<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inbound decryption working/not? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-decryption-working-not/m-p/425229#M94334</link>
    <description>&lt;P&gt;It's the RSA-PSS signature which isn't supported, disable this on the server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PMR7CAO" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PMR7CAO&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;They are supported from version 10, but only for TLS 1.3 I believe.&lt;/P&gt;</description>
    <pubDate>Sat, 07 Aug 2021 14:53:09 GMT</pubDate>
    <dc:creator>dmifsud</dc:creator>
    <dc:date>2021-08-07T14:53:09Z</dc:date>
    <item>
      <title>Inbound decryption working/not?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-decryption-working-not/m-p/425191#M94333</link>
      <description>&lt;P&gt;2 web servers, inbound decryption for both, one working and other does not and are using same wildcard cert.&lt;/P&gt;&lt;P&gt;Bold are the only differences I see between 2. I don't know why working server without decryption shows the root instead of intermediate SHA2 certificate or vice a versa. However if i see the cert in browser it looks the same for both servers.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 273px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/35526i5EA029C6986BD27B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Also not sure why the signature type is different and also not sure if that can be controlled in Apache config. Traffic to both is from same test client.&lt;/P&gt;&lt;P&gt;---------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Server A without Decryption&lt;/STRONG&gt;&lt;BR /&gt;PS C:\Users\whoami\Downloads\New folder (7)\openssl-1.1.1k-win64&amp;gt; .\openssl.exe s_client -connect webpac.test.ca:443 -brief&lt;BR /&gt;depth=2 C = US, O = DigiCert Inc, OU = &lt;A href="http://www.digicert.com" target="_blank"&gt;www.digicert.com&lt;/A&gt;, &lt;STRONG&gt;CN = DigiCert High Assurance EV Root CA&lt;/STRONG&gt;&lt;BR /&gt;verify error:num=19:self signed certificate in certificate chain&lt;BR /&gt;CONNECTION ESTABLISHED&lt;BR /&gt;Protocol version: TLSv1.2&lt;BR /&gt;Ciphersuite: ECDHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;Peer certificate: C = CA, O = TEST, OU = IT, CN = *.test.ca&lt;BR /&gt;Hash used: SHA256&lt;BR /&gt;&lt;STRONG&gt;Signature type: RSA&lt;/STRONG&gt;&lt;BR /&gt;Verification error: self signed certificate in certificate chain&lt;BR /&gt;Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2&lt;BR /&gt;Server Temp Key: ECDH, P-256, 256 bits&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Server A with Decryption&lt;/STRONG&gt;&lt;BR /&gt;depth=0 C = CA, O = TEST, OU = IT, CN = *.test.ca&lt;BR /&gt;verify error:num=20:unable to get local issuer certificate&lt;BR /&gt;depth=0 C = CA, O = TEST, OU = IT, CN = *.test.ca&lt;BR /&gt;verify error:num=21:unable to verify the first certificate&lt;BR /&gt;CONNECTION ESTABLISHED&lt;BR /&gt;Protocol version: TLSv1.2&lt;BR /&gt;Ciphersuite: ECDHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;Peer certificate: C = CA, O = TEST, OU = IT, CN = *.test.ca&lt;BR /&gt;Hash used: SHA256&lt;BR /&gt;&lt;STRONG&gt;Signature type: RSA&lt;/STRONG&gt;&lt;BR /&gt;Verification error: unable to verify the first certificate&lt;BR /&gt;Server Temp Key: ECDH, P-256, 256 bits&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Server B without decryption&lt;/STRONG&gt;&lt;BR /&gt;depth=1 C = US, O = DigiCert Inc, OU = &lt;A href="http://www.digicert.com" target="_blank"&gt;www.digicert.com&lt;/A&gt;, &lt;STRONG&gt;CN = DigiCert SHA2 High Assurance Server CA&lt;/STRONG&gt;&lt;BR /&gt;verify error:num=20:unable to get local issuer certificate&lt;BR /&gt;CONNECTION ESTABLISHED&lt;BR /&gt;Protocol version: TLSv1.2&lt;BR /&gt;Ciphersuite: ECDHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;Peer certificate: C = CA, O = TEST, OU = IT, CN = *.test.ca&lt;BR /&gt;Hash used: SHA256&lt;BR /&gt;&lt;STRONG&gt;Signature type: RSA-PSS&lt;/STRONG&gt;&lt;BR /&gt;Verification error: unable to get local issuer certificate&lt;BR /&gt;Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2&lt;BR /&gt;Server Temp Key: ECDH, P-256, 256 bits&lt;/P&gt;&lt;P&gt;Server B with decryption&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Server B with decryption&lt;/STRONG&gt;&lt;BR /&gt;30632:error:14094410:SSL routines:ssl3_read_bytes:sslv3 alert handshake failure:ssl\record\rec_layer_s3.c:1544:SSL alert number 40&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Aug 2021 22:57:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-decryption-working-not/m-p/425191#M94333</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2021-08-06T22:57:35Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound decryption working/not?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-decryption-working-not/m-p/425229#M94334</link>
      <description>&lt;P&gt;It's the RSA-PSS signature which isn't supported, disable this on the server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PMR7CAO" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PMR7CAO&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;They are supported from version 10, but only for TLS 1.3 I believe.&lt;/P&gt;</description>
      <pubDate>Sat, 07 Aug 2021 14:53:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-decryption-working-not/m-p/425229#M94334</guid>
      <dc:creator>dmifsud</dc:creator>
      <dc:date>2021-08-07T14:53:09Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound decryption working/not?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-decryption-working-not/m-p/426807#M94543</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/131231"&gt;@dmifsud&lt;/a&gt;&amp;nbsp;Thanks. This is what I had suspected. This is what worked for us on apache.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;SSLProtocol all -SSLv3 -TLSv1 -TLSv1.1 -TLSv1.3&lt;BR /&gt;SSLOpenSSLConfCmd Curves secp384r1:prime256v1&lt;BR /&gt;SSLOpenSSLConfCmd SignatureAlgorithms ECDSA+SHA512:ECDSA+SHA256:RSA+SHA512:RSA+SHA256&lt;/DIV&gt;</description>
      <pubDate>Fri, 13 Aug 2021 22:14:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-decryption-working-not/m-p/426807#M94543</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2021-08-13T22:14:54Z</dc:date>
    </item>
  </channel>
</rss>

