TLS 1.3 is disabled by default on port 443 in ESX since reverse proxy is not, yet FIPS validated for TLS 1.3 usage. This article provides information on how to forcefully enable TLS 1.3 without FIPS on vSphere 8.0u2 and above.
For vSphere 8.0 Update 3 and above:
8.0U2 and Older Releases:
Based on the environment, either of the below two options can be used to change the proxy configuration to enable non-FIPS TLS1.3 on port 443:
Based on environment, either of the below two options can be used:
Change Cluster wide setting using vSphere Configuration Profiles
Change setting on Standalone hosts
Change Cluster wide setting using vSphere Configuration Profiles
Step I: Create a draft.
With the Draft Configuration feature in 8.0U2, cluster configuration can be edited using drafts. Please refer to Using vSphere Configuration Profiles to Manage Host Configuration at a Cluster Level documentation for details.
Step II:
In the Draft tab:
1. Select esx -> services -> rhttpproxy -> CONFIGURE SETTINGS
2. Select a) Show advanced settings -> b) rhttpproxy -> c) vmacore -> d) ssl
3. a) Set protocols to tls1.2, tls1.3.
b) Save the draft
The UI screenshot for 2 & 3:
ssh into ESX and run the below commands to enable tls1.3 on port 443.
Step 1: Get current configuration to a json file.
Step 2: Edit JSON file, add protocols field like below.
If ssl/vmacore objects are already present, they need not be added again.
Step 3: Set the new configuration.
Step 4: Restart rhttpproxy to apply the configuration.
This is similar to the previous section, except that in Step 2 we delete the protocols field in the JSON. If the parent objects ssl and vmacore do not have any other properties, they can be removed as well.
For vSphere 8.0 Update 3 and above, optionally, we can revert the TLS server profile from MANUAL to its previous value.
There is no workaround.