SSL Decryption: ERR_HTTP2_INADEQUATE_TRANSPORT_SECURITY

Reply
Highlighted
Cyber Elite

@ovel,

IE doesn't care if you are using a weak cipher suite, which is why it's working in IE but not Firefox or Chrome. The bigger issue is why the decryption process isn't negotiating to the strongest available cipher unless the site has been configured with a cipher preference that makes it utilize the strongest cipher suites by default (such as Chrome). It appears through additional troubleshooting that the firewall is using the first matching cipher, which in the case of these example sites isn't strong enough to meet the requirements of the browser.

In fairness to PAN, the HTTP/2 connection shouldn't be attempting to use a questionable cipher suite such as in the di.fm example. The vast majority of the HTTP/2 enabled websites will work perfectly fine, because the site owner is specifying the preferred order with strong to weak ciphers. In the examples listed so far the server is providing no preference order, which could be causing the firewall to negotiate to one of the weaker cipher suites being offered by the server. 

 

Highlighted
L1 Bithead

Sounds like a feature which the PA team should consider? For my point of view it's more like a bug. If browsers can view the page, the PA should do it too.

 

For our users the current state is very bad - they will assume the page (e.g. of a customer) is not working, but instdead we have to whitelist it to exclude it from decryption.

Highlighted
L0 Member

Hello together,

 

same issue applies for us (PANOS 9.0.5 & 9.0.6, incl. Prisma Access) and a solution would be very appreciated.

 

Best regards

Highlighted
L0 Member

The same issues also applies to the site: uebermedien.de

Highlighted
L0 Member

We are seeing the same issue with https://www.dataprepu.com/  did support provided a bug id? or any info?

L0 Member

Struggling with this as well. Found that ticking Strip ALPN on the Decryption profile helps, but doing so breaks the Safe Search functionality. When a single safe search block occurs, all traffic begins to be safe search blocked. 

Highlighted
L4 Transporter

Lol i'm having issues with 

https://microsoft.com/

 

sigh !

 

is there a bug id or a work around ?

Highlighted
L2 Linker
Highlighted
L0 Member

Same issue on PA-850 with FW 9.1.2-h1
Tested with https://microsoft.com


I tried the workaround (Objects - Decryption - Decryption Profile - ENABLE/CHECK 'Strip ALPN')
successfully!

BUT to disable HTTP/2 inspection wouldn't/shouldn't be the solution I think. In future HTTP/2 sites will increase - so Palo Alto should get a solution in the software.

Palo - is there any roadmap when this issue is solved without workaround?

Highlighted
L4 Transporter

Why is it causing an issue ?

Would be better if there was some (even any ) decrypt logs.

 

I spend sooo much time trying to guess why a decrypt didn't work 

 

whats is the down side to disabling this ?

 

 

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!

The Live Community thanks you for your participation!