Cannot access SSL sites using TLSv3


Article ID: 185069


Updated On:


Web Security Service - WSS ProxySG Software - SGOS


Symantec was alerted to an interoperability issue between ProxySG and ASG products and TLS 1.3 in certain configurations. Google recently enabled field trial support for TLS 1.3, in Chrome Browser and ChromeOS 56 while accessing select Google servers.

Users of Symantec ProxySG, other proxy and filtering solutions may see a connection issue as a result. Clients that enable TLS 1.3, (Chrome 56 and later versions, FireFox 52 and later versions) and access TLS 1.3 enabled servers, may experience SSL connection failures when going through ProxySG or ASG.


  • ProxySG 6.5.9.x or earlier releases
  • ASG or earlier releases
  • ProxySG or earlier releases
  • ProxySG


Fixes for TLS 1.3 interoperability are included in the following releases. Symantec recommends that you upgrade to these or later releases to avoid the issue.

  • SG - May 16, 2017
  • SG - May 24, 2017
  • ASG - May 24, 2017
  • SG - May 26, 2017
  • Web Security Service (WSS) - March 4, 2017



TLS 1.3 can be disabled by accessing URL “chrome://flags/#tls13-variant”, changing the setting from “Default” to “Disabled”, and then relaunching Chrome. The below image shows the configuration set to TLS 1.2:

Note: Chrome will use TLS 1.3 by default starting with Chrome version 65.


TLS 1.3 can be disabled by accessing URL “about:config”, search for security.tls.version.max, change it from “4”, which is TLS 1.3, to “3”, which is TLS 1.2, and restart the browser. The below image shows the the configuration set to “3”, which is TLS 1.2:

User-added image

How to confirm if TLS 1.3 is supported by a browser

SSL Labs provides a URL which will test and report the TLS versions supported by the browser requesting the URL. That URL is The following screenshots show the results of the above URL on FireFox 52 with its default configuration:

User-added image

And after following the steps above to disable TLS 1.3 support:

User-added image

Workaround on ProxySG or ASG

For explicit deployments policy can be added to disable protocol detection for any impacted website. The following knowledge base article describes how this is done in policy: Disable Detect Protocol on exception to resolve an issue with SSL interception failure.  For transparent deployments, a TCP-Tunnel service will need to be created that includes the affected destination IPs. The following knowledge base article describes how this is done in proxy services: