Cisco Bug: CSCuj15391 - ssl to untrusted server cache-hit should reset expiration
Oct 15, 2013
- Cisco ASA Next-Generation Firewall Services
Known Affected Releases
Symptom: The expectation is that the pass-through cache-hit would work for 30 seconds, such that if multiple flows cause hits in the cache, then the 30s cache-expiration would be extended for 30s after the last flow. The defect describes an issue where the cache-expiration was not being extended for every flow, so a failure would recur 30s after the first fail, even if there were permitted flows more recently than 30s. Conditions: In this release there is a new decryption settings feature that allows traffic flows to a server that is untrusted or has a server-cert handshake failure. This feature relies on firstly detecting the TLS failure and subsequently allowing the flow based on a cache-hit for that particular server-cert. The expectation is that the cache-hit would work for 30 seconds, such that if multiple flows cause hits in the cache, then the 30s cache-expiration would be extended for 30s after the last flow.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
- Full Description (including symptoms, conditions and workarounds)
- Known Fixed Releases
- Related Community Discussions
- Number of Related Support Cases