My security counter parts came to me letting me know that in Chrome version 70.X+ TLS 1.3 will be turned on by default. This appears to be causing problems in our current firewall deployment:
A/P HA-par 5220s running 8.0.10 (soon to be 8.0.12).
It looks like Google has released an article describing what's going on:
In this article it highlights how Cisco FirePower devices can be configured to avoid issue. Does anyone know how to correct this in Palo?
Here is the error the users get (TLS1.3 Downgrade detected)
This is the traffic log for the user traffic. "Webmail" access is allowed, and we're doing SSL decryption.
The link to the google groups article fixes the issue as it tells Chrome to disable the 1.3 variant.
Just paste the following into the chrome browser address field and it should bring it up, then change the setting to 'Disabled'. You will have to restart your browser.
Update on this issue:
"We are aware of two vendors whose products have this bug: Cisco and Palo Alto Networks, although there may be more. We reported the issue to Cisco in December 2017. They released the fix this past August and have published an advisory. Palo Alto Networks recently discovered the issue on their devices and are planning to release PAN-OS 8.1.4, PAN-OS 8.0.14, and PAN-OS 7.1.21 to fix this, tentatively by Nov 30th."
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!