<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect Portal SSL in PANOS 8 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-portal-ssl-in-panos-8/m-p/340905#M85535</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Hi,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Im having the same grade because of:&amp;nbsp;This server does not support Forward Secrecy with the reference browsers.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;how did you solve it? any idea?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 27 Jul 2020 17:23:21 GMT</pubDate>
    <dc:creator>BigPalo</dc:creator>
    <dc:date>2020-07-27T17:23:21Z</dc:date>
    <item>
      <title>GlobalProtect Portal SSL in PANOS 8</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-portal-ssl-in-panos-8/m-p/157212#M51581</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have noticed an important difference in PANOS v8.0 in comparison with PANOS 7.x.x concerning the SSL settings for the GlobalProtect portal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;More specific, the famous site for SSL Server tests, Qualys SSL Labs presents PANOS 7.0.x with Grade A-, while for PANOS 8.0.x the grade is lowered to Grade B (worst).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This happends because, while in PANOS 8.0.x there is a wider support of ciphersuites&amp;nbsp; fot TLSv1.2, the additional ciphersuites supported use weak weak Diffie-Hellman (DH) key exchange parameters. More specific, for some cipher suites, the DH key exchange is weak, as 1024-bits are being used.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;More specific, for version 7.0.x, the Cipher Suites list is the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="reportSubHeading"&gt;TLS 1.2 (suites in server-preferred order)&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;TLS_RSA_WITH_AES_256_GCM_SHA384 (0x9d)&lt;/TD&gt;&lt;TD&gt;256&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;TLS_RSA_WITH_AES_128_GCM_SHA256 (0x9c)&lt;/TD&gt;&lt;TD&gt;128&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;TLS_RSA_WITH_AES_256_CBC_SHA256 (0x3d)&lt;/TD&gt;&lt;TD&gt;256&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;TLS_RSA_WITH_AES_128_CBC_SHA256 (0x3c)&lt;/TD&gt;&lt;TD&gt;128&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;TLS_RSA_WITH_AES_128_CBC_SHA (0x2f)&lt;/TD&gt;&lt;TD&gt;128&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;while in PANOS 8.0.x the list is the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;SPAN class="hideIcon"&gt;&lt;IMG src="https://ip1.i.lithium.com/391cbefce907d7bda2925c591585af18e27fd1fb/68747470733a2f2f7777772e73736c6c6162732e636f6d2f696d616765732f636f6c6c617073652e706e67" width="14" border="0" height="14" /&gt;&lt;/SPAN&gt;&lt;DIV class="reportSubHeading"&gt;# TLS 1.2 (suites in server-preferred order)&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;TLS_RSA_WITH_AES_256_GCM_SHA384 (0x9d)&lt;/TD&gt;&lt;TD&gt;256&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;TLS_RSA_WITH_AES_128_GCM_SHA256 (0x9c)&lt;/TD&gt;&lt;TD&gt;128&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;TLS_RSA_WITH_AES_256_CBC_SHA256 (0x3d)&lt;/TD&gt;&lt;TD&gt;256&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;TLS_RSA_WITH_AES_128_CBC_SHA256 (0x3c)&lt;/TD&gt;&lt;TD&gt;128&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;TLS_RSA_WITH_AES_128_CBC_SHA (0x2f)&lt;/TD&gt;&lt;TD&gt;128&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014) &amp;nbsp; &lt;SPAN class="greySmall"&gt;ECDH secp521r1 (eq. 15360 bits RSA) &amp;nbsp; FS&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;256&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013) &amp;nbsp; &lt;SPAN class="greySmall"&gt;ECDH secp521r1 (eq. 15360 bits RSA) &amp;nbsp; FS&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;128&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030) &amp;nbsp; &lt;SPAN class="greySmall"&gt;ECDH secp521r1 (eq. 15360 bits RSA) &amp;nbsp; FS&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;256&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f) &amp;nbsp; &lt;SPAN class="greySmall"&gt;ECDH secp521r1 (eq. 15360 bits RSA) &amp;nbsp; FS&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;128&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x39) &amp;nbsp; &lt;SPAN class="weakSmall colorF88017"&gt;&lt;SPAN&gt;DH 1024 bits&lt;/SPAN&gt; &amp;nbsp; FS&lt;/SPAN&gt; &amp;nbsp; &lt;SPAN class="colorF88017"&gt;&lt;STRONG&gt;WEAK&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;256&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x33) &amp;nbsp; &lt;SPAN class="weakSmall colorF88017"&gt;&lt;SPAN&gt;DH 1024 bits&lt;/SPAN&gt; &amp;nbsp; FS&lt;/SPAN&gt; &amp;nbsp; &lt;SPAN class="colorF88017"&gt;&lt;STRONG&gt;WEAK&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;128&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x9f) &amp;nbsp; &lt;SPAN class="weakSmall colorF88017"&gt;&lt;SPAN&gt;DH 1024 bits&lt;/SPAN&gt; &amp;nbsp; FS&lt;/SPAN&gt; &amp;nbsp; &lt;SPAN class="colorF88017"&gt;&lt;STRONG&gt;WEAK&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;256&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x9e) &amp;nbsp; &lt;SPAN class="weakSmall colorF88017"&gt;&lt;SPAN&gt;DH 1024 bits&lt;/SPAN&gt; &amp;nbsp; FS&lt;/SPAN&gt; &amp;nbsp; &lt;SPAN class="colorF88017"&gt;&lt;STRONG&gt;WEAK&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;128&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The big question is how to disable these weak Forward Secrecy (FS) DH &lt;STRONG&gt;Weak&lt;/STRONG&gt; key exchange exchange parameters as there is no option to manipulate these settings either from the Web UI or the CLI.&lt;/P&gt;&lt;P&gt;Maybe the new SSL/TLS Service Profile that appears in PANOS 7.1.x should have something for the CipherSuites and the Forward Secrecy (FS) key exchange parameters that need to be enabled/disabled/used (and the order they are being presented to the client's web browser.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;George G.&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2017 16:01:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-portal-ssl-in-panos-8/m-p/157212#M51581</guid>
      <dc:creator>ggoudr</dc:creator>
      <dc:date>2017-05-18T16:01:25Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect Portal SSL in PANOS 8</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-portal-ssl-in-panos-8/m-p/157554#M51660</link>
      <description>&lt;P&gt;Hi George,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The SSL/TLS profile hasn't changed in 8.0 either. It's been a carry-forward feature from 7.1.x. And yes, no way to disable/change anything from GUI or CLI (maybe root?). However, imho, this is not a bad option to include in the SSL/TLS profile, kinda similar to what a Decryption profile has.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'd say you should get in touch with your SE to see if this can be incorporated in some future release.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anurag&lt;/P&gt;</description>
      <pubDate>Sat, 20 May 2017 00:45:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-portal-ssl-in-panos-8/m-p/157554#M51660</guid>
      <dc:creator>ansharma</dc:creator>
      <dc:date>2017-05-20T00:45:03Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect Portal SSL in PANOS 8</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-portal-ssl-in-panos-8/m-p/158023#M51744</link>
      <description>&lt;P&gt;Yes, I agree with you maybe a Feature Request is not a bad idea.&lt;/P&gt;&lt;P&gt;After all, there are some requirements on disabling weak ciphers etc on PCI and CIS compliance audits that PAN Devices do not give that opportunity.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;George&lt;/P&gt;</description>
      <pubDate>Wed, 24 May 2017 07:59:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-portal-ssl-in-panos-8/m-p/158023#M51744</guid>
      <dc:creator>ggoudr</dc:creator>
      <dc:date>2017-05-24T07:59:48Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect Portal SSL in PANOS 8</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-portal-ssl-in-panos-8/m-p/340905#M85535</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Im having the same grade because of:&amp;nbsp;This server does not support Forward Secrecy with the reference browsers.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;how did you solve it? any idea?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jul 2020 17:23:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-portal-ssl-in-panos-8/m-p/340905#M85535</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2020-07-27T17:23:21Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect Portal SSL in PANOS 8</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-portal-ssl-in-panos-8/m-p/431415#M95079</link>
      <description>&lt;P&gt;Run the following commands on in the cli at the edit prompt.&lt;/P&gt;&lt;P&gt;then commit&lt;/P&gt;&lt;P&gt;set shared ssl-tls-service-profile (select your security profile here) protocol-settings keyxchg-algo-rsa no&lt;BR /&gt;set shared ssl-tls-service-profile (select your security profile here) protocol-settings enc-algo-rc4 no&lt;BR /&gt;set shared ssl-tls-service-profile (select your security profile here) protocol-settings enc-algo-aes-256-cbc no&lt;BR /&gt;set shared ssl-tls-service-profile (select your security profile here) protocol-settings enc-algo-3des no&lt;BR /&gt;set shared ssl-tls-service-profile (select your security profile here) protocol-settings auth-algo-sha1 no&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Sep 2021 16:20:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-portal-ssl-in-panos-8/m-p/431415#M95079</guid>
      <dc:creator>MannCave</dc:creator>
      <dc:date>2021-09-03T16:20:46Z</dc:date>
    </item>
  </channel>
</rss>

