<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo Alto SSL Decryption Question in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-ssl-decryption-question/m-p/375755#M89214</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/141381"&gt;@dromanelli&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hear you. You could check if they're using wildcard certificates on multiple servers, this would make life a little easier &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 22 Dec 2020 08:37:24 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2020-12-22T08:37:24Z</dc:date>
    <item>
      <title>Palo Alto SSL Decryption Question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-ssl-decryption-question/m-p/375586#M89191</link>
      <description>&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Hi All,&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;I'm looking to subject ssl traffic to my security profiles, but to do this, I believe I am understanding that for inbound traffic from the outside, you need to import the same certificate and key from each of your protected servers on the inside network into the Palo Alto. Is that true? If so, why? I don't really understand why the Palo can't use any cert, including a self-generated one to decrypt traffic coming in from the outside, then subject it to the security profiles, and drop it if it's malicious. Why does it have to be the same cert the internal servers have?&lt;/P&gt;</description>
      <pubDate>Mon, 21 Dec 2020 14:25:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-ssl-decryption-question/m-p/375586#M89191</guid>
      <dc:creator>dromanelli</dc:creator>
      <dc:date>2020-12-21T14:25:19Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto SSL Decryption Question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-ssl-decryption-question/m-p/375599#M89192</link>
      <description>&lt;P&gt;you could use a self-signed certificate, but this would mean all of your inbound customer will get an error message stating that the certificate is not from a trusted root CA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The way SSL decryption works is that the firewall performs what is basically a man in the middle attack.&lt;/P&gt;&lt;P&gt;If it has the cerver certificate, with a valid private key, it can simply open and close the session to take a peek inside, since it has the key of the server the client is talking to&lt;/P&gt;&lt;P&gt;If the firewall does not have the key, it needs to proxy the connection by terminating the client's connection on itself, and starting a new connection with the server. This means the client will get to see a web page signed by the palo alto self-signed certificate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the way all browsers handle SSL connections, is they will go and verify if a server certificate is from a know issuer, so they will look at the certificate chain and see if the root certificate (the one signing the server certificate) is one of the trusted certificates. If the certificate was signed by a trusted root CA, it is a good cert and you get the little green lok in your address bar, telling you the validity of the certificate was verified and is ok. a selfsigned cert can't be verified so the browser will throw an error&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if you're serving an 'internal' website to xternal users that have an environment you can control, you can provide them with the CA of your self-signed cert, or instruct them how to trust your self-signed cert, but this is cumbersome and may not work for all external users&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;another bonus to having the real certificate loaded, is that there is no need for proxying so inbound decryption is more resource friendly&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hope this helps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Dec 2020 14:48:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-ssl-decryption-question/m-p/375599#M89192</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2020-12-21T14:48:59Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto SSL Decryption Question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-ssl-decryption-question/m-p/375602#M89194</link>
      <description>&lt;P&gt;Thank you Tom.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can I just point to a trusted and valid certificate on the web from the list that appears in the Palo instead of pointing to the certs on my inside servers?&amp;nbsp; Definitely can't have the users getting that Palo message or they will flood the help desk.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Dec 2020 15:10:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-ssl-decryption-question/m-p/375602#M89194</guid>
      <dc:creator>dromanelli</dc:creator>
      <dc:date>2020-12-21T15:10:05Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto SSL Decryption Question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-ssl-decryption-question/m-p/375609#M89197</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/141381"&gt;@dromanelli&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately that's not how it works. The firewall still needs to have a private key to 'a' certificate for it to be able to set up the 'server-side' communication for proxied SSL decryption.&lt;/P&gt;&lt;P&gt;The message they will get is actually their browser telling them it wasn't able to verify the certificate chain (like showing your ID at the bank, the teller needs to verify if the person on the ID is really you and the ID was issued by a trusted authority, the state)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I may ask, why would you not want to import the server certificate onto the firewall ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Dec 2020 16:14:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-ssl-decryption-question/m-p/375609#M89197</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2020-12-21T16:14:10Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto SSL Decryption Question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-ssl-decryption-question/m-p/375617#M89199</link>
      <description>&lt;P&gt;I'll have to check with the server team, but I believe we have a different certificate on every server, and our farm of servers is almost a full /24 worth of active machines, so it's just going to be a ton of overhead, not to mention getting the server guys to dedicate time to go through each server.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Dec 2020 16:22:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-ssl-decryption-question/m-p/375617#M89199</guid>
      <dc:creator>dromanelli</dc:creator>
      <dc:date>2020-12-21T16:22:51Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto SSL Decryption Question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-ssl-decryption-question/m-p/375755#M89214</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/141381"&gt;@dromanelli&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hear you. You could check if they're using wildcard certificates on multiple servers, this would make life a little easier &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Dec 2020 08:37:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-ssl-decryption-question/m-p/375755#M89214</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2020-12-22T08:37:24Z</dc:date>
    </item>
  </channel>
</rss>

