Same issue here. Pretty sure it is a bug in the old mono windows build used in Unity!
Turns out the thread started by ConnectAsync gets stuck in setClientStream() on AuthenticateAsClient for up to 5 minutes. I assume unity wipes the whole mono memory and this doesn’t cleanup the C++ side of things used by AuthenticateAsClient (well mono doesn’t do it properly I guess). Causing the method to break after stopping and restarting.
sslStream = new SslStream(
_stream,
false,
conf.ServerCertificateValidationCallback,
conf.ClientCertificateSelectionCallback);
IAsyncResult result = sslStream.BeginAuthenticateAsClient(
host,
conf.ClientCertificates,
conf.EnabledSslProtocols,
conf.CheckCertificateRevocation, (IAsyncResult res) =>
{
}, null);
bool inTime = result.AsyncWaitHandle.WaitOne(timeoutMs);
if (inTime)
{
sslStream.EndAuthenticateAsClient(result);
result.AsyncWaitHandle.Close();
returnedInTime = true;
//worked just fine
}
else
{
sslStream.Dispose();
result.AsyncWaitHandle.Close();
returnedInTime = false;
//failed. cleanup. return error
}
Not a pretty solution but it works. Instead of directly calling AuthenticateAsClient I use the asynchronous method to do it. Then I wait a few seconds. Does it hang? If yes I kill it. This part is wrapped in another method which first tries to connect with a low timeout. Lets say 5 seconds in timeoutMs. If nothing happens after those 5 seconds I kill it. In another method I just try to reconnect if it fails once. This time with a longer timeout. Turns out after the first attempt gets stuck and fails the second one will work. Let me know if anyone has any improvements.
Installed websocket-sharp through nuget, version 1.0.3-rc11. Used to work fine, but suddenly started getting the following error:
PM|Fatal|WebSocket.connect|WebSocketSharp.WebSocketException: An error has occurred during a TLS handshake. ---> System.Security.Authentication.AuthenticationException: A call to SSPI failed, see inner exception. ---> System.ComponentModel.Win32Exception: The function requested is not supported
--- End of inner exception stack trace ---
at System.Net.Security.SslState.StartSendAuthResetSignal(ProtocolToken message, AsyncProtocolRequest asyncRequest, Exception exception)
at System.Net.Security.SslState.CheckCompletionBeforeNextReceive(ProtocolToken message, AsyncProtocolRequest asyncRequest)
at System.Net.Security.SslState.ProcessReceivedBlob(Byte[] buffer, Int32 count, AsyncProtocolRequest asyncRequest)
at System.Net.Security.SslState.StartReceiveBlob(Byte[] buffer, AsyncProtocolRequest asyncRequest)
at System.Net.Security.SslState.CheckCompletionBeforeNextReceive(ProtocolToken message, AsyncProtocolRequest asyncRequest)
at System.Net.Security.SslState.ForceAuthentication(Boolean receiveFirst, Byte[] buffer, AsyncProtocolRequest asyncRequest)
at System.Net.Security.SslState.ProcessAuthentication(LazyAsyncResult lazyResult)
at WebSocketSharp.WebSocket.setClientStream()
--- End of inner exception stack trace ---
at WebSocketSharp.WebSocket.setClientStream()
at WebSocketSharp.WebSocket.doHandshake()
at WebSocketSharp.WebSocket.connect()
Any idea why this would be happening?
My code is below:
WebSocket ws = new WebSocket(url.AbsoluteUri);
ws.SetCredentials(username, password, true);
ws.OnMessage += (sender, e) => {
...
};
ws.OnOpen += (sender, e) =>
{
ws.SendAsync(openingMessage, start);
};
ws.ConnectAsync();
Is TLS v1.3 enabled (for your ‘Client’) upon your machine (maybe?) — have you tried with TLS v1.2 (and even TLS v1.1) (?). Or perhaps due to a (websocket) timeout (- that can especially occur more often/easily happen when pausing for thought/analysis during debugging).
It appears that when it checks if the connection is available, and the ready-state is set to (‘WebSocketState’) ‘Closed’, it reports the error «This operation isn’t available in: closed».
It’s probably worth checking your certificates (/client certificate). Have you tried temporarily disabling the client and/or server certificate validation (?) — in case it sheds some light / gives you a clue. My money (/guess) is upon the certificates being the most likely/general cause.
Probably/generally less likely a concern, but does the cert/s match-up/comply with the enabled ciphers upon your client (/and server machine) (? — maybe someone has disabled insecure ciphers upon one of the machines).
Have you explicitly set the ‘EnabledSslProtocols’ property (- rather than it falling-back to ‘Default’ which is supposedly the old options of Tls v1.0 & Ssl3)?
Have you run both the client & server (elevated/run-)as ‘Administrator’/with Administrator rights/permissions (?).
Does your server cert contain a private key?
Knowing the specific version of ‘WebSocket-Sharp’ that you’re using could possibly prove useful to know (- ?).
As TLS (& SSL) and with certs in the mix, it can be a technical subject to deal with/predict (- I can’t say for 100% sure), but you could consider temporarily enabling more extensive logging for Windows ‘SCHANNEL’/TLS — (for the brave/careful — you should always back-up your Windows registry first before apply changes) via the Windows Registry, to see if it captures a/some future detail/s:
SCHANNEL TLS/SSL logging — 1=error, 2=warning; error & warning = 3; in the «System» log
- Bitwise OR; e.g. value of ‘7’
HKEY_LOCAL_MACHINESystemCurrentControlSetControlSecurityProvidersSCHANNELEventLogging
Value Description
0x0000 Do not log
0x0001 Log error messages
0x0002 Log warnings
0x0004 Log informational and success events
Contents
- What Does a TLS Handshake Mean?
- How to Fix TLS Handshake Issues
- Solution 1: Ensuring the Correct System Time
- Solution 2: Changing the TLS Protocol in Windows 10
- Solution 3: Deleting the Certificate Database or Browser Profile
- Solution 4: Resetting Your Browser
The Internet has made it convenient for us to find any information we need. You can visit websites directly or use a search engine like Google to access various types of data. However, there are times when we are not able to open web pages, and there could be several reasons behind this. In some cases, it may have something to do with your network connection. On the other hand, another common issue that causes this problem is a TLS handshake failure.
Now, you might ask, “What does a TLS handshake mean?” TLS stands for Transport Layer Security, which is an encryption protocol. Communications made via this protocol remain private and secure. In this post, we are going to explain what happens in a TLS handshake. In this way, you will gain a better grasp of the concept. Moreover, we will teach you how to fix the TLS handshake failed error.
What Does a TLS Handshake Mean?
As we all know, when there is a form of negotiation or greeting between two people, we seal it with a handshake. Similarly, when two servers communicate and acknowledge each other, they form a TLS handshake. During this process, the servers go through verification. They establish encryption while exchanging keys. Once all the details have been proven to be authentic, the data exchange will begin. Here are the four steps involved in a TLS handshake:
- Indicating the TLS version which will be used for communication.
- Selecting the encryption algorithm for communication.
- A public key and the digital signature of the SSL certificate issuer will be used to verify authenticity.
- Session keys will be generated, which will then be exchanged between the two servers.
To make things simple, both parties will say ‘hello’ first. Then, the server will provide a certificate, which the client will verify. Once the certificate has been proven to be authentic, the session will begin. Before that, a key will be created, which will allow the data exchange between the servers.
How to Fix TLS Handshake Issues
Unfortunately, if the problem stems from the server, there is nothing you can do. For instance, if the certificate from the server cannot be authenticated, then the matter is out of your hands. However, if you are having issues with the browser you’re using, then there are still plenty of workarounds you can try. Also, if you’re dealing with a mismatch in the TLS protocol, you can fix the problem from the browser.
Various reasons could be behind a TLS handshake failure. Before you try to fix the problem, you should ensure that you’re definitely dealing with a TLS handshake error. In most cases, you can follow these rules:
- Try visiting other sites and see if the problem persists.
- If you’re using a WiFi network, try switching to a wired one.
- Try other network connections. For instance, use a different router or switch to a public network.
Once you’ve established the cause of the problem, you might ask, “Should I disable a TLS handshake on my browser?” We understand your frustration, but we do not recommend doing it. After all, the TLS protocol is one of the best ways to ensure a secure browsing experience. Indeed, you can continue browsing a website even with an invalid certificate. However, you should never perform any form of transaction with it. For example, do not submit password credentials or use your credit card.
On the other hand, there are times when the TLS handshake failure stems from issues with your browser. In this case, you can fix the problem by reconfiguring some settings on your browser. We’ll share some of the best workarounds below.
Solution 1: Ensuring the Correct System Time
Most of the time, a TLS handshake fails because of incorrect system time settings. Keep in mind that the system time is a vital factor in testing whether a certificate is still valid or expired. So, if the time on your PC does not match the server’s, then it will seem like the certificates are no longer valid. So, we recommend that you set the system time to ‘automatic’. Here are the steps:
- On your keyboard, press Windows Key+I. Doing so will open the Settings app.
- Once you’re on the Settings app, select Time & Language.
- Go to the right pane, then toggle the switch under Set Time Automatically to On.
- Restart your computer, then try visiting the site again to see if the TLS handshake error is gone.
Solution 2: Changing the TLS Protocol in Windows 10
Perhaps, the issue has something to do with the TLS version that your browser is using. It is worth noting that Windows 10 and earlier versions of the operating system centralize the protocol settings. You can access Internet Properties to switch to a different TLS version. To do that, follow these instructions:
- Launch the Run dialog box by pressing Windows Key+R on your keyboard.
- Inside the Run dialog box, type “inetcpl.cpl” (no quotes), then click OK.
- On the Internet Properties window, go to the Advanced tab.
- Scroll down until you get to the Security section, where you can add or remove TLS protocols.
- If the website you’re trying to access needs TLS 1.2, then you need to select it.
- Click Apply and OK to save the changes you’ve made.
- After changing the TLS version, try accessing the same website again.
When it comes to TLS protocols, IE, Chrome, and Edge take advantage of Windows features. Meanwhile, Firefox manages its own certificate database and TLS protocols. So, if you want to change the TLS version on Firefox, use the following steps:
- Launch Firefox, then type “about:config” (no quotes) in the address bar.
- Press Enter, then click the search box.
- Type “TLS” (no quotes), then look for security.tls.version.min.
- You can modify that into any of the following:
Force TLS 1 and 1.1 by entering 1 and 2.
Force TLS 1.2 by entering 3.
Force a maximum protocol of TLS 1.3 by entering 4.
Solution 3: Deleting the Certificate Database or Browser Profile
Browsers keep a certificate database. For instance, Firefox profiles maintain a cert8.db file. There is one way to know that the TLS handshake failure is related to the local certificate database. You can try deleting the cert8.db file on Firefox. If the error disappears when you restart your computer and browser, then you’ve determined the culprit.
For Edge, the Certificate Manager is responsible for handling the certificates. You can delete the certificates by following these steps:
- Open Edge, then enter “edge://settings/privacy” (no quotes) in the address bar.
- Click the ‘Manage HTTPS/SSL certificates and settings’ option, then delete the certificates.
If you’re having trouble finding the certificate database, your best bet is to delete the browser profile. Once you’ve done this, you can try accessing the website again to see if the TLS error is gone.
Solution 4: Resetting Your Browser
If none of the fixes we shared is able to resolve the TLS problem, then your last resort is to reset your browser. The best way to do this is to uninstall and reinstall your browser. Once you’ve done this, you can try accessing the website again to check if the TLS error is gone.
In some cases, the TLS handshake times out, preventing you from visiting the website. When this happens, you’d naturally ask, “How long does a TLS handshake take?” Well, it should take a few seconds. If it takes longer than a minute or two, then you might have a slow network connection. On the other hand, it’s also possible that your browser is overloaded with extensions, add-ons, and other junk.
When this happens, you must use a reliable PC junk cleaner like Auslogics BoostSpeed. You can use this tool to get rid of unneeded browser files easily. What’s more, BoostSpeed has features that allow you to tweak non-optimal browser settings, ensuring smooth and fast operation.
Which of the solutions helped you fix the TLS handshake issue?
Let us know in the comments below!
SSL/TLS Handshake process begins when your browser sends a request to make a secure connection with a web server like Apache. Though sometimes an error occurs, and one of the commonly faced SSL/TLS errors is an “SSL Handshake Failed error,” or also known as “SSL Handshake Failed.”
If you’re not having the right answer to what this SSL error means, then no worries, we’ve got your back. Read further and know what’s this SSL Handshake Failed Error, why it occurs, and how to fix the SSL/TLS Handshake Failed Error.
What Does SSL/TLS Handshake Failed Mean and What Causes It?
The SSL Handshake Failed error occurs when there’s a protocol mismatch. In other words, whenever the client and the server do not have mutual support for the same SSL/TLS version, it shows this SSL/TLS Handshake failed error message.
Once the user sends the secure connection request to the web browser, the browser is expected to send a public key to your computer, which is automatically verified against a list of CAs. And, the computer generates a key and encrypts it with the public key after receiving the certificate.
This SSL/TLS Handshake Failed Error occurs whenever the OS hasn’t granted the read access to the OS, ultimately preventing the complete authentication of the webserver, which indicates that the browser’s connection with the web server is not secure.
Some Reasons That Causes SSL/TLS Handshake Failed Error
CAUSE | DESCRIPTION | Who Can Fix It? |
---|---|---|
Incorrect System Time | The date and time of the client device are not correct. | Client |
Browser Error | Configuration of a browser is causing the error | Client |
Main-in-the-middle | The connection is manipulated or intercepted by a third-party. | Client |
Protocol Mismatch | The server doesn’t support the protocol used by the client. | Server |
Cipher Suite Mismatch | The server doesn’t support the cipher suite used by the client. | Server |
SNI-Enabled Server | SNI-enabled servers can’t communicate with the client. | Server |
Incorrect Certificate |
|
Server |
Now, let’s see each of the reasons for the SSL/TLS Handshake Fail error with the solution in detail.
Here’s the Client-Side Errors and its Solution
Whenever an SSL/TLS Handshake fails, it’s mostly due to certain things going on with the server, website, and the configuration of its installed SSL/TLS.
Presently the culprit is TLS configuration as support for SSL 3.0 is deprecated. However, there’s a distinct possibility that a client-side error can be the reason behind the SSL/TLS Handshake Failed error. And, some of the common ones are like incorrect system time or browser updates.
Let’s see some of the common causes of SSL Handshake fail error in detail.
1. Incorrect System Time
Not always happen, but sometimes the system clock differs from the actual time. Maybe you did it intentionally, accidental change of settings, or any other reason. It’s a fact that SSL/TLS certificates come with a specific validity period, so the date and time of the system is equally important.
So, the solution is to change the system time and date to correct one, if the system clock is not showing the right time and date. But again, there’s no need to change your system time if it’s correct, as it’s likely that the cause of the error is not the System time.
2. Browser Error
It’s not any browser error. But, SSL/TLS Handshake Failed Error is due to some mistakes made by your browser. Sometimes it happens, that your browser might be causing this error due to certain misconfiguration or a plugin can make sure things to work differently, which results in problems while connecting with the legitimate websites. While analyzing what’s exact needs to be fixed is not that easy on your current browser. So, you should try using a different browser.
For instance, if you’re using Google Chrome, then try using Mozilla Firefox or any other such as Apple Safari if OS is Mac or else Microsoft Edge for Windows.
However, if you still face the SSL/TLS Handshake Failed error, even after changing the browser, then the issue is not regarding browser but, most probably, the plugin. To verify whether the error can be solved or not, it’s recommended to disable all your installed plugins and reset your browser settings to default.
3. Man-in-the-Middle
Generally, the MITM (Man-in-the-Middle) attack comes across as a criminal activity that attempts to cause harm or steal user’s information. However, that’s not always the case. Many programs and devices intercept for inspection or any other reason like load balancing, which is sent along to the application server, and this is known as MITM too.
Nevertheless, sometimes issues occur with such devices, which causes the SSL Handshake Failure error. And, the reason could be a network firewall preventing the connection or else configuration on an edge device on the server-side network, which means there’s a possibility that this error could be from the client or server-side depending upon the scenario.
Lastly, if the issue is from the client-side, then you can take a chance of exposing yourself by tweaking the settings on your VPN or antivirus. Though, never drop your antivirus or firewall to connect with a website. And, if the server is causing the issue, then mostly configuration is creating an issue on an edge device.
Here’s the Server-Side Errors and Its Solution
Most of the time, SSL/TLS Handshake failure error is due to server-side issues. Some of them are easy to solve, and some aren’t, and some are not even worth solving at all.
Let’s look at some of the common server-side issues.
1. Protocol Mismatch
It’s one of the errors which can happen due to both the server-side or the client-side, and generally, it’s not worth solving depending upon the circumstance. And when it’s about ciphers and protocols, it’s advised to move forward rather than backward.
For instance:
TLS 1.2 came more than a decade ago, and small segments of websites still fail to support it. Earlier back in March 2018, the final version of TLS 1.3 was published as RFC 8446 by the IETF. And, sites were also advised for adding support for TLS 1.3 at their earliest.
So, if the SSL/TLS Handshake Failure error is due to protocol mismatch, it generally means the client and server do not have mutual support for the same TLS version.
For example:
- The client supports TLS 1.0 and TLS 1.1, whereas the server supports TLS 1.2.
As shown in this example, the TLS protocol is not supported mutually. So, it’s likely that the server won’t support backward versions. Nevertheless, the server shouldn’t fix this as well. In this above example, the client must be recommended to upgrade their browser, or else it must be latest with the latest TLS version supported. Presently all we can suggest is that TLS 1.2 or TLS 1.3 must be used, or else support must be added for it.
2. Cipher Suite Mismatch
A cipher suite is quite similar to the Protocol Mismatch. SSL/TLS isn’t just a single algorithm that handles everything on its own but a combination of numerous algorithms that serves different functions and work with each other to make up SSL/TLS.
Nevertheless, Cipher Suites used by TLS 1.3 has been refined. Earlier, Cipher Suite has algorithms that handled:
- Symmetric Session Key Encryption
- Asymmetric Public Key Encryption
- Signature Hashing
- Key Generation
Different Organizations and Government Agencies have different types of encryption standards that suggest different kinds of cipher suites so clients can have different options while being able to find a mutually acceptable cipher. No doubt, it’s less likely that you get a site that only supports a single cipher suite.
Many times, it happens within a network, if you’re doing SSL bridging, where an edge device receives and decrypts HTTPS traffic and then re-encrypts it to send it to the application server. If the application server and edge device fail to share a mutually supported cipher suite, it will cause errors. Similar to Protocol versions, it’s also advisable for cipher suites, to never go backward but only moves forward.
Lastly, a protocol version or cipher suite is deprecated because there’s a vulnerability in that version. So, going back to the earlier version will only make your connection less secure.
3. Incorrect SSL/TLS Certificate
Many different reasons can make a browser view at an SSL/TLS Certificate as incorrect while preventing it from the successful handshake. Let’s dive into it in the next sub-sections and try to materialize the different issues that result because of a failed handshake due to the technical level.
- Host Name Mismatch: Hostname fails to match with the CN in the certificate.
- Incorrect Certificate Chain: Intermediate missing in the certificate chain.
- Expired/Revoked Certificate: The server presents an untrusted, revoked, or expired SSL/TLS certificate.
- Self-Signed Replacements: Certificate replacements or Internal Networks confuses the path.
4. The hostname is Not Correct
Previously there was a problem with non-WWW and WWW versions of the websites, but it has been reduced radically by the Certificate Authority community allowing one of them to be listed as a SAN free of cost. The simple solution for this issue is to re-issue the certificate or sometimes use a Wildcard certificate.
5. Certificate Chain is Not Correct
The SSL/TLS and PKI trust model generally relies on root programs, which are the collections of trusted CA root certificates that are stored onto your computer system.
Some of the Root program examples:
- Mozilla root program used by Firefox Desktop and Mobile
- Google root program used by Android OS
- Apple root program used by iOS and macOS
- Microsoft root program used by Windows
Nevertheless, CA root programs are invaluable, that it’s not issued directly, but Certificate Authorities make use of intermediate roots for signing SSL/TLS leaf (end-user) certificates. And, here’s the chain comes into play. The Root CA certificate is used for digitally signing the intermediate roots, and those intermediates are further used for signing other intermediate or end-user leaf SSL/TLS certificates.
So, whenever the browser gets an SSL certificate, the browser does one of the things for sure. It will check whether the signatures follow their authenticity. Looks digital name on the SSL/TLS certificate with the Intermediate root that signed it. Then it looks at the digital signature of the intermediate certificate and checks it back to the certificate, which signed the intermediate. This process is continuous like this till it reaches one of the Root CA certificates in its trust store.
Hence, whenever this process remains incomplete due to any reason, means browser failing to locate even one of their intermediate certificates will result in the SSL handshake failed error. The solution is to install the missing intermediate certificate. To find the missing intermediate certificate solution is to go to the CAs website from whom you purchased your SSL/TLS certificate.
6. Revoked/Expired Certificates
Currently, the maximum validity of an SSL/TLS certificate is of 2 years and three months extra (Total 27 months because CAs allow carrying up three months over from previously installed certificate.) In case, if your SSL/TLS certificate gets expired or due to any reason it gets revoked, then it may result in SSL Handshake Failure error. If this is the reason, then get a valid certificate issued and installed.
7. Self-Signed Replacements
If you’ve installed a self-signed SSL/TLS certificate on your website and its live on the public internet, then it will generate an error. To resolve a mistake, get your SSL/TLS certificate issued from the trusted CAs like Sectigo, Comodo, or DigiCert.
8. SNI-Enabled Servers
Generally, it’s an internal issue that happens between devices, but sometimes there are chances of getting an SSL/TLS handshake failed error if a client communicating with a Server Named Indication (SNI) enabled server is not SNI enabled.
To solve this issue, you must identify what’s the hostname and the port number of the server, while verifying whether it’s SNI-enabled and it’s communicating everything it has to.
Summary
Many times, website owners don’t make any necessary changes until they face a problem, which can’t be overlooked. Though some of the client-side fixes for this SSL/TLS handshake failed, the error is there as its mentioned in this article, mostly it’s going to be server-side.
So, if you’re a regular internet user, your options are limited. The best thing you can do as a website visitor is to inform the owner of the website about the SSL/TLS handshake failed to issue and wait for them to fix it. If they don’t take any action onto it, then it’s best to avoid using that website.
Related Articles:
AboutSSL’s Best Stuff
Disclosure: AboutSSL appreciates your continuous support. It helps us tremendously to keep moving in the competitive SSL industry. Here most of the links which direct you to buy any SSL/TLS related service or products earns us a certain percentage of referral commission. Learn More
Secure Sockets Layer (SSL): It is an internet security protocol based on encryption. It was developed in the year 1996 by Netscape to ensure privacy, authentication, and data integrity. It is the predecessor to TLS encryption. It provides a secure channel between two devices or machines communicating over the Internet or even an internal network. SSL is also used to secure communication between web browsers and web servers. This can be seen when a site’s address has HTTPS, where the ‘S’ stands for ‘secure’. It is also a transparent protocol and requires little to no interaction from the end user in establishing a secure session. Some examples of services protected by SSL are online payments, webmail servers, and system logins.
Transport Layer Security (TLS): It can be described as a more secure and updated version of SSL. It is a cryptographic protocol that allows end-to-end security of data exchanged between different applications over the Internet. It was specifically based on SSL 3.0 and was developed in the year 1999 by the Internet Engineering Task Force (IETF). As SSL has not been updated since the year 1996, TLS has been considered the industry standard for over 20 years. TLS is implemented on top of TCP to encrypt Application Layer protocols like HTTP, FTP, SMTP, and IMAP. It can also be implemented on UDP, DCCP, and SCTP. The main use of TLS is to encrypt the communication between web applications and servers. For example, web browsers loading a website.
An SSL/ TLS handshake error occurs when the client and server can’t establish communication over the SSL/TLS protocol (usually due to a protocol mismatch).
Some common fixes to the SSL/TLS handshake failed error:
1. Correcting System Time: It is one of the easiest and most obvious fixes. If the system date and time on your device are incorrect, it can cause an SSL/TLS handshake failed error. This error happens because the correct date and time are essential for SSL certificates; as they have finite lifespans and have an expiration date.
2. Using a different Browser: Sometimes, the browser in use can cause the SSL/TLS handshake failure. It may be due to a browser misconfiguration or a browser plugin, which can cause problems in connecting to legitimate websites. As finding out the exact misconfiguration can be time-consuming, you can simply try another browser. If you still face the SSL/TLS handshake failure even after changing the browser, the issue usually lies with the browser plugins. To verify whether this is the case, disable all installed plugins and check again.
3. Add website to allowlist: It may be possible that your firewall is intercepting your request for inspection, causing an SSL/TLS handshake failure. To fix this, add the website to your allowlist. For Google Chrome,
- Open the admin console homepage and go to Devices→Chrome.
- Settings→Users & browsers.
- Leave the top organizational unit selected (which it should be by default). This applies the setting to all users and enrolled browsers.
- Scroll down to URL Blocking and enter the website you want to access, under Blocked URL Exceptions.
- Hit Save.
4. Update browser to the latest SSL protocol: To check if your browser is using the latest SSL protocol:
- Visit SSL Labs.
- Click on Projects.
- Click on SSL Client Test.
- Under Protocol Support, check whether your browser supports the latest version of TLS.
Advantages of SSL/TLS:
- Improved Security.
- Easily deployed.
- Ability to use HTTP/2.
Disadvantages of SSL/TLS:
- Speed degradation.
- Allows insecure encryption.
- Plugin incompatibility.