<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inbound SSL decryption - Digicert in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343936#M86067</link>
    <description>&lt;P&gt;I was able to set ciphers for a test VIP on F5, And i enabled only 1 cipher which the F5-VIP had in server hello after disabling 1.3 on it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Currently this F5 VIP supports single cipher, and it works with no inspection, tested from chrome. I can enable more ciphers too but i believe this should have worked. Below is with no inspection.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 688px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27375iFFB3B4AF9B58DD8E/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 672px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27376i58484B813828061F/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;When i turn inspection on i get this in chrome.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 417px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27378iEEC25DAE4A1B634E/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Client hello ciphers&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 817px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27381i2CBA8C310EB233D4/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PA profile settings&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;  ssl-inbound-proxy {
    block-unsupported-version no;
    block-unsupported-cipher no;
    block-if-no-resource no;
    block-if-hsm-unavailable no;
  }
  ssl-protocol-settings {
    min-version tls1-2;
    keyxchg-algo-rsa yes;
    keyxchg-algo-dhe yes;
    enc-algo-3des no;
    enc-algo-rc4 no;
    auth-algo-sha1 yes;
    keyxchg-algo-ecdhe yes;
    enc-algo-aes-128-cbc yes;
    enc-algo-aes-256-cbc yes;
    enc-algo-aes-128-gcm yes;
    enc-algo-aes-256-gcm yes;
    auth-algo-sha256 yes;
    auth-algo-sha384 yes;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What do you suggest&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 14 Aug 2020 17:34:06 GMT</pubDate>
    <dc:creator>raji_toor</dc:creator>
    <dc:date>2020-08-14T17:34:06Z</dc:date>
    <item>
      <title>Inbound SSL decryption - Digicert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343384#M85971</link>
      <description>&lt;P&gt;If inbound SSL inspection when using Digicert certificate is not supported, what is the alternative. We have many web-servers using same wildcard cert used for GlobalProtect and wanted use this same certificate but it doesn't work. Is there any other mechanism to implement inbound SSL inspection.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 21:47:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343384#M85971</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2020-08-11T21:47:36Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption - Digicert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343391#M85972</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56221"&gt;@raji_toor&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What do you mean with not supported with digicert? What type (algorythms) of certificate do you have?&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 21:50:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343391#M85972</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2020-08-11T21:50:10Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption - Digicert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343452#M85976</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;I think this is not the only KB i came across while to work this out &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClEZCA0" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClEZCA0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NOTE:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;Because SSL certificate providers such as Entrust, Verisign, Digicert, and GoDaddy do not sell CAs, they are not supported in SSL Decryption.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 23:24:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343452#M85976</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2020-08-11T23:24:49Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption - Digicert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343454#M85977</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 439px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27319iE15061F8ADE19235/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Aug 2020 23:27:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343454#M85977</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2020-08-11T23:27:53Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption - Digicert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343464#M85979</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56221"&gt;@raji_toor&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For SSL inbound decryption the &lt;EM&gt;server&lt;/EM&gt;certificates including your wildcardcertificate is supported. Only for SSL forward proxy you have to use a self signed certificate.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2020 06:40:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343464#M85979</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2020-08-12T06:40:08Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption - Digicert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343559#M85996</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp; Its not working for me. certificate in use by GP&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 758px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27334i19A9ADF755137DAB/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;certificate on web-server&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 771px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27335i2FC9E1A8D30A8C02/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;PA config&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27336iDD2028CAE0E33CD1/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27337iA0E24E3C5041607E/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27338i06927B84BC06D2CC/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;With above profile attached to the decryption rule&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27339i8C472A97AFB4368E/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;With no profile attached to the decryption rule&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27340i44EC85C018FDF209/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;traffic from outside&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27341i0297D2EBD6A2096A/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2020 15:02:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343559#M85996</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2020-08-12T15:02:03Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption - Digicert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343604#M86001</link>
      <description>&lt;P&gt;Quote:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;NOTE:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;Because SSL certificate providers such as Entrust, Verisign, Digicert, and GoDaddy do not sell CAs, they are not supported in SSL Decryption.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I think the way that it was intended was that SSL Forward Proxy (standard decryption) is not supported with SSL Certificate Providers because they DO NOT SELL A CA (Certificate Authority), in other words, they do not sell you a license to create certificates that look like they created the certificate, You would then have the ability to create SSL Certs from all of these providers (and maybe try to sell them).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;SSL Inbound Decryption, where you are intercepting traffic to an internal server and therefore use that SSL Cert to be installed on the Firewall to "Impersonate" the internal server.. that can be a Certificate from any provider.. because in that scenario, no SSL Certs are being created.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I hope that makes a little more sense.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2020 16:44:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343604#M86001</guid>
      <dc:creator>jdelio</dc:creator>
      <dc:date>2020-08-12T16:44:38Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption - Digicert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343626#M86009</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/23567"&gt;@jdelio&lt;/a&gt;&amp;nbsp;Thanks for explanation. As i replied above to&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;with my settings and it is failing. Not sure what else i need to fix.&lt;/P&gt;&lt;P&gt;I have also imported the cert given by our web-admin and using that still fails. If I unselect below options then no decryption happens but website opens.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 657px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27345i7DCA14E2A5FC2693/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2020 17:56:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343626#M86009</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2020-08-12T17:56:19Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption - Digicert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343645#M86011</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56221"&gt;@raji_toor&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now you need to start troubleshooting the connection. As you are using the same certificate already for globalprotect, this is not the reason for this issue. First check what ciphersuites and tls versions does the server offer for a tls connection. With a website like &lt;A href="https://www.ssllabs.com/ssltest/" target="_blank" rel="noopener"&gt;Qualys ssllabs&lt;/A&gt;&amp;nbsp;- as you already know - you can check what the server does offer (for this test of course you need to disble decryption). Is the server behind the firewall a windows server? If yes, which version and do you have extended master secret enabled (is enabled by default)?&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2020 19:54:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343645#M86011</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2020-08-12T19:54:39Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption - Digicert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343650#M86013</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;server supports a lot, and almost all are linux servers&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;TLSv1.0
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA

TLSv1.1
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA

TLSv1.2
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA

TLSv1.3
TLS_AES_256_GCM_SHA384
TLS_CHACHA20_POLY1305_SHA256
TLS_AES_128_GCM_SHA256&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Decryption profile allows for below&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27346i9D8447C2BF64D81E/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Atleast 3 of them are common between the profile and what server supports under TLS1.2&lt;/P&gt;&lt;P&gt;TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256&lt;BR /&gt;TLS_DHE_RSA_WITH_AES_256_GCM_SHA384&lt;/P&gt;&lt;P&gt;-----------------------------------&lt;/P&gt;&lt;P&gt;I also realized that inbound inspection broke&amp;nbsp;for all the servers sitting behind F5 in DMZ. Even though F5 VIP is configured either for SSL offload or SSL pasthrough.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So i found a server which was not behind F5 and decryption worked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2020 22:25:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343650#M86013</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2020-08-12T22:25:54Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption - Digicert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343651#M86014</link>
      <description>&lt;P&gt;Ok, now it is getting kind of strange. Mainly because it does not matter if the F5 is configured for offloading or passthrough...&lt;/P&gt;
&lt;P&gt;So, this is at least how I would continue here:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Check the details of a tls handshake from your F5 and also from a connection directly to a server&lt;/LI&gt;
&lt;LI&gt;Compare these TLS handshakes&lt;/LI&gt;
&lt;LI&gt;Do a packet capture on the firewall towards your F5 and the server which is not locatdd behind the firewall&lt;/LI&gt;
&lt;LI&gt;Compare the TLS handshakes&lt;/LI&gt;
&lt;LI&gt;If there is still no obvious reason in the handshakes you need to dig deeper: start a packet capture with also logging enabled and enable the features proxy basic and flow basic. During connection tests for connecrions towards your F5 check the global counters multiple times. Maybe there is already something. If not then aggregate the captured logs and analyze them, at latest there hopefully is the reason why the connection towards your F5 isn't working. (Probably this could be analyzed on the F5 also, but there I have no idea how it works as I never used such a loadbalancer/WAF)&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 12 Aug 2020 23:35:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343651#M86014</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2020-08-12T23:35:14Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption - Digicert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343840#M86053</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;Thanks for the pointers, it is is still not working and i think i can zero in on the issue as below. First decryption process is different when when performing inbound inspection vs forward proxy. With inbound we are only eaves dropping on the session and the &lt;STRONG&gt;ciphers need to match on both sides&lt;/STRONG&gt;. Thanks to this KB that explains it better.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClV8CAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClV8CAK&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So i started looking in packet captures as you suggested, and firewall shows drop for packets with this cipher.&lt;/P&gt;&lt;P&gt;Also i checked from the browser with both inspection disabled/enabled and found the same ciphers.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 724px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27368i1D1BE77032C0CCEC/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 668px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27369i51E91B7A2E2A8E35/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Although F5 or other servers that fail support other ciphers but they all seem to liken above more. Below is the cipher enum results for a server with inspection disabled, not behind F5 but it still failed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| ssl-enum-ciphers: 

|   TLSv1.0: 

|     ciphers: 

|       TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C

|       TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C

|       TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C

|     compressors: 

|       NULL

|     cipher preference: client

|     warnings: 

|       64-bit block cipher 3DES vulnerable to SWEET32 attack

|       Broken cipher RC4 is deprecated by RFC 7465

|       Ciphersuite uses MD5 for message integrity

|   TLSv1.1: 

|     ciphers: 

|       TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C

|       TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C

|       TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C

|     compressors: 

|       NULL

|     cipher preference: client

|     warnings: 

|       64-bit block cipher 3DES vulnerable to SWEET32 attack

|       Broken cipher RC4 is deprecated by RFC 7465

|       Ciphersuite uses MD5 for message integrity

|   TLSv1.2: 

|     ciphers: 

|       TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C

|       TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C

|       TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C

|     compressors: &lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If i select 1.2 as the minimum protocol in decryption profile 3DES get grayed out. Which leads me to be believe "TLS_RSA_WITH_3DES_EDE_CBC_SHA" is not supported on firewall. So in all what i understand/ believe is that because ciphers need to match on both sides of firewall, which is not happening and is causing this issue. Do you think i am right at this conclusion and we need to fix on the server side ciphers that are supported.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2020 23:17:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343840#M86053</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2020-08-13T23:17:33Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption - Digicert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343874#M86058</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56221"&gt;@raji_toor&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes, I think you are right with this conclusion. But besides that I would recommend anyway to configure some stronger ciphersuites on the servers, you could give it a try with enabling 3DES in the decryption profile via CLI. I did not test it with an actual inbound decryption, but I was able to enable 3DES with TLS1.2 in CLI. On the WebUI then it does not even show 3DES enabled but in the configuration it is there.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2020 08:16:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343874#M86058</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2020-08-14T08:16:04Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption - Digicert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343936#M86067</link>
      <description>&lt;P&gt;I was able to set ciphers for a test VIP on F5, And i enabled only 1 cipher which the F5-VIP had in server hello after disabling 1.3 on it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Currently this F5 VIP supports single cipher, and it works with no inspection, tested from chrome. I can enable more ciphers too but i believe this should have worked. Below is with no inspection.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 688px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27375iFFB3B4AF9B58DD8E/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 672px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27376i58484B813828061F/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;When i turn inspection on i get this in chrome.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 417px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27378iEEC25DAE4A1B634E/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Client hello ciphers&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 817px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27381i2CBA8C310EB233D4/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PA profile settings&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;  ssl-inbound-proxy {
    block-unsupported-version no;
    block-unsupported-cipher no;
    block-if-no-resource no;
    block-if-hsm-unavailable no;
  }
  ssl-protocol-settings {
    min-version tls1-2;
    keyxchg-algo-rsa yes;
    keyxchg-algo-dhe yes;
    enc-algo-3des no;
    enc-algo-rc4 no;
    auth-algo-sha1 yes;
    keyxchg-algo-ecdhe yes;
    enc-algo-aes-128-cbc yes;
    enc-algo-aes-256-cbc yes;
    enc-algo-aes-128-gcm yes;
    enc-algo-aes-256-gcm yes;
    auth-algo-sha256 yes;
    auth-algo-sha384 yes;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What do you suggest&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2020 17:34:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343936#M86067</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2020-08-14T17:34:06Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption - Digicert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343939#M86068</link>
      <description>&lt;P&gt;I further enabled more ciphers on VIP and i still get cipher mismatch, while turning inspection off it works&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With no inspection&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;TLSv1.2: 
| ciphers: 
| TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A 
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A 
| TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A 
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2020 18:40:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/343939#M86068</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2020-08-14T18:40:44Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption - Digicert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/344018#M86083</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56221"&gt;@raji_toor&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You now reached a point where it is at least possible, that something on the firewall ist not compatible with the F5. So at this point I would recommend to open a support case and then continue with the following troubleshooting (these logs will also be required in the support case).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Obbiously you need to change the IPs and maybe also the port, depending on your configuration&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;clear counter global&lt;/LI&gt;
&lt;LI&gt;debug dataplane packet-diag clear all&lt;/LI&gt;
&lt;LI&gt;debug dataplane packet-diag clear log log&lt;/LI&gt;
&lt;LI&gt;debug dataplane packet-diag set filter match source 1.1.1.1 destination 2.2.2.2 destination-port 443 protocol 6&lt;/LI&gt;
&lt;LI&gt;debug dataplane packet-diag set log feature proxy basic&lt;/LI&gt;
&lt;LI&gt;debug dataplane packet-diag set log feature flow basic&lt;/LI&gt;
&lt;LI&gt;debug dataplane packet-diag set log on&lt;/LI&gt;
&lt;LI&gt;debug dataplane packet-diag set capture on&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Then you connect to the VIP with decryption enabled and right after that enter the following command. In the output, maybe you already see a specific counter which could lead to the reason of the problem&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;show counter global filter packet-filter yes&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Try to connect a second time and then stop the logging and capture&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;debug dataplane packet-diag set log off&lt;/LI&gt;
&lt;LI&gt;debug dataplane packet-diag set capture off&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Then aggregate the logs. The output of the command will show you the filename that you need to analyze&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;debug dataplane packet-diag aggregate-logs&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Prior to analyze the logfile start now with generating a techsupportfile (for the supportcase)&lt;/P&gt;
&lt;P&gt;Maybe for analysis you want to copy the logile away from the firewall to open it in a texteditor but of course you can also view it in cli. About here I don't know what to do exactly, I would scroll through the logs to find something that maybe shows the reason why the TLS handshake fails after the client hello.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 15 Aug 2020 11:55:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption-digicert/m-p/344018#M86083</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2020-08-15T11:55:12Z</dc:date>
    </item>
  </channel>
</rss>

