<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL inbound decryption and Post message in  PA PCAPS in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-and-post-message-in-pa-pcaps/m-p/334497#M84384</link>
    <description>&lt;P&gt;Seems the PA did the content update and now we see that the threat signature is triggered and traffic is blocked under threat logs.&lt;/P&gt;&lt;P&gt;Earlier we were seeing that traffic is decrypted and not blocked under threat logs&lt;/P&gt;</description>
    <pubDate>Sun, 21 Jun 2020 16:32:08 GMT</pubDate>
    <dc:creator>MP18</dc:creator>
    <dc:date>2020-06-21T16:32:08Z</dc:date>
    <item>
      <title>SSL inbound decryption and Post message in  PA PCAPS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-and-post-message-in-pa-pcaps/m-p/323943#M82741</link>
      <description>&lt;P&gt;We have configured the SSL inbound decryption.&lt;/P&gt;&lt;P&gt;When we do the PCAPS on the PA we do not see POST message on the re and tx pcaps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Need to know is this default behaviour?&lt;/P&gt;&lt;P&gt;On traffic logs we see decryption flag as checked.&lt;/P&gt;&lt;P&gt;Also from CLI i verify that PA is decrypting the traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2020 00:07:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-and-post-message-in-pa-pcaps/m-p/323943#M82741</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2020-04-21T00:07:00Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inbound decryption and Post message in  PA PCAPS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-and-post-message-in-pa-pcaps/m-p/324066#M82763</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;This is expected. If you want the post message you would need to enable the decryption port mirror license and verify that you can legally enable that feature in your location and your industry.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From a CLI perspective the command&amp;nbsp;&lt;EM&gt;show session all filter ssl-decrypt yes&amp;nbsp;&lt;/EM&gt;will display all the decrypted sessions across the firewall. You can filter this more to ensure that traffic is being actively decrypted where you expect it to be.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2020 15:12:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-and-post-message-in-pa-pcaps/m-p/324066#M82763</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-04-21T15:12:41Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inbound decryption and Post message in  PA PCAPS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-and-post-message-in-pa-pcaps/m-p/324092#M82765</link>
      <description>&lt;P&gt;The issue is that we have cert with name like&amp;nbsp; *.city.ca&lt;/P&gt;&lt;P&gt;and it has multiple sub domains like&amp;nbsp;&lt;/P&gt;&lt;P&gt;maps.city.ca&lt;/P&gt;&lt;P&gt;All the urls with domain *.city.ca point to single IP address.&lt;/P&gt;&lt;P&gt;When i do the pcaps for the city.ca i see the post and get message on the fw pcaps.&lt;/P&gt;&lt;P&gt;When domain is maps.city.ca then i do not see the get and post info in pcaps of the fw.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also tested with creating custom url for maps.city.ca and then adding that to decryption rule same thing.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2020 16:28:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-and-post-message-in-pa-pcaps/m-p/324092#M82765</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2020-04-21T16:28:57Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inbound decryption and Post message in  PA PCAPS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-and-post-message-in-pa-pcaps/m-p/326053#M83114</link>
      <description>&lt;P&gt;We open the TAC case as we were able to exploit the vulnerabiity even&amp;nbsp; though PA ssl decrypt is enabled.&lt;/P&gt;&lt;P&gt;Yes you were spot on you can not see the get/post messages on the PCAP on firewall or debug ssl proxy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But PA should able to see the threat signature and block it when ssl decryption is enabled.&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2020 01:09:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-and-post-message-in-pa-pcaps/m-p/326053#M83114</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2020-05-05T01:09:39Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inbound decryption and Post message in  PA PCAPS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-and-post-message-in-pa-pcaps/m-p/334497#M84384</link>
      <description>&lt;P&gt;Seems the PA did the content update and now we see that the threat signature is triggered and traffic is blocked under threat logs.&lt;/P&gt;&lt;P&gt;Earlier we were seeing that traffic is decrypted and not blocked under threat logs&lt;/P&gt;</description>
      <pubDate>Sun, 21 Jun 2020 16:32:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-decryption-and-post-message-in-pa-pcaps/m-p/334497#M84384</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2020-06-21T16:32:08Z</dc:date>
    </item>
  </channel>
</rss>

