<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Inbound TLS/SMTP inspection (to FortiMail) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-tls-smtp-inspection-to-fortimail/m-p/383833#M89993</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm wondering if anyone happens to be doing successful inbound inspection of SMTP/TLS to a FortiMail appliance? Or any other mail server for that matter.&amp;nbsp; I've run in to a brick wall when it comes to renegotiation. The Palo is serving the correct certificate and a manual connections using openssl (openssl s_client -debug -connect mx1.XXXXX.com:25 -crlf -starttls smtp -showcerts) over a "decrypted" session and an "untouched" session shows identical output up until this point:&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2021-02-04 at 14.43.04.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/29821iFA94B33574A7C5B8/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screenshot 2021-02-04 at 14.43.04.png" alt="Screenshot 2021-02-04 at 14.43.04.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Decrypted (or well, attempted decryption) on the left and undecrypted normal session on the right.&lt;BR /&gt;I've made the decryption profile as generous as possible (i.e. not blocking any sessions and allowing all sorts keys and cryptos) and&amp;nbsp;ECDHE-RSA-AES256-GCM-SHA384 is supported according to the docs. Anyone have any good ideas what to try next?&lt;BR /&gt;It feels somewhat like&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/td-p/246059" target="_blank"&gt;https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/td-p/246059&lt;/A&gt;&amp;nbsp;but I have no idea how to configure ciphers on the FortiMail.&lt;/P&gt;</description>
    <pubDate>Thu, 04 Feb 2021 14:00:26 GMT</pubDate>
    <dc:creator>pkaren</dc:creator>
    <dc:date>2021-02-04T14:00:26Z</dc:date>
    <item>
      <title>Inbound TLS/SMTP inspection (to FortiMail)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-tls-smtp-inspection-to-fortimail/m-p/383833#M89993</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm wondering if anyone happens to be doing successful inbound inspection of SMTP/TLS to a FortiMail appliance? Or any other mail server for that matter.&amp;nbsp; I've run in to a brick wall when it comes to renegotiation. The Palo is serving the correct certificate and a manual connections using openssl (openssl s_client -debug -connect mx1.XXXXX.com:25 -crlf -starttls smtp -showcerts) over a "decrypted" session and an "untouched" session shows identical output up until this point:&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2021-02-04 at 14.43.04.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/29821iFA94B33574A7C5B8/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screenshot 2021-02-04 at 14.43.04.png" alt="Screenshot 2021-02-04 at 14.43.04.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Decrypted (or well, attempted decryption) on the left and undecrypted normal session on the right.&lt;BR /&gt;I've made the decryption profile as generous as possible (i.e. not blocking any sessions and allowing all sorts keys and cryptos) and&amp;nbsp;ECDHE-RSA-AES256-GCM-SHA384 is supported according to the docs. Anyone have any good ideas what to try next?&lt;BR /&gt;It feels somewhat like&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/td-p/246059" target="_blank"&gt;https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/td-p/246059&lt;/A&gt;&amp;nbsp;but I have no idea how to configure ciphers on the FortiMail.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Feb 2021 14:00:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-tls-smtp-inspection-to-fortimail/m-p/383833#M89993</guid>
      <dc:creator>pkaren</dc:creator>
      <dc:date>2021-02-04T14:00:26Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound TLS/SMTP inspection (to FortiMail)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-tls-smtp-inspection-to-fortimail/m-p/392551#M90917</link>
      <description>&lt;P&gt;The palo alto may not have openssl tool to test the ciphers but in version 10 there is the improved that will tell you the needed info:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;Monitor&amp;gt;Logs&amp;gt;Decryption&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-new-features/decryption-features/enhanced-ssl-decryption-troubleshooting.html" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-new-features/decryption-features/enhanced-ssl-decryption-troubleshooting.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also SSL handshake can be seen with a pcap from the firewall and you can see what ciphers are send by the server (the fortiMail):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloUCAS" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloUCAS&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For more info:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClgHCAS" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClgHCAS&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 21 Mar 2021 22:29:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-tls-smtp-inspection-to-fortimail/m-p/392551#M90917</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2021-03-21T22:29:42Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound TLS/SMTP inspection (to FortiMail)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-tls-smtp-inspection-to-fortimail/m-p/999851#M122684</link>
      <description>&lt;P&gt;Check error under decryption logs.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Dec 2024 11:44:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-tls-smtp-inspection-to-fortimail/m-p/999851#M122684</guid>
      <dc:creator>M.Ahmed681864</dc:creator>
      <dc:date>2024-12-30T11:44:47Z</dc:date>
    </item>
  </channel>
</rss>

