<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Sectigo CA Chain Decryption Issues in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/330963#M83856</link>
    <description>&lt;P&gt;We had been running with a separate exclusion list, our helpdesk became overwhelmed with requests and cert issues. As of this post we have disabled "&lt;SPAN&gt;Block sessions with expired certificates"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Monitoring&lt;SPAN&gt;&amp;nbsp;this discussion for further updates.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 02 Jun 2020 04:32:05 GMT</pubDate>
    <dc:creator>benlangberg</dc:creator>
    <dc:date>2020-06-02T04:32:05Z</dc:date>
    <item>
      <title>Sectigo CA Chain Decryption Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/330802#M83832</link>
      <description>&lt;P&gt;Due to the recent expiration of the Sectigo RSA CA cert (&lt;A href="https://support.sectigo.com/articles/Knowledge/Sectigo-AddTrust-External-CA-Root-Expiring-May-30-2020" target="_blank"&gt;https://support.sectigo.com/articles/Knowledge/Sectigo-AddTrust-External-CA-Root-Expiring-May-30-2020&lt;/A&gt;) and our Palo firewall SSL decryption policy configuration to block expired certificates we are noticing that any website that is publishing the old expired CA chain (for example&amp;nbsp;netaoc.org.uk) is being blocked due to them publishing an expired cert.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is obviously working as expected however it's difficult for me to come into contact with each website hosting one of these invalid CA chains to get them to resolve the issue while our users experience issues and I manually exclude the sites from decryption.&amp;nbsp; I of course could turn off expired certificate blocking however this something I would rather not do.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have noticed that web browsers like Chrome when not running through decryption are handling this issue just fine as they seem to look up the new correct CA certificate themselves and use that.&amp;nbsp; Is there a way I can configure out Palo to act in the same way or am I stuck being reliant on the web admins of the individual sites to correct their chain issues?&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jun 2020 10:40:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/330802#M83832</guid>
      <dc:creator>P.Carroll</dc:creator>
      <dc:date>2020-06-01T10:40:58Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo CA Chain Decryption Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/330814#M83833</link>
      <description>&lt;P&gt;Yes we are seeing this issue&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some customers are reporting it too when accessing one of our websites, but that's an external problem&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can't replicate it accessing our site externally.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't think it's necessarily a web hoster problem, our chain looks valid, and the certificate was only generated with it's chain in December.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have logged a support case, I suggest you do the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jun 2020 11:46:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/330814#M83833</guid>
      <dc:creator>RobinClayton</dc:creator>
      <dc:date>2020-06-01T11:46:55Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo CA Chain Decryption Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/330818#M83835</link>
      <description>&lt;P&gt;The only reason I think it's a chain issue from the sites host is if you check the website with a tool like&amp;nbsp;&lt;A href="https://whatsmychaincert.com/" target="_blank"&gt;https://whatsmychaincert.com/&lt;/A&gt;&amp;nbsp;it will report that the site is delivering an invalid chain but it implies that modern web browsers will transparently fix this issue for the end user.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jun 2020 12:08:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/330818#M83835</guid>
      <dc:creator>P.Carroll</dc:creator>
      <dc:date>2020-06-01T12:08:59Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo CA Chain Decryption Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/330829#M83837</link>
      <description>&lt;P&gt;The fact that &lt;A href="https://support.sectigo.com" target="_blank"&gt;https://support.sectigo.com&lt;/A&gt;&amp;nbsp;fails as well leads me to believe that the test site is not able to correctly process the request.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jun 2020 13:29:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/330829#M83837</guid>
      <dc:creator>RobinClayton</dc:creator>
      <dc:date>2020-06-01T13:29:05Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo CA Chain Decryption Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/330830#M83838</link>
      <description>&lt;P&gt;Also, please note:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g0000008UFBCA2" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g0000008UFBCA2&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jun 2020 14:07:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/330830#M83838</guid>
      <dc:creator>kaschekotov</dc:creator>
      <dc:date>2020-06-01T14:07:52Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo CA Chain Decryption Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/330832#M83839</link>
      <description>&lt;P&gt;This is an issue for us too.&amp;nbsp; &amp;nbsp;Why isn't Palo updating these?&amp;nbsp; &amp;nbsp;Does the palo check all the chains for these, apparently Sectigo is saying that the cross signed certificate is enough to stop an error for these?&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jun 2020 14:40:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/330832#M83839</guid>
      <dc:creator>Sec101</dc:creator>
      <dc:date>2020-06-01T14:40:06Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo CA Chain Decryption Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/330836#M83841</link>
      <description>&lt;P&gt;From PA Support&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;From a quick search, I was able to see that multiple issues have been reported with respect to Sectigo Certificates Expiration.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;As a workaround,you can either allow untrust cert or exclude the website from decryption which is causing issue.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;PA has updated with the latest CA certification, so as of now no action needed on PA certificate store. If server chain is not updated till now then that might cause issue here.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Please let me know if you have any further queries or concerns regarding the case."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Awaiting their guidance on why the store is not up to date.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Rob&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jun 2020 15:17:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/330836#M83841</guid>
      <dc:creator>RobinClayton</dc:creator>
      <dc:date>2020-06-01T15:17:42Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo CA Chain Decryption Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/330914#M83846</link>
      <description>&lt;P&gt;According to this &lt;A href="https://twitter.com/sleevi_/status/1266647545675210753" target="_self"&gt;twitter thread&lt;/A&gt;, the issue is with how OpenSSL handles (or doesn't handle) validating certificate chains. I believe that the PAN firewalls use OpenSSL for certificate validations which is why the firewall fails to see that the server's certificate is actually valid.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As a workaround, this is what we did:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Create a custom URL category "Expired Certificate Bypass"&lt;BR /&gt;Objects &amp;gt; Custom Objects &amp;gt; URL Category&lt;/LI&gt;&lt;LI&gt;Clone the decryption profile object and uncheck "&lt;SPAN&gt;Block sessions with expired certificates"&lt;/SPAN&gt;&lt;BR /&gt;Objects &amp;gt; Decryption &amp;gt; Decryption Profile&lt;/LI&gt;&lt;LI&gt;Clone the decryption rule and use the new decryption profile and url category you just created&lt;BR /&gt;Policies &amp;gt; Decryption&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;This is not ideal or scalable but it works for business critical sites.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jun 2020 21:30:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/330914#M83846</guid>
      <dc:creator>kalakai</dc:creator>
      <dc:date>2020-06-01T21:30:37Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo CA Chain Decryption Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/330963#M83856</link>
      <description>&lt;P&gt;We had been running with a separate exclusion list, our helpdesk became overwhelmed with requests and cert issues. As of this post we have disabled "&lt;SPAN&gt;Block sessions with expired certificates"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Monitoring&lt;SPAN&gt;&amp;nbsp;this discussion for further updates.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 04:32:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/330963#M83856</guid>
      <dc:creator>benlangberg</dc:creator>
      <dc:date>2020-06-02T04:32:05Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo CA Chain Decryption Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/330991#M83859</link>
      <description>&lt;P&gt;I will do exactly the same "Benlangberg"&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 06:39:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/330991#M83859</guid>
      <dc:creator>thomaswiesner</dc:creator>
      <dc:date>2020-06-02T06:39:47Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo CA Chain Decryption Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/331095#M83872</link>
      <description>&lt;P&gt;As&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18556"&gt;@kalakai&lt;/a&gt;&amp;nbsp;said, this problem appears to be related to OpenSSL incorrectly building the trust chain for certificates which used to chain up to the now expired Sectigo CA cert.&amp;nbsp; This article (which we're also providing to TAC on our own case) provides a very detailed explanation for those who are interested:&amp;nbsp;&amp;nbsp;&lt;A href="https://calnetweb.berkeley.edu/calnet-technologists/incommon-sectigo-certificate-service/addtrust-external-root-expiration-may-2020" target="_blank"&gt;https://calnetweb.berkeley.edu/calnet-technologists/incommon-sectigo-certificate-service/addtrust-external-root-expiration-may-2020&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 15:13:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/331095#M83872</guid>
      <dc:creator>OwenFuller</dc:creator>
      <dc:date>2020-06-02T15:13:57Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo CA Chain Decryption Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/331101#M83874</link>
      <description>&lt;P&gt;According to the KB article TAC referenced (&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g0000008UFBCA2" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g0000008UFBCA2&lt;/A&gt;), the new CA certs are already in the CA store on the firewalls.&amp;nbsp; It's saying that the problem is due to "&lt;SPAN&gt;Some&amp;nbsp;servers that are using certificates signed by these CAs are still including the expired CAs as part of certification chain supplied to the client." It also mentions that "Our NGFW Trusted CA store is already updated with the self-signed certs, and no change is needed to Trusted CA store on PA."&amp;nbsp; However, given that the chains build properly on other systems, and there are know issues with certain clients (see my previous comment), this still seems to be a problem with PANOS (a la OpenSSL) in my opinion.&amp;nbsp; We're going to continue working w/ TAC for answers.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 15:36:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/331101#M83874</guid>
      <dc:creator>OwenFuller</dc:creator>
      <dc:date>2020-06-02T15:36:43Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo CA Chain Decryption Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/331102#M83875</link>
      <description>&lt;P&gt;I have expiration turned off at present , support are not being very clear. will turn it on again later and see if the cert store has updated.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 15:44:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/331102#M83875</guid>
      <dc:creator>RobinClayton</dc:creator>
      <dc:date>2020-06-02T15:44:39Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo CA Chain Decryption Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/331114#M83876</link>
      <description>&lt;P&gt;From what i see the servers have both chains. PaloAlto behavior is one of the following:&lt;/P&gt;&lt;P&gt;1 - It checks if any expired on the server and block no matter if one is good.&lt;/P&gt;&lt;P&gt;2 - It only check the first one(expired) and doesn't even check the second one.&lt;/P&gt;&lt;P&gt;I agree with you that it should be fixed but looks like its more a code change then a certificate chain issue.&lt;/P&gt;&lt;P&gt;The article that you posted previously shows that clearly on option 2.&lt;/P&gt;&lt;P&gt;Someone was able to reboot firewall just to validate if its not a cache or something like?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 16:24:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/331114#M83876</guid>
      <dc:creator>Tarcizoa</dc:creator>
      <dc:date>2020-06-02T16:24:05Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo CA Chain Decryption Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/331119#M83877</link>
      <description>&lt;P&gt;We only saw about ~50 destinations w/ decrypt-cert-validation as the session-end-reason in our logs, and several seem to be junk we don't really care about.&amp;nbsp; We're opting to leave expiration on for most user traffic.&amp;nbsp; We've created a custom URL category for affected sites which are business-related, and are using it in a separate SSL decryption policy that doesn't block the expired cert.&amp;nbsp; Seems to be the best option to avoid completely disabling cert expiration checking for our purposes.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 17:00:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/331119#M83877</guid>
      <dc:creator>OwenFuller</dc:creator>
      <dc:date>2020-06-02T17:00:32Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo CA Chain Decryption Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/331124#M83878</link>
      <description>&lt;P&gt;We proceeded almost the same, only difference is we're using minemeld with a dynamic list so we dont need to push on the firewall at each addition on the list.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 17:04:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/331124#M83878</guid>
      <dc:creator>Tarcizoa</dc:creator>
      <dc:date>2020-06-02T17:04:16Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo CA Chain Decryption Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/331134#M83879</link>
      <description>&lt;P&gt;Same problem here.&lt;/P&gt;&lt;P&gt;Right now i only saw 1 site not working, but i guess more will follow.&lt;/P&gt;&lt;P&gt;I also set up a new decrypt policy with a new decrypt profile allowing expired certs and put custom url list in place as a workaround.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 17:22:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/331134#M83879</guid>
      <dc:creator>kbe</dc:creator>
      <dc:date>2020-06-02T17:22:18Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo CA Chain Decryption Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/331157#M83883</link>
      <description>&lt;P&gt;Looks like the official advisory is out, and the suggestions are to do the exemptions like most of us have been talking about already:&amp;nbsp;&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/customer-advisories/decryption-errors-created-by-the-expired-addtrust-external-root/ta-p/330976" target="_blank"&gt;https://live.paloaltonetworks.com/t5/customer-advisories/decryption-errors-created-by-the-expired-addtrust-external-root/ta-p/330976&lt;/A&gt;&amp;nbsp; What a mess.&amp;nbsp; Good luck w/ your exemptions everyone!&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 18:32:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/331157#M83883</guid>
      <dc:creator>OwenFuller</dc:creator>
      <dc:date>2020-06-02T18:32:00Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo CA Chain Decryption Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/331165#M83885</link>
      <description>&lt;P&gt;I like&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/144155"&gt;@Tarcizoa&lt;/a&gt;'s idea of using an external dynamic list to manage these exceptions. We don't have minemeld but we can host a text file on an internal web server and just update the text file with any new exceptions. Then set the EDL to check for updates every 5 minutes. Sounds better than having to do commits every time a new site is discovered.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 18:46:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/331165#M83885</guid>
      <dc:creator>kalakai</dc:creator>
      <dc:date>2020-06-02T18:46:27Z</dc:date>
    </item>
    <item>
      <title>Re: Sectigo CA Chain Decryption Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/331351#M83907</link>
      <description>&lt;P&gt;I received an update from TAC saying&amp;nbsp;they also have an engineering request for this issue to identify if the PA behavior can be changed to accept the best root CA instead of the ones which are expired. They will keep us posted with the coming updates.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jun 2020 11:50:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sectigo-ca-chain-decryption-issues/m-p/331351#M83907</guid>
      <dc:creator>axemte</dc:creator>
      <dc:date>2020-06-03T11:50:46Z</dc:date>
    </item>
  </channel>
</rss>

