after reboot HTTPS sites give ERR_SSL_VERSION_INTERFERENCE
Reported by
frog2...@gmail.com,
Mar 15 2018
|
|||||||
Issue description
Chrome Version : 65.0.3325.162
OS Version: 10.0
URLs (if applicable) :
Other browsers tested:
Add OK or FAIL after other browsers where you have tested this issue:
Safari:
Firefox:ok
IE/Edge:ok
What steps will reproduce the problem?
1.install a Firewall with HTTPS content inspection
2.install trusted root certificate from Firewall into computer root authority for inspection of HTTPS
What is the expected result?
Chrome defaults back to TLS1.2 so contect inspection can take place on the Firewall
What happens instead of that?
got the error ERR_SSL_VERSION_INTERFERENCE when access any HTTPS site instead of the website
Please provide any additional information below. Attach a screenshot if
possible. NA
UserAgentString: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.162 Safari/537.36
,
Mar 17 2018
Thank you for the quick response. The Firewall is a Watchguard Firebox. They haven't fully implemented TLS1.3 yet. The current Firmware identified TLS1.3 traffic as SSL traffic but content inspect of this fails. This is expected on the Firebox. The current TLS1.3 draft has not been finalised so I'm surprised there is no failback to 1.2 that is automated in Chrome. If a automatic failback is expected then I'm happy to provide logs. If failback to 1.2 is not expected then this is working as expected since Watchguard apreas to be waiting for a final TLS1.3 draft before full support for TLS 1.3 is applied.
,
Mar 19 2018
,
Mar 19 2018
Thank you for providing more feedback. Adding the requester to the cc list. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Mar 19 2018
The issue seems to be out of scope for triaging it from ET end as this speaks about install a Firewall with HTTPS content inspection, hence adding label TE-NeedsTriageHelp and requesting someone from "Internals>Network>SSL" team to have a look into it and help in further triaging it. Thanks!
,
Mar 19 2018
Do you know what version of Watchguard is being used? The lack of fallback is intentional, though we've previously done testing with Watchguard and didn't have issues from their products in our deployment attempt in December, so it sounds like something has changed since then. Possibly one of their recent updates broke things.
,
Mar 19 2018
To clarify the fallback business, a bit, as "fallback" is a bit ambiguous of a word. TLS 1.3, both the draft and final versions, are fully backwards-compatible with TLS 1.2. A compliant TLS 1.2 client can connect to a TLS 1.3 server and a TLS 1.3 client can connect to a compliant TLS 1.2 server. They will securely negotiate TLS 1.2, as that is the highest mutual version. In that sense, there is a downgrade-protected fallback to TLS 1.2. What there isn't is an unsecured fallback to TLS 1.2. That is, we do not work around buggy TLS 1.2 implementations which do not version negotiation correctly. That is intentional to avoid security issues like what previously exacerbated the POODLE vulnerability. This issue suggests that something on your network, perhaps the Watchguard device, is non-compliant and did not implement TLS 1.2 correctly. There is no requirement that devices on your network implement TLS 1.3 yet. They certainly should when that is ready, as TLS 1.3 is a significant improvement over TLS 1.2, but ERR_SSL_VERSION_INTERFERENCE comes from mistakes in TLS *1.2* implementations.
,
Mar 19 2018
,
Oct 18
Are you still running into this issue? If so, what version of Watchguard is being used, per comment #6?
,
Nov 1
Closing due to lack of feedback. Please feel free to file a new issue if you're still running into this. |
|||||||
►
Sign in to add a comment |
|||||||
Comment 1 by svaldez@chromium.org
, Mar 15 2018Labels: Needs-Feedback