<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD's - Firepower dropping HTTPS traffic using TLS 1.3 Hybridized in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5275011#M1120280</link>
    <description>&lt;P&gt;I just ran across this discussion. It seems related to my clients issue. The topic, and all the bugs are discussing fragmented client hellos related to the above mentioned browsers. &lt;/P&gt;
&lt;P&gt;What we have is a dropped server hello packet. The packets are not out of order. The packets are not IP-fragments but they are spread across 2 tcp packets. The MSS from the server is 1250. The client hello is spread over two packets, one 1250, the other 505. A packet capture on the FTD running 7.2.5-4 shows these two packets traverse the FTD and are sent to the website. It is the server hello which comes back TCP length 1186, and gets dropped. The actual hello is of length 1210. The client only receives the 2nd packet of the two and thus aborts the exchange. &lt;/P&gt;
&lt;P&gt;Using packet capture with the trace option, the dropped packet produces this output. &lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Subtype: firewall&lt;BR /&gt;Result: DROP&lt;BR /&gt;Elapsed time: 43586 ns&lt;BR /&gt;Config:&lt;BR /&gt;Network 0, Inspection 0, Detection 0, Rule ID 268435457&lt;BR /&gt;Additional Information:&lt;BR /&gt;Starting rule matching, zone 4 -&amp;gt; 1, geo 0 -&amp;gt; 0, vlan 0, src sgt: 0, src sgt type: unknown, dst sgt: 0, dst sgt type: unknown, user 9999997, urls app.wdesk.com, hosts app.wdesk.com, no xff&lt;BR /&gt;Matched rule ids 268435457 - Allow&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside(vrfid:0)&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Time Taken: 389441 ns&lt;BR /&gt;Drop-reason: (none) Not a blocking packet, Drop-location: frame 0x0000558ca558c1cc flow (NA)/NA&lt;/P&gt;
&lt;P&gt;So far TAC has not been helpful, and the related bugs were not mentioned. &lt;/P&gt;
&lt;P&gt;Client has tested with browsers&amp;nbsp;TLS13-kyber disabled as mentioned above and was successful in connecting to the website.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Website is app.wdesk.com in case anyone wants to test it. &lt;/P&gt;
&lt;P&gt;Firefox does not seem to create this issue. &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 25 Mar 2025 17:19:16 GMT</pubDate>
    <dc:creator>Garry Cross</dc:creator>
    <dc:date>2025-03-25T17:19:16Z</dc:date>
    <item>
      <title>FTD's - Firepower dropping HTTPS traffic using TLS 1.3 Hybridized Kybe</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5077258#M1111570</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;We have a lot of clients getting the following error when contacting diffrent sites:&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;ERR_SSL_PROTOCOL_ERROR, we have read that SonicWall and Palo Alto also have these problemes. Solution is to turn off "TLS 1.3 Hybridized Kyber Support" in chromium web browser, and/or I have tried to disable all SSL and "Early application detection and URL categorization" for 1.3 in FirePower.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;We are using fw: 7.2.5, have created a TAC case and are waiting for answer.&lt;/P&gt;&lt;P&gt;Anybody else getting this ?&lt;/P&gt;&lt;P&gt;Regards&amp;nbsp;&lt;/P&gt;&lt;P&gt;J.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 13:27:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5077258#M1111570</guid>
      <dc:creator>Jon Are Endrerud</dc:creator>
      <dc:date>2024-04-24T13:27:31Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's - Firepower dropping HTTPS traffic using TLS 1.3 Hybridized</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5077295#M1111572</link>
      <description>&lt;P&gt;Do you use any ssl encrypt policy?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 13:42:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5077295#M1111572</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-24T13:42:56Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's - Firepower dropping HTTPS traffic using TLS 1.3 Hybridized</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5077315#M1111574</link>
      <description>No&lt;BR /&gt;</description>
      <pubDate>Wed, 24 Apr 2024 13:51:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5077315#M1111574</guid>
      <dc:creator>Jon Are Endrerud</dc:creator>
      <dc:date>2024-04-24T13:51:57Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's - Firepower dropping HTTPS traffic using TLS 1.3 Hybridized</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5077326#M1111575</link>
      <description>&lt;P&gt;In FMC&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Policies &amp;gt; access control - access control&lt;/P&gt;
&lt;P&gt;There is&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ssl policy&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you confirm it not list any policy or not&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 14:00:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5077326#M1111575</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-24T14:00:24Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's - Firepower dropping HTTPS traffic using TLS 1.3 Hybridized</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5077353#M1111577</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;I have same issue and I don't have ssl policy (FMC and FTD HA&amp;nbsp; 7.2.5-208)&lt;BR /&gt;&lt;BR /&gt;thanks&lt;BR /&gt;FF&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 14:25:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5077353#M1111577</guid>
      <dc:creator>jasitalymil</dc:creator>
      <dc:date>2024-04-24T14:25:53Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's - Firepower dropping HTTPS traffic using TLS 1.3 Hybridized</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5077355#M1111578</link>
      <description>Im telling you there is no ssl policy, im trying to verify if this only are a browser problem or if there are fixes in 7.2.6.&lt;BR /&gt;&lt;BR /&gt;Other firewall vendors are facing problems.&lt;BR /&gt;</description>
      <pubDate>Wed, 24 Apr 2024 14:26:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5077355#M1111578</guid>
      <dc:creator>Jon Are Endrerud</dc:creator>
      <dc:date>2024-04-24T14:26:57Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's - Firepower dropping HTTPS traffic using TLS 1.3 Hybridized</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5077384#M1111581</link>
      <description>&lt;P&gt;&lt;A href="https://bst.cisco.com/bugsearch/bug/CSCwf00417?rfs=qvlogin" target="_blank"&gt;https://bst.cisco.com/bugsearch/bug/CSCwf00417?rfs=qvlogin&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Check this bug and it workaround&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 14:43:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5077384#M1111581</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-24T14:43:39Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's - Firepower dropping HTTPS traffic using TLS 1.3 Hybridized</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5077423#M1111584</link>
      <description>This is not it, versions dont match, not error either. The problem arose 16 april approx when browser functionality was changes. Upgrade or not to 7.2.6 is the question.&lt;BR /&gt;</description>
      <pubDate>Wed, 24 Apr 2024 15:20:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5077423#M1111584</guid>
      <dc:creator>Jon Are Endrerud</dc:creator>
      <dc:date>2024-04-24T15:20:57Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's - Firepower dropping HTTPS traffic using TLS 1.3 Hybridized</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5077496#M1111588</link>
      <description>&lt;A href="https://www.sonicwall.com/support/knowledge-base/websites-randomly-gets-blocked-or-allowed-with-no-changes-made-after-browser-upgrades-v124/240422222041287/" target="_blank"&gt;https://www.sonicwall.com/support/knowledge-base/websites-randomly-gets-blocked-or-allowed-with-no-changes-made-after-browser-upgrades-v124/240422222041287/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;This is sonicwall post&lt;BR /&gt;</description>
      <pubDate>Wed, 24 Apr 2024 16:30:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5077496#M1111588</guid>
      <dc:creator>Jon Are Endrerud</dc:creator>
      <dc:date>2024-04-24T16:30:57Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's - Firepower dropping HTTPS traffic using TLS 1.3 Hybridized</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5077518#M1111589</link>
      <description>&lt;P&gt;The traffic is https and hence ftd can not inspect inside the packet (without ssl policy).&lt;/P&gt;
&lt;P&gt;I shate with you bug and one of workaround is use prefilter' or you can use ACP match applications https action is trust.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 16:52:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5077518#M1111589</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-24T16:52:02Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's - Firepower dropping HTTPS traffic using TLS 1.3 Hybridized</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5077985#M1111593</link>
      <description>&lt;P&gt;We are seeing the same thing on 7.2.5.1&lt;BR /&gt;Prefilter rules do fix it, but since it is a lot of websites not working it is really not a way to go. We have also created a TAC case on the issue. Looking around different forums many are seeing this issue, not just on firepower.&amp;nbsp;&lt;BR /&gt;Hope to get an update soon as this is a major issue for customers.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 06:01:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5077985#M1111593</guid>
      <dc:creator>SFrahm</dc:creator>
      <dc:date>2024-04-25T06:01:23Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's - Firepower dropping HTTPS traffic using TLS 1.3 Hybridized</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5078010#M1111594</link>
      <description>&lt;P&gt;Same problem seems to happen if a WSA (Secure Web Appliance) is in the path. No workaround there yet, besides disabling Kyber Support in the client browsers.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 06:48:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5078010#M1111594</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2024-04-25T06:48:01Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's - Firepower dropping HTTPS traffic using TLS 1.3 Hybridized</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5078114#M1111595</link>
      <description>&lt;P&gt;After going through diffrent blogs and sites of other verdors, I see this has been a discussion going on for months. Seeing discussions on fortinet site in nov last year. Chromium developers are blaming firewall/security vendors for the problem. I guess we are stuck in the middle. Problems started with versions Chrome&amp;nbsp;124.0.6367.61 and&amp;nbsp;Edge Version 124.0.2478.51.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 08:10:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5078114#M1111595</guid>
      <dc:creator>Jon Are Endrerud</dc:creator>
      <dc:date>2024-04-25T08:10:28Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's - Firepower dropping HTTPS traffic using TLS 1.3 Hybridized</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5078122#M1111596</link>
      <description>&lt;P&gt;I dont have time these day, if you can wait me to next weekend and I will check again&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks for waiting&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 08:11:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5078122#M1111596</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-25T08:11:59Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's - Firepower dropping HTTPS traffic using TLS 1.3 Hybridized</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5078852#M1111622</link>
      <description>&lt;P&gt;Same issue on FMC and FTD HA 7.2.6. What a fun time figuring that one out.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 19:53:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5078852#M1111622</guid>
      <dc:creator>swilke318</dc:creator>
      <dc:date>2024-04-25T19:53:06Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's - Firepower dropping HTTPS traffic using TLS 1.3 Hybridized</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5079096#M1111636</link>
      <description>&lt;P&gt;Thank you for this verification. I still havent got an initial answer from TAC on this.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 07:25:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5079096#M1111636</guid>
      <dc:creator>Jon Are Endrerud</dc:creator>
      <dc:date>2024-04-26T07:25:41Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's - Firepower dropping HTTPS traffic using TLS 1.3 Hybridized</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5079339#M1111655</link>
      <description>&lt;P&gt;We have the problem when traffic is fastpath also, is this a browser problem alone or what do you think ?&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 11:16:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5079339#M1111655</guid>
      <dc:creator>Jon Are Endrerud</dc:creator>
      <dc:date>2024-04-26T11:16:39Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's - Firepower dropping HTTPS traffic using TLS 1.3 Hybridized</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5079364#M1111656</link>
      <description>&lt;P&gt;Fastpath of prefilter is done and you face same issue?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 11:34:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5079364#M1111656</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-26T11:34:52Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's - Firepower dropping HTTPS traffic using TLS 1.3 Hybridized</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5079368#M1111657</link>
      <description>&lt;P&gt;Yes, some helpdesk cases just came in from IP's in the prefilter-fastpath rules.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 11:36:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5079368#M1111657</guid>
      <dc:creator>Jon Are Endrerud</dc:creator>
      <dc:date>2024-04-26T11:36:34Z</dc:date>
    </item>
    <item>
      <title>Re: FTD's - Firepower dropping HTTPS traffic using TLS 1.3 Hybridized</title>
      <link>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5079374#M1111658</link>
      <description>&lt;P&gt;Forget this post, after som tshoot, there was an error in the interface list.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 11:43:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-s-firepower-dropping-https-traffic-using-tls-1-3-hybridized/m-p/5079374#M1111658</guid>
      <dc:creator>Jon Are Endrerud</dc:creator>
      <dc:date>2024-04-26T11:43:22Z</dc:date>
    </item>
  </channel>
</rss>

