<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL inspection decrypt error from some client in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-decrypt-error-from-some-client/m-p/336803#M84883</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/147962"&gt;@adalfarra&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Do you have TLS1.0 enabled on your inbound decryption profile? Best practice would be that this would be disabled if it isn't required, which would cause your decryption issues.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 07 Jul 2020 02:45:18 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2020-07-07T02:45:18Z</dc:date>
    <item>
      <title>SSL inspection decrypt error from some client</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-decrypt-error-from-some-client/m-p/336644#M84824</link>
      <description>&lt;P&gt;Hello to all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a linux website that we made working with inbound ssl inspection by disabling curve25519 / x25519.&lt;/P&gt;&lt;P&gt;Some clients report errors ( always showing as decrypt errors on the monitoring) accessing the site: by taking a networrk trace on the firewall side it seems like all the client are trying to negotiate TLS V1.&lt;/P&gt;&lt;P&gt;If I try with the same combination of browser (Edge legacy and cromium version) and S.O (windows 10 1903) I am able to reach the sites and in the trace i see that the correct version (TLS 1.3) is negotiated between the client and the palo alto.&lt;/P&gt;&lt;P&gt;Off course if I disable the inspectio all goes fine. Anyone have any hints or suggestion?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jul 2020 07:33:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-decrypt-error-from-some-client/m-p/336644#M84824</guid>
      <dc:creator>adalfarra</dc:creator>
      <dc:date>2020-07-06T07:33:11Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inspection decrypt error from some client</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-decrypt-error-from-some-client/m-p/336755#M84869</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;The client needs to trust the certificate. I would say use a public certificate and or have the client install the root cert that is being used.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jul 2020 20:42:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-decrypt-error-from-some-client/m-p/336755#M84869</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-07-06T20:42:37Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inspection decrypt error from some client</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-decrypt-error-from-some-client/m-p/336803#M84883</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/147962"&gt;@adalfarra&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Do you have TLS1.0 enabled on your inbound decryption profile? Best practice would be that this would be disabled if it isn't required, which would cause your decryption issues.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jul 2020 02:45:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-decrypt-error-from-some-client/m-p/336803#M84883</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-07-07T02:45:18Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inspection decrypt error from some client</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-decrypt-error-from-some-client/m-p/336808#M84886</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the profile only permits TLS 1.2 and above, also the certificate is public&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jul 2020 04:05:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-decrypt-error-from-some-client/m-p/336808#M84886</guid>
      <dc:creator>adalfarra</dc:creator>
      <dc:date>2020-07-07T04:05:26Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inspection decrypt error from some client</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-decrypt-error-from-some-client/m-p/336849#M84896</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/147962"&gt;@adalfarra&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;So the one thing to keep in mind here is that clients don't&amp;nbsp;&lt;EM&gt;have&amp;nbsp;&lt;/EM&gt;to support set versions of TLS. You could easily be seeing scanning traffic that is only using TLS 1.0 or TLS1.1. You've verified that the site in question works correctly when you access the connection with TLS1.2+ enabled, so now the real question is why the client isn't at least supporting TLS1.2+?&lt;/P&gt;
&lt;P&gt;This is where you kind of have to work with someone reporting the issue to see if their browser and computer are actually setup to utilize TLS1.2. If they are not, you essentially can only ask anyone running into the issue to migrate to allowing TLS1.2 or modify your profile to allow TLS1.0 and TLS1.1. Personally I would be telling the client they need to support current security standards, but that may not work with your organization.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jul 2020 14:21:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-decrypt-error-from-some-client/m-p/336849#M84896</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-07-07T14:21:46Z</dc:date>
    </item>
    <item>
      <title>Re: SSL inspection decrypt error from some client</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-decrypt-error-from-some-client/m-p/336856#M84900</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The client combination is edge and explorer on windows above version 1903.&lt;/P&gt;&lt;P&gt;The site without the inspection only offers TLS1.2 and above and is&amp;nbsp; working fine. The problem for me occurs only when we activate the inbound inspection at the palo alto side&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jul 2020 15:19:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inspection-decrypt-error-from-some-client/m-p/336856#M84900</guid>
      <dc:creator>adalfarra</dc:creator>
      <dc:date>2020-07-07T15:19:59Z</dc:date>
    </item>
  </channel>
</rss>

