we continue to get SSL errors when using safari.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2019 18:21:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/294171#M77654</guid>
      <dc:creator>RocRaider</dc:creator>
      <dc:date>2019-10-24T18:21:21Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption with iOS 13 Devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/294175#M77655</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/124278"&gt;@RocRaider&lt;/a&gt;- We are in the same boat on the same page. Frankly, we have no idea what to do. We have 3,000 iPads and fewer than 50 MacBooks and we're not getting much help from either PaloAlto or Apple. I hope somebody figures it out soon because we have, basically, given up. If someone doesn't get this under control soon my Financial Advice would be to invest in Chromebook Manufacturers!&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2019 18:37:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/294175#M77655</guid>
      <dc:creator>george.v.bowles</dc:creator>
      <dc:date>2019-10-24T18:37:23Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption with iOS 13 Devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/294177#M77656</link>
      <description>&lt;P&gt;Has anyone verified that you meet the new system requirements for iOS 13 and macOS 10.15? With these in place we haven't run into any issues decrypting Apple traffic, but if you don't meet one of the new requirements then this will cause the device to reject the trusted cert.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://support.apple.com/en-us/HT210176" target="_blank"&gt;https://support.apple.com/en-us/HT210176&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2019 18:42:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/294177#M77656</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-10-24T18:42:06Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption with iOS 13 Devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/294184#M77657</link>
      <description>&lt;P&gt;Yep! First thing we did when they came out and we started having trouble.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2019 19:24:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/294184#M77657</guid>
      <dc:creator>george.v.bowles</dc:creator>
      <dc:date>2019-10-24T19:24:20Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption with iOS 13 Devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/336821#M84891</link>
      <description>&lt;P&gt;Hi Bpry,&lt;/P&gt;&lt;P&gt;I am trying to apply the requirements to my Palaolto self-generated certificate but I wonder if you can help me on how to apply/configure the following requirement. Can you share more information on how to apply these requirements on the firewall?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;TLS server certificates must contain an ExtendedKeyUsage (EKU) extension containing the id-kp-serverAuth OID.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jul 2020 07:52:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/336821#M84891</guid>
      <dc:creator>melbatniji</dc:creator>
      <dc:date>2020-07-07T07:52:57Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption with iOS 13 Devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/338593#M85118</link>
      <description>&lt;P&gt;Where you able to generate the certificate with these requirement from the firewall? Or did you have to use for instance OpenSSL or generate a CSR and get the proper cert from a CA?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jul 2020 07:37:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/338593#M85118</guid>
      <dc:creator>Chadi_Sleiman</dc:creator>
      <dc:date>2020-07-15T07:37:01Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption with iOS 13 Devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/338594#M85119</link>
      <description>&lt;P&gt;Have you tried changing the certificate settings on the Mac itself? I changed them to Use System default on my Catalina and it started working. Mind you this was for authentication to global protect but it still may be worth a shot.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jul 2020 07:44:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/338594#M85119</guid>
      <dc:creator>Chadi_Sleiman</dc:creator>
      <dc:date>2020-07-15T07:44:08Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption with iOS 13 Devices (FIXED)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/338774#M85146</link>
      <description>&lt;P&gt;I also had this problem on my iPhone (13.5.1) and the Global Protect app.&amp;nbsp; After successfully establishing a connection to my company network most websites would not load and displayed a certificate error due to SSL decryption.&amp;nbsp; Here is the resolution:&lt;/P&gt;&lt;P&gt;1. Verify that your certificate profile is showing up under Settings &amp;gt; General &amp;gt; Profile.&amp;nbsp; You should have been prompted to install this when connecting to GP for the first time.&lt;/P&gt;&lt;P&gt;2. This is the part that I was missing.&amp;nbsp; Settings &amp;gt; General &amp;gt; About &amp;gt; Certificate Trust Settings (scroll to the bottom).&lt;/P&gt;&lt;P&gt;3. "Enable Full Trust" for your GP root certificate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once I did this I could browse to any site without certificate issues.&amp;nbsp; Good luck!&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jul 2020 21:20:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/338774#M85146</guid>
      <dc:creator>NWesolowski</dc:creator>
      <dc:date>2020-07-15T21:20:54Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption with iOS 13 Devices (FIXED)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/338853#M85159</link>
      <description>&lt;P&gt;So you have to change these settings on the IOS device itself? Were you able to use a self-signed certificate? did you still have to meet the requirements set in this link?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://support.apple.com/en-us/HT210176" target="_blank"&gt;https://support.apple.com/en-us/HT210176&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Really appreciate your response, thank you!&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jul 2020 05:16:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/338853#M85159</guid>
      <dc:creator>Chadi_Sleiman</dc:creator>
      <dc:date>2020-07-16T05:16:37Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption with iOS 13 Devices (FIXED)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/390651#M90721</link>
      <description>&lt;P&gt;You may struggle generating a cert on the firewall with an OID/EKU field. Some options:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Roll your own root CA. Something like &lt;A href="https://jamielinux.com/docs/openssl-certificate-authority/" target="_self"&gt;this.&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or, create a file named "cert_config" with similar attributes:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;[ req ]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;prompt &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; = no&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;distinguished_name = my dn&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;[ my dn ]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;# The bare minimum is probably a commonName&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;commonName = secure.example.com&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;countryName = XX&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;localityName = Fun Land&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;organizationName = MyCo LLC LTD INC (d.b.a. OurCo)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;organizationalUnitName = SSL Dept.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;stateOrProvinceName = YY&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;emailAddress = ssl-admin@example.com&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;name = John Doe&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;surname = Doe&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;givenName = John&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;initials = JXD&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;dnQualifier = some&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;[ my server exts ]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;extendedKeyUsage = 1.3.6.1.5.5.7.3.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;# 1.3.6.1.5.5.7.3.1 can also be spelled serverAuth:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;# extendedKeyUsage = serverAuth&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;# see x509v3_config for other extensions&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You may also want to look into more EKU attributes, for example, encipherment, decryption, etc.. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Use openssl to generate the certificate:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;$ openssl req -x509 -config cert_config -extensions 'my server exts' -nodes -days 365 -newkey rsa:4096 -keyout myserver.key -out myserver.crt&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://serverfault.com/questions/571910/how-to-add-extended-key-usage-string-when-generating-a-self-signed-certificate-u/573038" target="_self"&gt;&lt;SPAN&gt;Source&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Mar 2021 16:58:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/390651#M90721</guid>
      <dc:creator>LAYER_8</dc:creator>
      <dc:date>2021-03-11T16:58:54Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption with iOS 13 Devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/460011#M102023</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/115405"&gt;@davisjj&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/37355"&gt;@george.v.bowles&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/124278"&gt;@RocRaider&lt;/a&gt;&amp;nbsp;Did you guys ever find an resolution to this issue? Experiencing the same issue on&amp;nbsp;&lt;SPAN&gt;IOS 14 and 15. Windows devices working fine.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jan 2022 03:41:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/460011#M102023</guid>
      <dc:creator>Ben-Price</dc:creator>
      <dc:date>2022-01-21T03:41:18Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption with iOS 13 Devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/460154#M102039</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/181759"&gt;@Ben-Price&lt;/a&gt;&amp;nbsp; We did, sort of.&amp;nbsp; The only solid solution is to not decrypt/inspect the traffic.&amp;nbsp; Apple is taking a pretty strong stance that allowing any intercept is a detriment to the overall security of their platform.&amp;nbsp; I think we are seeing this more and more.&amp;nbsp; It's hard to argue with the logic.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jan 2022 13:52:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/460154#M102039</guid>
      <dc:creator>davisjj</dc:creator>
      <dc:date>2022-01-21T13:52:57Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption with iOS 13 Devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/460380#M102067</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/207033"&gt;@davisjj&lt;/a&gt;&amp;nbsp;Thanks for your response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Its strange, this was working for these iOS devices until we renewed our forward trust certificate as the old one was going to expire, Now with the new renewed certificate the iOS clients don't work. No version iOS config or version change.&lt;/P&gt;</description>
      <pubDate>Sat, 22 Jan 2022 20:49:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/460380#M102067</guid>
      <dc:creator>Ben-Price</dc:creator>
      <dc:date>2022-01-22T20:49:17Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption with iOS 13 Devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/462212#M102230</link>
      <description>&lt;P&gt;Did you import the full chain of trust to the iOS devices?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I had issues generating the cert, then fixed that, but only found in some forum later that even with your own correct CA/intermediate CA and client cert, you need all 3 as trusted on an iOS device for things to work.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With an ESM or MDM, sure that's easy. Doing it one-off with an app like configurator 2, tough times.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Jan 2022 18:55:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-with-ios-13-devices/m-p/462212#M102230</guid>
      <dc:creator>LAYER_8</dc:creator>
      <dc:date>2022-01-31T18:55:25Z</dc:date>
    </item>
  </channel>
</rss>

