<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Decryption Issues - MacOS Big Sur 11.2.3 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-issues-macos-big-sur-11-2-3/m-p/406181#M92070</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;this is exactly what I was but in Chrome it shows the Root CA then the Subordinate CA and then the real website cert.&amp;nbsp; The root CA shows "Trusted" when you click on it in the chain.&amp;nbsp; We even imported the Subordinate CA as a test, trusted it, and still no luck.&amp;nbsp; I'm at a loss because in my mind this should just work and does work with Windows 10 machines.&lt;/P&gt;</description>
    <pubDate>Tue, 11 May 2021 18:28:44 GMT</pubDate>
    <dc:creator>mlinsemier</dc:creator>
    <dc:date>2021-05-11T18:28:44Z</dc:date>
    <item>
      <title>SSL Decryption Issues - MacOS Big Sur 11.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-issues-macos-big-sur-11-2-3/m-p/405878#M92051</link>
      <description>&lt;P&gt;We have had SSL decryption configured since we deployed Palo Alto firewalls and it works with little issue on our Windows OS platforms. We have a new project to deploy a few MacOS clients as the application development team requires the ability to test Safari browsing of some web apps.&amp;nbsp; Our internal Root CA has been imported into the keychain and set to "Trust Always" however Safari nor Google Chrome are able to successfully browse websites over SSL.&amp;nbsp; We either receive the "weak cipher" popup screen or the "invalid certificate" showing our subordinate as untrusted (even though it is signed by the internal Root CA shown as trusted).&amp;nbsp; If we disable decryption traffic passes as normal so we know that its related to this function.&amp;nbsp; Another issue is that I am not as Mac savvy as I used to be and desktop support knows equal or less than myself (as we just don't have a lot of Macs).&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Websites Tested: Google, Engadget, CNN&lt;/P&gt;&lt;P&gt;Client OS: MacOS BigSur 11.2.3&lt;/P&gt;&lt;P&gt;PAN-OS: 10.0.5&lt;/P&gt;&lt;P&gt;Decryption Profile&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;SSL Forward Proxy - Append certificate's CN value to SAN extension, Strip ALPN&lt;/LI&gt;&lt;LI&gt;SSL Protocol Settings: Min Version: TLS1.0, Max Version: Max&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tested without stripping ALPN, Tested with TLS1.2 as Max Version, Tested removing Appending the certificates CN, and all no go.&amp;nbsp; Is there some magic client checkbox I'm missing in the MacOS?&amp;nbsp; I feel like its MacOS specific as it works with Windows 10 on thousands of clients.&amp;nbsp; Any help would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Matt&lt;/P&gt;</description>
      <pubDate>Mon, 10 May 2021 21:55:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-issues-macos-big-sur-11-2-3/m-p/405878#M92051</guid>
      <dc:creator>mlinsemier</dc:creator>
      <dc:date>2021-05-10T21:55:35Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Issues - MacOS Big Sur 11.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-issues-macos-big-sur-11-2-3/m-p/406091#M92066</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7143"&gt;@mlinsemier&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;When you are in your browser, do you see the entire chain when you view the certificate or are you seeing&amp;nbsp;&lt;EM&gt;just&amp;nbsp;&lt;/EM&gt;your subordinate CA listed? If you aren't seeing the root cert in the chain, macOS isn't going to trust your subordinate CA. Sounds like your decryption certificate doesn't include the full cert chain.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 May 2021 14:20:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-issues-macos-big-sur-11-2-3/m-p/406091#M92066</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-05-11T14:20:20Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption Issues - MacOS Big Sur 11.2.3</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-issues-macos-big-sur-11-2-3/m-p/406181#M92070</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;this is exactly what I was but in Chrome it shows the Root CA then the Subordinate CA and then the real website cert.&amp;nbsp; The root CA shows "Trusted" when you click on it in the chain.&amp;nbsp; We even imported the Subordinate CA as a test, trusted it, and still no luck.&amp;nbsp; I'm at a loss because in my mind this should just work and does work with Windows 10 machines.&lt;/P&gt;</description>
      <pubDate>Tue, 11 May 2021 18:28:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-issues-macos-big-sur-11-2-3/m-p/406181#M92070</guid>
      <dc:creator>mlinsemier</dc:creator>
      <dc:date>2021-05-11T18:28:44Z</dc:date>
    </item>
  </channel>
</rss>

