SSL Appliance Release Notes

Version 3.9.3

 

Even if you are familiar with the update process, make sure you thoroughly read and understand these release notes, which describe supported platforms, new and changed features and functionality, known and resolved issues, and product and web browser compatibility. They also contain detailed information on prerequisites, warnings, and specific installation instructions for the Cisco SSL 1500, 2000, and 8200 appliances.

from the Support site or Cisco.com.

These release notes are valid for Version 3.9.3 of the Cisco SSL Appliance. You can update appliances running at least Version 3.6.3 or at least Version 3.7.0 of the Cisco SSL Appliance to Version 3.9.2.

For more information, see the following sections:

 

Upgrading Cisco SSL Appliance

This section provides instructions for upgrading your appliance. Make sure to follow the instructions for the version you are currently running. Upgrades are supported for:

Terminology

Files associated with this release:

sslv_3.7.0_to_3.8.0_ca_certificates.p7b

sslv_3.8.0_to_3.8.3_ca_certificates.p7b

sslv_3.8.3_to_3.9.2.1_ca_certificates.p7b

sslv_3.9.2.1_to_3.9.3.1_ca_certificates.p7b

MIBS_SSLV-3.8.3.zip

Upgrade the Appliance

, see Upgrade from 3.7.x or Later to 3.9.3.

If the appliance is running 3.6.3, a two step upgrade process is required, as described in Update the BIOS.

The patch mechanism will not update the rescue image in the system. Hence, if you use the Restore factory defaults option, the appliance will be re-imaged with the version of the rescue image. You must re-apply the patch.

).

Upgrade from 3.7.x or Later to 3.9.3

Upgrading the SSL Appliance to a new software version is straightforward. Make sure the appliance is running software version 3.7.x or later; if it is running software version 3.6.3 see Update the BIOS

Apply a Patch

file, and click OK.

The patch upgrade preserves your existing configuration data and existing logs.


Note 3.7.x or Later: The patch mechanism will not update the rescue image in the system. Hence, if you use the Restore factory defaults option, the appliance will be re-imaged with the version of the rescue image. You must re-apply any patches released since the latest rescue image version. Following the patch upgrade, Cisco recommends you upgrade the rescue image to the latest software version by applying the related .nru (for example, sslv-3.9.3.3-6-cisco.nru).

Apply the NRU

file, and click OK.

The existing rescue image will be replaced with the new image.


Tip As a precaution, back up all configuration and policy data before the upgrade.

Patch Upgrade Procedure


menu.

.

Step 3 Reboot the appliance when prompted.

Step 4 Wait for the upgrade to complete. This might take several minutes, and involves the appliance rebooting a number of times.

Step 5 Update the list of external CA certificates.


Note Without the new list of external CA certificates, the X.509 status for some sites (for example, www.google.com) is "Invalid Issuer." The external CA certificate file (sslv_3.9.2.1_to_sslv_3.9.3.1_ca_certificates.p7b) incrementally updates the CA certificates list provided in previous sslv_ 3.x.x_to_3.x.x_ca_certificates.p7b files. Import the CA certificate file to update the external CA certificates list.

file to

file. If you have previously imported an external CA certificate file, you do not need to import it again.

), follow this procedure.

list.

. You should see an "Upload Successful" message.

message.

 

file. If you have previously imported an external CA certificates file, you do not need to import it again.

), follow this procedure.

list.

. You should see an "Upload Successful" message.

message.

 

certificate files. If you have previously imported an external CA certificates file, you do not need to import it again.

), follow this procedure.

list.

. You should see an "Upload Successful" message.

message.

Back up the PKI store after importing the CA certificates. The system log contains many warnings about duplicate entries; these log entries can be safely ignored.


Warning As a precaution, back up all configurations and policy data before the upgrade.

Update the BIOS

After upgrading a Cisco SSL Appliance to 3.9.x.x from any 3.8.x or 3.7.x release, you must update the BIOS. After the upgrade you will see a message indicating that a firmware update is needed. A message is also displayed on the LCD and in the system log.

command.

The update will take 15 to 20 minutes (or possibly longer, depending on the appliance) and may include a system reboot. Do not interrupt the process.

displayed on the serial console, the process is complete.

Each appliance model may have a distinct BIOS and BMC version. While the SSL1500 has a BIOS and BMC version of r3, the SSL2000 and 8200 have version r1.

button.

Downgrading the Cisco SSL Appliance

In the unlikely event you want to downgrade the appliance, contact Customer Support for assistance.

Changes

The following sections list the changes in the Version 3.9.3 update.

Changes in Version 3.9.3.3

Cisco SSL Appliance 3.9.3.3

cn=abrca.bluecoat.com

cn=bto-services.es.bluecoat.com

cn=device-services.es.bluecoat.com

cn=subscription.es.bluecoat.com

cn=validation.es.bluecoat.com

cn=upload.bluecoat.com

cn=remote-support.bluecoat.com

panel.


Note Blue Coat Management Center 1.4.2.1 or later is required for monitoring appliances running SSL Visibility 3.9.3.2. Management Center 1.4.1.1 or earlier is not sup- ported.

This general release for the Cisco SSL Appliance also provides important vulnerability and bug fixes.

There are no new features in SSL Appliance 3.9.3.3.

Changes in Version 3.9.3.2

Cisco SSL Appliance 3.9.3.2

cn=abrca.bluecoat.com

cn=bto-services.es.bluecoat.com

cn=device-services.es.bluecoat.com

cn=subscription.es.bluecoat.com

cn=validation.es.bluecoat.com

cn=upload.bluecoat.com

cn=remote-support.bluecoat.com

panel.


Note Blue Coat Management Center 1.4.2.1 or later is required for monitoring appliances running SSL Visibility 3.9.3.2. Management Center 1.4.1.1 or earlier is not sup- ported.

This general release for the Cisco SSL Appliance also provides important vulnerability and bug fixes.

There are no new features in SSL Appliance 3.9.3.2.

The following sections list the changes in the Version 3.9.3.1 update.

Changes in Version 3.9.3.1

SSL Visibility 3.9.3.1 includes new features:

Failure Mode Options Change: In SSL Appliance 3.9.3.1, the Failure Action (formerly Software Failure Action) configured in the Failure Mode Options for a segment also applies to application port failures for segments configured in Active- Inline Fail-to-Network (AI-FTN) mode. For segments configured in AI-FTN mode, with the Failure Action set to Fail- to-Wire (the default), traffic will be allowed to pass on all network ports in a segment when an application port in that segment goes down (i.e., link-down is detected). When the link has been restored for all application ports, all network ports in the segment will be restored according to the configured Failure Mode Options.


Warning If Fail-to-Wire is configured as the Failure Action, all traffic is allowed to pass while the application port is down. To restore the pre-3.9.3.1 behavior and prevent traffic passing on the network while an application port is down, choose a non- default Failure Action, for example, Drop Packets or Disable Interfaces.

System log enhancement: SSL Appliance 3.9.3.1 provides bracketed alphabetic severity indicators at the beginning of exported system log entries. These characters replace the symbols used in previous releases. If you have scripts that rely on the old prefixes, please update to use the new prefixes. There is no change to the color coding of system log entries in the WebUI.

Severity
3.9.3.1
Previous

FATAL

[F]

!

ERROR

[E]

*

WARN

[W]

#

INFO

[I]

?

DEBUG

[D]

-

EXTRA

[X]

:

VERBOSE

[V]

>

cn=abrca.bluecoat.com

cn=bto-services.es.bluecoat.com

cn=device-services.es.bluecoat.com

cn=subscription.es.bluecoat.com

cn=validation.es.bluecoat.com

cn=upload.bluecoat.com

cn=remote-support.bluecoat.com

cn=courier.sandbox.push.apple.com

If you perform a patch upgrade, you must manually add the sites to the list. If you restore a previous policy con- figuration that did not include the new entries in the list, the current policy is overwritten, and the sites must be added again.

To view the complete list or to add sites to the list, open Policies > Subject/Domain Names List in the WebUI and select sslng-unsupported-sites in the Subject/Domain Names Lists panel.


Note Blue Coat Management Center 1.4.2.1 or later is required for monitoring appliances running SSL Visibility 3.9.3.1. Management Center 1.4.1.1 or earlier is not sup- ported.

This release for the Cisco SSL Appliance also provides important vulnerability and bug fixes.

The following sections list the changes in the Version 3.9.3.2 update.

Changes in Version 3.9.3.2


Tip The SSL Appliance3.9.3.2 Open Source Attributions file does not list the updated version of OpenSSL. However, the OpenSSL version used in SSL Visibility 3.9.3.2 does include these updates.

The following sections list the changes in the Version 3.9.3.1 update.

Changes in Version 3.9.3.1

The following sections list the changes in the Version 3.9.2.2 update.

Changes in Version 3.9.2.2

cn=abrca.bluecoat.com

cn=bto-services.es.bluecoat.com

cn=device-services.es.bluecoat.com

cn=subscription.es.bluecoat.com

cn=validation.es.bluecoat.com

If you perform a patch upgrade, you must manually add the sites to the list. If you restore a previous policy con- figuration that did not include the new entries in the list, the current policy is overwritten, and the sites must be added again.

To view the complete list or to add sites to the list, open Policies > Subject/Domain Names List in the WebUI and select sslng-unsupported-sites in the Subject/Domain Names Lists panel.


Note Blue Coat Management Center 1.4.2.1 or later is required for monitoring appliances running SSL Appliance 3.9.2.2. Management Center 1.4.1.1 or earlier is not supported.

The following sections list the changes in the Version 3.9.2 update.

Changes in Version 3.9.2.1

cn=abrca.bluecoat.com

cn=bto-services.es.bluecoat.com

cn=device-services.es.bluecoat.com

cn=subscription.es.bluecoat.com

cn=validation.es.bluecoat.com

If you perform a patch upgrade, you must manually add the sites to the list. If you restore a previous policy configuration that did not include the new entries in the list, the current policy is overwritten, and the sites must be added again.

panel.


Note Blue Coat Management Center 1.4.2.1 or later is required for monitoring appliances running SSL Visibility 3.9.2.1. Management Center 1.4.1.1 or earlier is not sup- ported.

This general release for the Cisco SSL Appliance also provides important vulnerability and bug fixes.

The following sections list the changes in the Version 3.9.2 update.

Changes in Version 3.9.2

Cisco SSL Appliance 3.9.2

bto-services.es.bluecoat.com

device-services.es.bluecoat.com

subscription.es.bluecoat.com

validation.es.bluecoat.com

To view the complete list, open Policies > Subject/Domain Names List in the WebUI and select sslng-unsupported-sites in the Subject/Domain Names Lists panel.


Note Blue Coat Management Center 1.4.2.1 or later is required for monitoring appliances running SSL 3.9.2. Management Center 1.4.1.1 or earlier is not supported.

This general release for the Cisco SSL Appliance also provides important vulnerability and bug fixes.

The following sections list the changes in the Version 3.8.6 update.

Changes in Version 3.8.6

Changes in Version 3.8.5

There are no new features in 3.8.5.

Changes in Version 3.8.4

, and add the intermediate CAs which are included in the chain.

the changes.

.

Configure a new segment with a ruleset using the appended resigning CA.

If a full certificate chain is not found for a resigning CA, a message will appear in the System Log, which identifies the first missing CA. The SSL Appliance will load the partial CA chain and include it with resigned certificates in inspected SSL sessions.

Changes in Version 3.8.3

TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256

TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384

TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256

TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384


Note If you are getting a "Firmware Mismatch" message on the LCD, run the bios update Command Line Diagnostic (CLD) command in order to upgrade the BMC. The BIOS upgrade may take up to an hour; do not interrupt the process.

1.5.2 = SSL1500

1.5.3 = SSL2000

1.5.4 = SSL8200

Changes in Version 3.8.2

There are no new features in 3.8.2.

Changes in Version 3.8.1

14501.12 = Cisco SSL Appliance Product Family

14501.12.2 = SSL1500

14501.12.3 = SSL2000

14501.12.4 = SSL8200

Resolved Issues

The following issues have been resolved in Version 3.9.3.2:

CVE-2015-7547

The following issues have been resolved in Version 3.9.3.2:


Note The SSL Appliance 3.9.3.2 Open Source Attributions file does not list the updated version of OpenSSL. However, the OpenSSL version used in SSL Appliance 3.9.3.2 does include these updates.

The following issues have been resolved in Version 3.9.3.2:

CVE-2016-0701

CVE-2015-3197

CVE-2015-4000 (updated)

The following issues have been resolved in Version 3.9.3.1

CVE-2012-3425

CVE-2015-1794

CVE-2015-3193

CVE-2015-3194

CVE-2015-3195

CVE-2015-3196

CVE-2015-5312

CVE-2015-5352

CVE-2015-5600

CVE-2015-6563

CVE-2015-6564

CVE-2015-7497

CVE-2015-7498

CVE-2015-7499

CVE-2015-7500

CVE-2015-7575

CVE-2015-7981

CVE-2015-8126

CVE-2015-8241

CVE-2015-8242

CVE-2015-8317

CVE-2015-8472

CVE-2015-8540

CVE-2015-8605

CVE-2016-0777

CVE-2016-0778

The following issues have been resolved in Version 3.9.2.2:

CVE-2002-2443

CVE-2014-5355

CVE-2015-1819

CVE-2015-2694

CVE-2015-2695

CVE-2015-2696

CVE-2015-2697

CVE-2015-2698

CVE-2015-5146

CVE-2015-5194

CVE-2015-5195

CVE-2015-5196

CVE-2015-5219

CVE-2015-5300

CVE-2015-7691

CVE-2015-7692

CVE-2015-7701

CVE-2015-7702

CVE-2015-7703

CVE-2015-7704

CVE-2015-7705

CVE-2015-7850

CVE-2015-7852

CVE-2015-7853

CVE-2015-7855

CVE-2015-7871

CVE-2015-7941

CVE-2015-7942

CVE-2015-8035

The following issues have been resolved in Version 3.9.2.1:

The following issues have been resolved in Version 3.8.6:

CVE-2013-1752

CVE-2013-1753

CVE-2013-7443

CVE-2014-4616

CVE-2014-4650

CVE-2014-7185

CVE-2014-8964

CVE-2015-2325

CVE-2015-2326

CVE-2015-3210

CVE-2015-3414

CVE-2015-3415

CVE-2015-3416

The following issues have been resolved in Version 3.8.5:


Note If SSL traffic traverses the Cisco SSL Appliance more than once, a Layer3/Layer4 cut-through rule to be applied at the Client Hello packet must be created as the first rule in the security policy for one direction of the flow (see below).

Source IP address (or list of addresses)

Destination IP address (or list of addresses)

Destination Port

Traffic Class

An Action of Drop, Cut Through or Reject


Note All Layer3/Layer4 rules that you want to be applied at the Client Hello packet must occur before any non-Layer3/Layer4 rules in the ruleset. Once the policy reaches a rule that includes non- Layer3/Layer4 match fields, all subsequent rules will be applied at the Server Hello/Server Certificate level.

CVE-2011-3389

CVE-2014-8176

CVE-2015-1788

CVE-2015-1789

CVE-2015-1790

CVE-2015-1791

CVE-2015-1792

CVE-2015-4000

CVE-2015-3143

CVE-2015-3144

CVE-2015-3145

CVE-2015-3148

CVE-2015-3153

CVE-2015-3622

The following issues have been resolved in Version 3.8.4:

CVE-2013-0211

CVE-2014-3591

CVE-2014-5270

CVE-2014-8155

CVE-2014-9680

CVE-2015-0282

CVE-2015-0294

CVE-2015-1799

CVE-2015-0837

CVE-2015-1606

CVE-2015-1607

CVE-2015-1798

CVE-2015-1799

CVE-2015-2304

CVE-2015-2806

The following issues have been resolved in Version 3.8.3:

CVE-2009-4135

CVE-2010-0624

CVE-2012-3509

CVE-2012-6656

CVE-2013-1569

CVE-2013-2383

CVE-2013-2384

CVE-2013-2419

CVE-2013-7423

CVE-2014-5351

CVE-2014-5352

CVE-2014-5353

CVE-2014-5354

CVE-2014-6040

CVE-2014-6272

CVE-2014-6585

CVE-2014-6591

CVE-2014-7817

CVE-2014-7824

CVE-2014-7923

CVE-2014-7926

CVE-2014-7940

CVE-2014-8150

CVE-2014-8484

CVE-2014-8485

CVE-2014-8501

CVE-2014-8502

CVE-2014-8503

CVE-2014-8504

CVE-2014-8737

CVE-2014-8738

CVE-2014-9112

CVE-2014-9130

CVE-2014-9297

CVE-2014-9298

CVE-2014-9402

CVE-2014-9421

CVE-2014-9422

CVE-2014-9423

CVE-2014-9447

CVE-2014-9471

CVE-2014-9654

CVE-2014-9656

CVE-2014-9657

CVE-2014-9658

CVE-2014-9659

CVE-2014-9660

CVE-2014-9661

CVE-2014-9662

CVE-2014-9663

CVE-2014-9664

CVE-2014-9665

CVE-2014-9666

CVE-2014-9667

CVE-2014-9668

CVE-2014-9669

CVE-2014-9670

CVE-2014-9671

CVE-2014-9672

CVE-2014-9673

CVE-2014-9674

CVE-2014-9675

CVE-2015-0235

CVE-2015-0247

CVE-2015-1472

CVE-2015-1473

CVE-2015-1572

CVE-2015-0293

CVE-2015-0292

CVE-2015-0289

CVE-2015-0288

CVE-2015-0287

CVE-2015-0286

CVE-2015-0209

CVE-2015-0206

CVE-2015-0205

CVE-2015-0204

CVE-2014-8275

CVE-2014-3707

CVE-2014-3572

CVE-2014-3571

CVE-2014-3570

CVE-2014-3569

CVE-2014-3567

CVE-2014-3513

The following issues have been resolved in Version 3.8.2:

CVE-2010-5107

CVE-2014-3566

CVE-2015-0235

The following issues have been resolved in Version 3.8.1:

CVE-2014-3635

CVE-2014-3636

CVE-2014-3637

CVE-2014-3638

CVE-2014-3639

CVE-2014-6273

CVE-2014-6271

CVE-2014-7169

CVE-2014-7186

CVE-2014-7187

CVE-2014-0487

CVE-2014-0488

CVE-2014-0489

CVE-2014-0490

The following issues have been resolved in Version 3.8.0:

CVE-2012-1016

CVE-2013-1415

CVE-2013-1416

CVE-2013-1418

CVE-2013-6800

CVE-2014-4341

CVE-2014-4342

CVE-2014-4343

CVE-2014-4344

CVE-2014-4345

CVE-2014-3477

CVE-2014-3532

CVE-2014-3533

CVE-2014-3467

CVE-2014-3468

CVE-2014-3469

CVE-2013-4357

CVE-2013-4458

CVE-2014-0475

CVE-2014-4043

CVE-2014-5119

CVE-2014-5270

CVE-2014-0191

CVE-2014-0224

CVE-2014-0195

CVE-2014-0221

CVE-2014-0224

CVE-2014-3470

CVE-2014-3466

CVE-2014-0195

CVE-2014-0221

CVE-2014-0224

CVE-2014-3470

CVE-2014-0195

CVE-2014-0221

CVE-2014-0224

CVE-2014-3470

CVE-2014-4617

CVE-2014-0478

CVE-2014-3505

CVE-2014-3506

CVE-2014-3507

CVE-2014-3508

CVE-2014-3509

CVE-2014-3510

CVE-2014-3511

CVE-2014-3512

CVE-2014-5139

CVE-2014-3613

CVE-2014-3620

CVE-2014-0487

CVE-2014-0488

CVE-2014-0489

CVE-2014-0490

CVE-2012-6151

CVE-2014-2284

CVE-2014-2285

CVE-2014-2310

CVE-2014-2525

CVE-2014-2532

CVE-2014-1912

The following issues have been resolved in Version 3.7.4:

CVE-2014-3477

CVE-2014-3532

CVE-2014-3533

CVE-2014-3467

CVE-2014-3468

CVE-2014-3469

CVE-2013-4357

CVE-2013-4458

CVE-2013-0475

CVE-2013-4043

CVE-2014-3505

CVE-2014-3506

CVE-2014-3506

CVE-2014-3507

CVE-2014-3508

CVE-2014-3509

CVE-2014-3510

CVE-2014-3511

CVE-2014-3512

CVE-2014-5139

The following issues have been resolved in Version 3.7.3:

CVE-2014-0224

The following issues have been resolved in Version 3.7.1:

Known Issues

The following known issues are reported in Version 3.9.3:

For Assistance

Cisco Support

.

, which lists all new and revised Cisco technical documentation, as an RSS feed and deliver content directly to your desktop using a reader application. The RSS feeds are a free service.

If you have any questions or require assistance with the Cisco SSL Appliance, you can also contact Cisco Support:

Call Cisco Support at 1.408.526.7209 or 1.800.553.2447.