<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSL Decryption and www.apple.com in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-www-apple-com/m-p/424437#M94258</link>
    <description>&lt;P&gt;We are testing SSL decryption and are finding that Macs are getting a certificate warning page when visiting &lt;A href="https://www.apple.com" target="_blank"&gt;https://www.apple.com&lt;/A&gt;.&amp;nbsp; The warning says "This website may be impersonating "&lt;A href="http://www.apple.com" target="_blank"&gt;www.apple.com&lt;/A&gt;" to steal your personal or financial information".&amp;nbsp; These Macs do trust our Root CA, so it's not that.&amp;nbsp; I put "&lt;A href="http://www.apple.com" target="_blank"&gt;www.apple.com&lt;/A&gt;" in the SSL Decryption Exclusion list and that resolved it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyone know what is causing this warning? Is it certificate pinning? A couple of our Mac testers also reported that they could not download the Big Sur update over GlobalProtect(&lt;A href="http://www.apple.com" target="_blank"&gt;www.apple.com&lt;/A&gt; was not yet in the exclusion list).&amp;nbsp; Does the Palo need &lt;A href="http://www.apple.com(and" target="_blank"&gt;www.apple.com(and&lt;/A&gt;&amp;nbsp;maybe others) added to the SSL Decryption Exclusion list in order for Mac updates to work?&lt;/P&gt;</description>
    <pubDate>Wed, 04 Aug 2021 13:25:36 GMT</pubDate>
    <dc:creator>jambulo</dc:creator>
    <dc:date>2021-08-04T13:25:36Z</dc:date>
    <item>
      <title>SSL Decryption and www.apple.com</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-www-apple-com/m-p/424437#M94258</link>
      <description>&lt;P&gt;We are testing SSL decryption and are finding that Macs are getting a certificate warning page when visiting &lt;A href="https://www.apple.com" target="_blank"&gt;https://www.apple.com&lt;/A&gt;.&amp;nbsp; The warning says "This website may be impersonating "&lt;A href="http://www.apple.com" target="_blank"&gt;www.apple.com&lt;/A&gt;" to steal your personal or financial information".&amp;nbsp; These Macs do trust our Root CA, so it's not that.&amp;nbsp; I put "&lt;A href="http://www.apple.com" target="_blank"&gt;www.apple.com&lt;/A&gt;" in the SSL Decryption Exclusion list and that resolved it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyone know what is causing this warning? Is it certificate pinning? A couple of our Mac testers also reported that they could not download the Big Sur update over GlobalProtect(&lt;A href="http://www.apple.com" target="_blank"&gt;www.apple.com&lt;/A&gt; was not yet in the exclusion list).&amp;nbsp; Does the Palo need &lt;A href="http://www.apple.com(and" target="_blank"&gt;www.apple.com(and&lt;/A&gt;&amp;nbsp;maybe others) added to the SSL Decryption Exclusion list in order for Mac updates to work?&lt;/P&gt;</description>
      <pubDate>Wed, 04 Aug 2021 13:25:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-www-apple-com/m-p/424437#M94258</guid>
      <dc:creator>jambulo</dc:creator>
      <dc:date>2021-08-04T13:25:36Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Decryption and www.apple.com</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-www-apple-com/m-p/424538#M94259</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7542"&gt;@jambulo&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;If the users are using Safari they'll receive that error unless you exclude the site from decryption, if they utilize something like Chrome or Edge then you won't see that warning.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Generally speaking there's not a lot of Apple services that support being decrypted, and I generally just recommend people bypass decryption for this traffic. Apple does a really good job publishing the exceptions that you need to create &lt;A href="https://support.apple.com/en-us/HT210060" target="_self"&gt;HERE&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Aug 2021 17:44:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-www-apple-com/m-p/424538#M94259</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-08-04T17:44:36Z</dc:date>
    </item>
  </channel>
</rss>

