"decrypt-unsupport-param" error on Inbound SSL Decryption

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

"decrypt-unsupport-param" error on Inbound SSL Decryption

L3 Networker

I am trying to get inbound SSL decryption for our web server. I imported our web server's SSL certificate with private key to the Palo. It shows "Valid" and the "private key" checkbox is checked.

 

But the log shows it is not getting decrypted, and I'm seeing the session end "decrypt-unsupport-param" .

 

The certificate is signed by a CA, 2048-bit, SHA256

1 accepted solution

Accepted Solutions

L4 Transporter

it is right that DHE and ECDHE is not supported by PA for ssl-inbound-inspection. There ist a note in the Config which point to that. therefore you have to disable these algorithms like Rahman mentioned.

 

algo.PNG

 

you will find the algorithms below Objects - Decryption Profil. DHE and ECDHE is checked but they will be used only for ssl forward proxy.

View solution in original post

18 REPLIES 18

Cyber Elite
Cyber Elite

Hello,

According to the documetnation, here is what it means:

 

The session used an unsupported protocol version, cipher, or SSH algorithm. This session end reason is also displayed when the session produced a fatal error alert of type unsupported_extension, unexpected_message, or handshake_failure.

 

https://www.paloaltonetworks.com/documentation/71/pan-os/newfeaturesguide/networking-features/ssl-ss...

 

I however do not know howto resolve it. I'm sure a ticket into TAC could be a quicker answer?

 

Hope this helps.

L4 Transporter

Hi,

 

please take a look at "objects > decryption profile" and here the default profil or the your own configured profile. Take the tab "SSL-Decryption " and then "SSL Protocol Settings". Now you can choose the Protocol Version, Key Exchange Algorithms, Encryption Algorithms and Authentication Algorithms. Hope this helps.

 

Regards,

Klaus

Ok, I checked the decryption profile, and the default already has every option checked. Seems to be some other issue then

L4 Transporter

hi,

i think it is nessesary to debug. Maybe the it is an unsupport cipher.

 

Regards,

Klaus

 

L4 Transporter

another thing is to check the decryption policy for right Decryption Profil ...

It's a basic certificate aquired from Digicert.com. When I look at the certificate itself, it says its RSA SHA256, 2048-bit. But I don't see where it says the encryption algorithm, though (like AES-128CBC or AES-256GCM). I will ask the CA vendor

L4 Transporter

please check that the digicert-certificate is among the certificate authorities. this is necessary for trusted relationship and this to decrypt.

L4 Transporter

take a look on the picture i think it is the DHE or ECDHE. Both are support but not for the inbound direction. Just for SSL Forward Proxy.

L4 Transporter

Both algorithms (DHE and ECDHE) are only support for SSL Forward Proxy. Not for inbound direction. Take a look at the photo.

 

 

algo.PNG

The certificate is RSA,not DHE. However, noticed that there is an Digicert intermediary certificate in the chain. Do I need to load the intermediary into the PA? I obviously don't have their private key

L4 Transporter

Hi Max,

in our PA's certficate-memory are only root-certificates. two or three of them i imported to get sites decrypted. Because they weren't implicit. Do you have the root-CA as well? The intermediate will be used to issue the certificate for an aplicant. The Root-CA ensures the reliabilty of the intermediate cert. I think,  you have to have der Root-CA as well.

To get a DigiCert Trusted Root Authority Certificates look here digicert .

Regards,

Klaus

 

Interesting, so I've added the root CA and intermediary CA, and now it shows the server's certificate under the other two. I thought that would fix the issue since it all lined up nicely, but no dice... I'm still getting the errors (first "decrypt-error" then "decrypt-param-unsupport").

 

So just to verify, the rule should be untrust to trust, source any, destination [the public IP of the server]?

No it won't work, PANOS does not support DHE and ECDHE ciphers for inbound ssl decryption. It does not have anything to do with your certificate. It is about the client and the webserver. Just run wireshark on your client and filter for server ip and ssl.handshake.type == 2. If you see that the client and server agreed on a DHE or ECDHE cipher, then inbound decryption will not work. You need to disable DHE and ECDHE ciphers on your web server so clients can not connect to server using DHE and ECDHE ciphers. Instead they will agree and use on other supported ciphers.

 

Rahman 

L4 Transporter

it is right that DHE and ECDHE is not supported by PA for ssl-inbound-inspection. There ist a note in the Config which point to that. therefore you have to disable these algorithms like Rahman mentioned.

 

algo.PNG

 

you will find the algorithms below Objects - Decryption Profil. DHE and ECDHE is checked but they will be used only for ssl forward proxy.

  • 1 accepted solution
  • 28421 Views
  • 18 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!