Enhanced Security Measures in Place:   To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.

PA-3220 - PAN-OS 9.1.9 - proxy_wait_pkt_drop

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

PA-3220 - PAN-OS 9.1.9 - proxy_wait_pkt_drop

L7 Applicator

Hi community

This post is either to inform you about a possible problem and also to ask if someone already saw this and may be even has a solution.

 

Some days ago the global counter for proxy_wait_pkt_drop started to dramatically increase on a PA-3220 running on PAN-OS 9.1.9. Obviously tls decryption is enbled on this firewall(cluster). The effect of this increasing counter is that for some websites opening them is impossible and for the rest of web-browsing it is generally pretty slow. At the moment I assume there could be a bug in tls proxy which could result in tls proxy process crashes because of tls implementations which may be aren't strictly following RFC guidelines.

 

Did you already see this in your environment? If not then I recommend keeping an eye on this global counter - specially if you are running a PA-3220 with PAN-OS 9.1.8 or 9.1.9.

 

Cheers,

Remo

1 accepted solution

Accepted Solutions

L7 Applicator

To everyone who sees the same problem in their environments: update to 9.1.10 and the problem should be fixed. The reason is because of unavailable CRLs which cause an infinite loop in the sslmgr process which effectively stops the processing of further decrypted sessions. The bug ID of this is PAN-166296

View solution in original post

2 REPLIES 2

Community Manager
Community Manager

@Remo - Thank you for bringing awareness to this!

Crasmussen - LIVEcommunity Manager 
Remember to click LIKE if a post is helpful to you | Stay Engaged!

L7 Applicator

To everyone who sees the same problem in their environments: update to 9.1.10 and the problem should be fixed. The reason is because of unavailable CRLs which cause an infinite loop in the sslmgr process which effectively stops the processing of further decrypted sessions. The bug ID of this is PAN-166296

  • 1 accepted solution
  • 2840 Views
  • 2 replies
  • 2 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!