Users accessing internet via Cloud SWG using both WSS Agents and Explicit over IPSEC access methods.
All users must authenticate using SAML.
All WSS Agent users can successfully authenticate via the SAML IDP server and browse successfully.
Users accessing services over IPSEC are never redirected to the SAML IDP server to login; instead they are correctly redirected to the Cloud SWG SAML SP, but get following connectivity error on the browser.
PAC file pushed down to browsers indicating traffic should be sent to Proxy at 199.19.250.205:80.
There are no firewall rules blocking TCP port 8443, and a manual telnet from the browser host to 199.19.248.205 port 8443 connects fine.
Bypassing saml.threatpulse.net domain from being proxies seems to workaround the issue.
IPSEC with Explicit Proxy enabled on browsers.
SAML Authentication.
UPE Managed Cloud SWG tenant.
DNS restrictions pushed out to Cloud SWG policy.
Disable DNS restrictions on reference server, or add exemptions for saml.threatpulse.net. In customer case, DNS restrictions were needed for on-premise setup where ProxySG was placed in DMZ with a DNS server, so we had to add exemption for saml.threatpulse.com.
restrict dns
list_of_restricted_domains
except
saml.threatpulse.net
end
A longer term solution is planned on the Cloud SWG side where DNS restrictions pushed to reference Proxy server will not be pushed into the Cloud.
PCAPs on workstation showed that the CONNECT request from browser to saml.threatpulse.net:8443 would fail an SSL handshake - no server_hello response to the client_hello().
PCAPs on Cloud Proxy showed that we were trying to go upstream to the saml.threatpulse.net Web server that failed.
Since we could not reproduce the issue in our test setup, we managed to get clear difference between the working and non working policy traces; working showed that the proxy handled the request with SAML_realm service, but non working indicated that it was picked up incorrectly by trans-proxy service (and hence tried to go upstream to OCS).
The DNS restrictions showed the DNS lookups were restricted. When restricted, the Proxy policy evaluation cannot resolve DNS and caused the issue.
// working from test setup
connection: service.name=SAML_realm_service client.address=10.0.200.3 (NAT address=10.144.102.168) (effective address=10.0.200.3) proxy.port=80 source.port=49872 dest.port=80
client country= pcid=1023
location-id=xxxxxx access_type=firewall_fqdn_psk_vpn
time: 2023-09-27 16:47:26 UTC
CONNECT tcp://saml.threatpulse.net:8443/
DNS lookup was unrestricted
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36
user: unauthenticated
authentication status='cannot_redirect_connect' authorization status='not_attempted'
user: authenticated=false authorized=true relative username=''
// NOK from customer side
connection: service.name=Trans-Proxy client.address=10.107.130.148 (NAT address=10.128.100.14) (effective address=10.107.130.148) proxy.port=80 source.port=57885 dest.port=80
client country= pcid=1023
location-id=xxxxxx access_type=firewall_fqdn_psk_vpn
time: 2023-09-27 14:35:19 UTC
CONNECT tcp://saml.threatpulse.net:8443/
DNS lookup was restricted
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/117.0
user: unauthenticated
authentication status='cannot_redirect_connect' authorization status='not_attempted'
user: authenticated=false authorized=true relative username=''