- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
01-05-2017 01:46 PM
I am trying to get inbound SSL decryption for our web server. I imported our web server's SSL certificate with private key to the Palo. It shows "Valid" and the "private key" checkbox is checked.
But the log shows it is not getting decrypted, and I'm seeing the session end "decrypt-unsupport-param" .
The certificate is signed by a CA, 2048-bit, SHA256
01-10-2017 06:10 AM
01-10-2017 07:31 AM
yes, because thats what the server offers and i guess right now your server offers more than PA can decrypt. By the way the certificate of the root CA is only needed for ssl-forward-proxy. But thats the other direction.
01-10-2017 08:09 AM
Ok, I think I understand now. The documentation mentions none of this information 😕
So I ran the Qualsys SSL Labs test on my webserver, and it shows the server's "preffered order" of cipher suites. Sure enough, ECDHE is on the top, with RSA below it. Which means that browsers are negotiating ECDHE with the server, and the PA can't decrypt it.
I suppose I could remove ECDHE from the server's cipher list (by registry or the IISCrypto tool). I'm not familiar enough with the different cipher suites to know if there is anything inherently insecure with RSA compared to ECDHE. It might not even be PCI or FIPS compliant.
Thanks for all the assistance. It looks like inbound-decrypt is intended for some other use cases, not so much for web servers.
01-10-2017 10:12 AM
I suggest everyone to ask your SE to submit a feature request of being able to decrypt these ciphers inbound. Not decrypting SMTP and webservers is a big miss. I have had our SE vote in favor of this feature.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!