Network Security
Troubleshoot Unsupported Cipher Suites
Table of Contents
Expand All
|
Collapse All
Network Security Docs
-
- Security Policy
-
- Security Profile Groups
- Security Profile: AI Security
- Security Profile: WildFire® Analysis
- Security Profile: Antivirus
- Security Profile: Vulnerability Protection
- Security Profile: Anti-Spyware
- Security Profile: DNS Security
- Security Profile: DoS Protection Profile
- Security Profile: File Blocking
- Security Profile: URL Filtering
- Security Profile: Data Filtering
- Security Profile: Zone Protection
-
- Policy Object: Address Groups
- Policy Object: Regions
- Policy Object: Traffic Objects
- Policy Object: Applications
- Policy Object: Application Groups
- Policy Object: Application Filter
- Policy Object: Services
- Policy Object: Auto-Tag Actions
- Policy Object: Devices
-
- Uses for External Dynamic Lists in Policy
- Formatting Guidelines for an External Dynamic List
- Built-in External Dynamic Lists
- Configure Your Environment to Access an External Dynamic List
- Configure your Environment to Access an External Dynamic List from the EDL Hosting Service
- Retrieve an External Dynamic List from the Web Server
- View External Dynamic List Entries
- Enforce Policy on an External Dynamic List
- Find External Dynamic Lists That Failed Authentication
- Disable Authentication for an External Dynamic List
- Policy Object: HIP Objects
- Policy Object: Schedules
- Policy Object: Quarantine Device Lists
- Policy Object: Dynamic User Groups
- Policy Object: Custom Objects
- Policy Object: Log Forwarding
- Policy Object: Authentication
- Policy Object: Decryption Profile
- Policy Object: Packet Broker Profile
-
-
-
- The Quantum Computing Threat
- How RFC 8784 Resists Quantum Computing Threats
- How RFC 9242 and RFC 9370 Resist Quantum Computing Threats
- Support for Post-Quantum Features
- Post-Quantum Migration Planning and Preparation
- Best Practices for Resisting Post-Quantum Attacks
- Learn More About Post-Quantum Security
-
-
-
- Investigate Reasons for Decryption Failure
- Identify Weak Protocols and Cipher Suites
- Troubleshoot Version Errors
- Troubleshoot Unsupported Cipher Suites
- Identify Untrusted CA Certificates
- Repair Incomplete Certificate Chains
- Troubleshoot Pinned Certificates
- Troubleshoot Expired Certificates
- Troubleshoot Revoked Certificates
Troubleshoot Unsupported Cipher Suites
Identify and fix version errors or unsupported cipher suites so you can decide
whether to allow the traffic by excluding it from decryption.
Where Can I Use This? | What Do I Need? |
---|---|
|
No separate license required for decryption when using NGFWs or
Prisma Access.
Note: The features and capabilities available to you in
Strata Cloud Manager depend on your active license(s).
|
Cipher errors are unsupported cipher errors where at least one of the following is
true:
- The client tries to negotiate a cipher that the NGFW supports but that the Decryption profile applied to the traffic doesn’t support.
- The client tries to negotiate a cipher that the NGFW does not support.
- (Rare) SSL Inbound Inspection is enabled and the server’s capabilities don’t match the Decryption profile settings.
- The error message includes the supported client cipher bitmask value and the supported Decryption profile cipher bitmask value. You can use bitmask values to identify the cipher the client tried to use and the cipher values that the Decryption profile supports.
Key Steps for Converting Bitmask Values and Turning Them Into Something
Useful
- Filter the Decryption logs for cipher errors using a query.
- Plug the bitmask value into the appropriate CLI command to identify the cipher that caused the error.
- Use the cipher information to update the Decryption policy rule or Decryption profile if you want to allow access to the site in question.
- Identify cipher errors in the Decryption logs.
- Select Monitor Logs Decryption.
- Filter the Decryption logs using the query (err_index eq Cipher). The highlighted values are bitmask values. For example, let’s examine a cipher error with the Error message Unsupported cipher. Supported client cipher bitmask: 0x80000000. Support decrypt profile cipher bitmask 0x60f79980.
- Log in to the CLI to look up the bitmask values.
admin@vm1>debug dataplane show ssl-decrypt bitmask-cipher 0x80000000
CHACHA_PLY1305_SHA256
This output shows that client tried to negotiate a cipher that the NGFW supports (if the bitmask is all zeros (0x0000000, then the client tried to negotiate a cipher that the NGFW doesn’t support):admin@vm1>debug dataplane show ssl-decrypt bitmask-cipher 0x80000000 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_256_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_AES_128_CBC_SHA TLS_DHE_RSA_WITH_AES_256_CBC_SHA TLS13_WITH_AES_256_GCM_SHA384 TLS13_WITH_AES_128_GCM_SHA256
This output shows that the Decryption profile that controls the traffic supports many ciphers, but does not support the cipher the client is trying to use.To fix this issue so that the NGFW allows and decrypts the traffic, you need to add support for the missing cipher to the Decryption profile. - Identify the decryption policy rule and profile that controls the session traffic.
- Check the Policy Name for a Decryption log entry (or click the magnifying glass
- Select the policy rule (ObjectsPoliciesDecryption), and open the rule. Then, on the Options tab, go to the Options and find the value under Decryption Profile.
- Select ObjectsDecryptionDecryption Profile, and select the appropriate Decryption profile.
- Update the Key Exchange Algorithms, Encryption Algorithms, and Authentication Algorithms fields as needed.
- Click OK to save the profile.Select the CHACHA20-POLY1305 encryption algorithm option (the Max Version setting of Max means that the profile already supports TLSv1.3 and the Authentication Algorithm setting already includes SHA256, so only the Encryption Algorithm support was missing).If the NGFW does not support a cipher suite and you need to allow the traffic for business purposes, create a decryption policy rule and profile that applies only to that traffic. In the Decryption profile, disable the Block sessions with unsupported cipher suites option.
- Commit the configuration.After you commit the configuration, the Decryption profile supports the missing cipher and the decryption sessions for the traffic succeed.