Issue metadata
Sign in to add a comment
|
ERR_SSL_VERSION_INTERFERENCE for https://cdn.optimizely.com/
Reported by
komm...@googlemail.com,
Sep 3
|
||||||||||||||||||||
Issue descriptionUserAgent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/71.0.3541.0 Safari/537.36 Example URL: https://cdn.optimizely.com/ Steps to reproduce the problem: 1. Visit https://cdn.optimizely.com/ 2. Get ERR_SSL_VERSION_INTERFERENCE What is the expected behavior? A TLS 1.3 connection should be established. What went wrong? I don't know. I'm in my private environment with no middle boxes that fiddle around in the TLS handshake. Did this work before? Yes 68.0.3440.106 Chrome version: 71.0.3541.0 Channel: canary OS Version: 10.0 Flash Version:
,
Sep 3
No, I don't know anybody there and don't know anything about their infrastructure. I just work for a company that loads content from this host on our site.
,
Sep 3
Thank you for providing more feedback. Adding the requester to the cc list. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Sep 3
Looks like that site is hosted by Akamai. Mozilla ran into this with another Akamai-hosted site. It sounds like the issue is that older versions of OpenSSL had a bug in their draft versions. I'll reach out to them too, but my understanding is they be updating their OpenSSL.
,
Sep 4
Akamai tells me TLS 1.3 will be disabled over their network starting 9/4 through 9/7. Snoozing this for next week: we should check the issue's been resolved by then and, if not, follow up with them.
,
Sep 5
This appears to be resolved now.
,
Sep 5
Yes, it is (for now). They have disabled TLS 1.3 on their end. Hopefully this won't break again when they decide to reactivate TLS 1.3.
,
Sep 10
The NextAction date has arrived: 2018-09-10 |
|||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||
Comment 1 by davidben@chromium.org
, Sep 3Labels: Needs-Feedback