ProxySG 6.5.9.x or earlier releases
ASG 18.104.22.168 or earlier releases
ProxySG 22.214.171.124 or earlier releases
Symantec was alerted to an interoperability issue between ProxySG and ASG products and TLS 1.3 in certain configurations. Google recently enabled field trial support for TLS 1.3, in Chrome Browser and ChromeOS 56 while accessing select Google servers. Users of Symantec ProxySG, other proxy and filtering solutions may see a connection issue as a result. Clients that enable TLS 1.3, (Chrome 56 and later versions, FireFox 52 and later versions) and access TLS 1.3 enabled servers, may experience SSL connection failures when going through ProxySG or ASG.
For a more extensive discussion on this issue, please see this TLS 1.3 webinar:
Fixes for TLS 1.3 interoperability are complete and included in the releases listed in the Resolution section.
For Chrome users:
TLS 1.3 can be disabled by accessing URL “chrome://flags/#tls13-variant”, changing the setting from “Default” to “Disabled”, and then relaunching Chrome. The below image shows the configuration set to TLS 1.2:
(Note: Chrome will use TLS 1.3 by default starting with Chrome version 65.)
For FireFox users:
TLS 1.3 can be disabled by accessing URL “about:config”, search for security.tls.version.max, change it from “4”, which is TLS 1.3, to “3”, which is TLS 1.2, and restart the browser. The below image shows the the configuration set to “3”, which is TLS 1.2:
How to confirm if TLS 1.3 is supported by a browser:
SSL Labs provides a URL which will test and report the TLS versions supported by the browser requesting the URL. That URL is https://www.ssllabs.com/ssltest/viewMyClient.html. The following screenshots show the results of the above URL on FireFox 52 with its default configuration:
And after following the steps above to disable TLS 1.3 support:
Workaround on the ProxySG or ASG:
For explicit deployments policy can be added to disable protocol detection for any impacted website. The following knowledge base article describes how this is done in policy: Disable Detect Protocol on exception to resolve an issue with SSL interception failure. For transparent deployments, a TCP-Tunnel service will need to be created that includes the affected destination IPs. The following knowledge base article describes how this is done in proxy services: https://support.symantec.com/en_US/article.TECH245661.html
Below is the list of releases and their release schedules that include fixes for TLS 1.3 interoperability. Symantec recommends that customers upgrade to these or later releases to avoid the issue.
Note: The Fix for the Web Security Service (WSS) was rolled out on March 4, 2017.
For the other products, the fix will be included in all future SW versions starting with:
- SG 126.96.36.199 was released on May 16, 2017
- SG 188.8.131.52 was released on May 24, 2017
- ASG 184.108.40.206 was released on May 24, 2017
- SG 220.127.116.11 was released on May 26, 2017
Imported Document Id