Guest

Preview Tool

Cisco Bug: CSCuj15391 - ssl to untrusted server cache-hit should reset expiration

Last Modified

Oct 15, 2013

Products (1)

  • Cisco ASA Next-Generation Firewall Services

Known Affected Releases

9.1(2)

Description (partial)

Symptom:
The expectation is that the pass-through cache-hit would work for 30 seconds, such that if multiple flows cause hits in the cache, then the 30s cache-expiration would be extended for 30s after the last flow. The defect describes an issue where the cache-expiration was not being extended for every flow, so a failure would recur 30s after the first fail, even if there were permitted flows more recently than 30s.

Conditions:
In this release there is a new decryption settings feature that allows traffic flows to a server that is untrusted or has a server-cert handshake failure. This feature relies on firstly detecting the TLS failure and subsequently allowing the flow based on a cache-hit for that particular server-cert. The expectation is that the cache-hit would work for 30 seconds, such that if multiple flows cause hits in the cache, then the 30s cache-expiration would be extended for 30s after the last flow.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.