- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
01-25-2013 07:33 AM
Hi,
I'm kind of expecting a no to this question, but I noticed whilst setting up inbound SSL inspection for a client the other day that if the Cert on the Palo Alto and the cert on the SSL web server do not match then the firewall will refuse to decrypt the traffic and just pass it though as SSL using the server certificate.
It would be great to be able to use a different cert on the Palo for a variety of reasons, number on being for Exchange client access servers, often my clients are using internally signed SSL certs for the CAS but want to use a standard SSL cert from the likes of godaddy/verisign/etc externally. They do this because SAN certs can be pricey and it the verification processes with the CA's are more stringent for SAN certs which can be a pain.
Did I miss something in the certificate policy that stopped this working or is it by design?
Likewise it would be handy to be able to do SSL handoff on the palo and allow HTTP between the firewall and the server internally and SSL out to the rest of the world. I doubt this is possible though.
Thanks for reading, any feedback gratefully received.
02-01-2013 02:50 PM
For inbound decryption the firewall does not act as a proxy for the SSL session, so there is only one session between the client and the web server. This configuration is similar to taking a capture of the SSL session and then manually decrypting it with the certificate's private key. The firewall simply decrypts each packet and performs decryption, then the original packet received is transmitted to the host.
In a proxy configuration there are two distinct SSL sessions, a client to firewall, and firewall to server segment. The feature you are looking for might be closer to the behavior of the current outbound/proxy decryption except being able to control the certificate offered by the firewall to the client.
01-25-2013 04:28 PM
When you create your SSL Decryption policy for inbound inspection, you can specify the certificate. If you are asking whether you can create multiple policies that will send multiple certificates based on what the client is requesting, the answer to that is no. While technically feasible, it would require that the client send the server_name extension in the Client Hello packet - something that is not required.
I would recommend requesting that from your account team as a feature enhancement. I would phrase it as "add a feature to select a certificate based on the server_name extension in the Client Hello packet".
Beyond that, a wildcard certificate from a CA might be a middle ground between a single name and a SAN cert. But if you do have clients using multiple domains, the only other option would be adding additional IPs to your external interface, changing DNS to reflect those IPs for the different domains, and then having different SSL inbound inspection rules based on those IPs.
Hope this helps!
Greg
01-31-2013 07:21 AM
Hi Greg,
Thank you very much for your reply and I'm sorry the the lateness of mine!
We're not looking to offer different certs based on the client request just one that isnt identical to the cert on the internal server.. for example
webmail.mycompany.com >>>>>> webmail.mycompany.local
SSL Cert on PAN Internally signed Cert on Exchange / Web Server
Currently my understanding is that unless the certificates are identical on both the PAN and internal server decryption will not happen.
I hope that makes sense.. I'll reproduce this ASAP to show the exact errors that occur in the system log.
02-01-2013 02:22 PM
Yes, you're right. The certificate on the server must be the same as the certificate on the firewall for it to do the decryption. If they do not match, decryption will fail and it will pass through instead.
02-01-2013 02:50 PM
For inbound decryption the firewall does not act as a proxy for the SSL session, so there is only one session between the client and the web server. This configuration is similar to taking a capture of the SSL session and then manually decrypting it with the certificate's private key. The firewall simply decrypts each packet and performs decryption, then the original packet received is transmitted to the host.
In a proxy configuration there are two distinct SSL sessions, a client to firewall, and firewall to server segment. The feature you are looking for might be closer to the behavior of the current outbound/proxy decryption except being able to control the certificate offered by the firewall to the client.
02-01-2013 03:12 PM
Thank you both for the feedback and clarification!
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!