<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inbound SSL decryption for apache2 server in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption/m-p/356269#M87645</link>
    <description>&lt;P&gt;There is nothing in the sslmgr.log and nothing but the General errors in the UI&lt;/P&gt;&lt;P&gt;the only ciphers that seem to work with Palo decryption on TLSv1.2 and Chrome/Firefox are these two:&lt;/P&gt;&lt;P&gt;AES256-GCM-SHA384:AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;all others error out even if those ciphers above are also available but not listed first (SSLHonorCipherOrder is set to off)&lt;/P&gt;&lt;P&gt;but with these ciphers which are considered weak, i dont even get forward secrecy and therefore the rating is down to B...&lt;/P&gt;&lt;P&gt;I wonder why the following ciphers dont work:&lt;BR /&gt;ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-CHCHA20-POLY1305-SHA256:CHACHA20-POLY1305-SHA256 or the ECDHE-ECDSA ones which are listed as supported but not shown in the decryption profile settings&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;anyone have an idea or even just an idea how to troubleshoot this further?&lt;/P&gt;</description>
    <pubDate>Wed, 14 Oct 2020 14:41:14 GMT</pubDate>
    <dc:creator>CLIq</dc:creator>
    <dc:date>2020-10-14T14:41:14Z</dc:date>
    <item>
      <title>Inbound SSL decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption/m-p/355572#M87557</link>
      <description>&lt;P&gt;I am trying to set up a TLSv1.3 / TLSv1.2 webserver behind a palo firewall with ssl inbound decryption.&lt;/P&gt;&lt;P&gt;However i seem to get a lot of ssl errors and the website does not work if specific ciphers are not listed first...&lt;/P&gt;&lt;P&gt;For one I would like to understand why that is and even ciphers listed here have issues:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/compatibility-matrix/supported-cipher-suites/cipher-suites-supported-in-pan-os-10-0/cipher-suites-supported-in-pan-os-10-0-decryption.html#id11638f8b-8bc0-4189-800d-43f1567339b6" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/compatibility-matrix/supported-cipher-suites/cipher-suites-supported-in-pan-os-10-0/cipher-suites-supported-in-pan-os-10-0-decryption.html#id11638f8b-8bc0-4189-800d-43f1567339b6&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Basically, what should the apache config look like for the palo to be able to decrypt the traffic, yet still have the highest possible security (e.g. as rated by&amp;nbsp;&lt;A href="https://www.ssllabs.com/ssltest/" target="_blank" rel="noopener"&gt;https://www.ssllabs.com/ssltest/&lt;/A&gt;) ?&lt;/P&gt;</description>
      <pubDate>Mon, 02 May 2022 07:43:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption/m-p/355572#M87557</guid>
      <dc:creator>CLIq</dc:creator>
      <dc:date>2022-05-02T07:43:38Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption for apache2 server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption/m-p/355586#M87558</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;which PANOS version are you running? Some logs might be helpful as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Oct 2020 18:23:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption/m-p/355586#M87558</guid>
      <dc:creator>Rene_Boehme</dc:creator>
      <dc:date>2020-10-10T18:23:09Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption for apache2 server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption/m-p/355588#M87559</link>
      <description>&lt;P&gt;running PANOS 10.0.1, log only shows "General TLS protocol error" together with the ciphers that were used&lt;/P&gt;&lt;P&gt;any specific debug or log i should show?&lt;/P&gt;</description>
      <pubDate>Sat, 10 Oct 2020 21:17:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption/m-p/355588#M87559</guid>
      <dc:creator>CLIq</dc:creator>
      <dc:date>2020-10-10T21:17:47Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption for apache2 server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption/m-p/355897#M87587</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/138831"&gt;@Rene_Boehme&lt;/a&gt;&amp;nbsp;or anyone know working ciphers for apache with TLSv1.2 and which ones work TLSv1.3?&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 20:28:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption/m-p/355897#M87587</guid>
      <dc:creator>CLIq</dc:creator>
      <dc:date>2020-10-12T20:28:11Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption for apache2 server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption/m-p/356269#M87645</link>
      <description>&lt;P&gt;There is nothing in the sslmgr.log and nothing but the General errors in the UI&lt;/P&gt;&lt;P&gt;the only ciphers that seem to work with Palo decryption on TLSv1.2 and Chrome/Firefox are these two:&lt;/P&gt;&lt;P&gt;AES256-GCM-SHA384:AES128-GCM-SHA256&lt;/P&gt;&lt;P&gt;all others error out even if those ciphers above are also available but not listed first (SSLHonorCipherOrder is set to off)&lt;/P&gt;&lt;P&gt;but with these ciphers which are considered weak, i dont even get forward secrecy and therefore the rating is down to B...&lt;/P&gt;&lt;P&gt;I wonder why the following ciphers dont work:&lt;BR /&gt;ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-CHCHA20-POLY1305-SHA256:CHACHA20-POLY1305-SHA256 or the ECDHE-ECDSA ones which are listed as supported but not shown in the decryption profile settings&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;anyone have an idea or even just an idea how to troubleshoot this further?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2020 14:41:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption/m-p/356269#M87645</guid>
      <dc:creator>CLIq</dc:creator>
      <dc:date>2020-10-14T14:41:14Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption for apache2 server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption/m-p/356700#M87677</link>
      <description>&lt;P&gt;from a wireshark capture, i can see that if for TLSv1.2 any other supported protocols are used, the palo sens a Server Hello with the first matching cipher and right after it sends a [RST, ACK] to the client which is originated only from the firewall, the server actually sends the certificate to the palo, so the issue seems to be between the palo and the client with PANOS 10.0.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I should probably open a support case to look into this but I thought maybe someone has already looked into this &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2020 09:21:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption/m-p/356700#M87677</guid>
      <dc:creator>CLIq</dc:creator>
      <dc:date>2020-10-16T09:21:22Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption for apache2 server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption/m-p/413022#M92914</link>
      <description>&lt;P&gt;I am seeing the same issue on 10.0.6.&amp;nbsp; I've already removed EC X25519 on the web server and I can see it sends secp521r1 in the key exchange but still the Palo sends a RST to the client.&amp;nbsp; I see the following global counter increases related to the problem and find it odd the Palo is always showing client is requesting TLSv1.3 when I can see in the PCAP from the Palo the client is only supporting up to 1.2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;proxy_tls13_client_hello 1 0 info proxy pktproc TLS13: tls1.3 client hello received&lt;BR /&gt;proxy_tls13_inbound_no_server_support 1 0 info proxy pktproc TLS13: Server doesn't support tls1.3&lt;BR /&gt;ssl_unsupported_server_extension 2 0 warn ssl pktproc Number of unsupported ssl ext in server hello&lt;/P&gt;</description>
      <pubDate>Mon, 14 Jun 2021 17:32:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption/m-p/413022#M92914</guid>
      <dc:creator>ChristopherMarston</dc:creator>
      <dc:date>2021-06-14T17:32:17Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption for apache2 server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption/m-p/463611#M102392</link>
      <description>&lt;P&gt;What was the solution for this we are seeing the same thing with version&amp;nbsp;&lt;SPAN&gt;10.0.8-h4, selected cipher is&amp;nbsp;ECDHE_RSA_WITH_AES_256_GCM_SHA384 and PA seems to be causing error due to this.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Feb 2022 08:13:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption/m-p/463611#M102392</guid>
      <dc:creator>PrasenjitBiswas</dc:creator>
      <dc:date>2022-02-05T08:13:37Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption for apache2 server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption/m-p/463624#M102395</link>
      <description>&lt;P&gt;I'm running 10.0.9 and decryption is working with cipher&amp;nbsp;ECDHE_RSA_WITH_AES_256_GCM_SHA384.&amp;nbsp; The problem I ran into was with clients using NSS or Schannel for TLS where the client included pss signature hash algorithms.&amp;nbsp; More info in this link about Palo supported signature algorithms.&amp;nbsp;&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PMaTCAW" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PMaTCAW&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I use the following two commands in apache ssl configuration to disable the x25519 curve ( not supported by PanoOS in tlsv1.2 ) and setting the signature algorithms supported by the server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SSLOpenSSLConfCmd Curves secp521r1:secp384r1:prime256v1&lt;BR /&gt;SSLOpenSSLConfCmd SignatureAlgorithms ECDSA+SHA512:ECDSA+SHA256:RSA+SHA512:RSA+SHA256&lt;/P&gt;</description>
      <pubDate>Sat, 05 Feb 2022 16:03:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption/m-p/463624#M102395</guid>
      <dc:creator>ChristopherMarston</dc:creator>
      <dc:date>2022-02-05T16:03:37Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound SSL decryption for apache2 server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption/m-p/466481#M102690</link>
      <description>&lt;P&gt;That wont fully work with TLSv1.2 and TLSv1.3 at the same time, I figured out how to do this a while back and gave an example config to TAC but here it is as reference for everyone...&lt;/P&gt;&lt;P&gt;To support both TLSv1.2 and TLSv1.3 at the same time and use secure ciphers, I found the following to work the best:&lt;/P&gt;&lt;P&gt;Apache:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;P&gt;SSLOpenSSLConfCmd ECDHParameters brainpoolP256r1&lt;/P&gt;&lt;P&gt;SSLOpenSSLConfCmd Curves secp521r1:secp384r1:prime256v1&lt;BR /&gt;SSLOpenSSLConfCmd SignatureAlgorithms ECDSA+SHA512:ECDSA+SHA384:ECDSA+SHA256:RSA+SHA512:RSA+SHA384:RSA+SHA256:rsa_pss_rsae_sha512:rsa_pss_rsae_sha256&lt;/P&gt;&lt;P&gt;SSLCipherSuite "ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384"&lt;/P&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nginx:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;P&gt;ssl_conf_command ECDHParameters brainpoolP256r1&lt;/P&gt;&lt;P&gt;ssl_conf_command Curves secp521r1:secp384r1:prime256v1&lt;BR /&gt;ssl_conf_command SignatureAlgorithms ECDSA+SHA512:ECDSA+SHA384:ECDSA+SHA256:RSA+SHA512:RSA+SHA384:RSA+SHA256:rsa_pss_rsae_sha512:rsa_pss_rsae_sha256&lt;/P&gt;&lt;P&gt;ssl_ciphers ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384&lt;/P&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;this needs a certain minimum version of openssl and apache/nginx &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;a bit cumbersome but oh well...&lt;/P&gt;&lt;P&gt;it fulfills palos restrictions/requirements while still offering all compatible and secure ciphers and being compatible to modern browsers (I checked this for TLSv1.2 and TLSv1.3 only as those were the only secure ones).&lt;BR /&gt;if anyone does the same in other flavors like lighttpd, haproxy or any other platform that might need customization, please be so kind and post an example here as well so others can adapt it into their configs &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Feb 2022 10:38:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-ssl-decryption/m-p/466481#M102690</guid>
      <dc:creator>CLIq</dc:creator>
      <dc:date>2022-02-17T10:38:41Z</dc:date>
    </item>
  </channel>
</rss>

