Correct.

Anyway, @Vieri, try to ensure the ca bundle is updated. I'd say that's
the problem.

Best regards.

On Mon, 2022-02-28 at 13:54 +0100, Simon Matter wrote:
> > I'd say the problem is on the host that might not have all packages
> > updated, namely the ca-certificates (or equivalent) package. At a
> > first
> > glance it doesn't seem like a firewall problem.
> > 
> > @Vieri, please try to do a yum/apt (or equivalent depending on the
> > machine OS package manager) update/upgrade for at least the ca-
> > certificates, openssl and gnutls packages and try again.
> 
> Only problem is the OS in question doesn't have a package management
> :-)
> 
> Did you see this line:
> *  CAfile: C:\cURL\curl-ca-bundle.crt
> 
> Beside that, one thing to keep in mind here is that only using the
> same IP
> address doesn't really mean the request has to come from the same
> server.
> 
> Regards,
> Simon
> 
> > 
> > My 2 cents.
> > Best regards. 
> > 
> > On Mon, 2022-02-28 at 11:39 +0100, Matt Darfeuille wrote:
> > > On 2/28/2022 11:22 AM, Vieri Di Paola wrote:
> > > > Hi,
> > > > 
> > > > Some hosts in the LAN are randomly unable to connect to
> > > > external
> > > > https
> > > > services. All conections are going through a Shorewall routing
> > > > firewall.
> > > > 
> > > > One host in the same vlan with src IP addr. 10.215.111.210 is
> > > > properly
> > > > accessing the following site:
> > > > 
> > > > curl --verbose --head https://teams.microsoft.com
> > > > *   Trying 52.113.194.132:443...
> > > > * Connected to teams.microsoft.com (52.113.194.132) port 443
> > > > (#0)
> > > > * ALPN, offering h2
> > > > * ALPN, offering http/1.1
> > > > *  CAfile: C:\cURL\curl-ca-bundle.crt
> > > > *  CApath: none
> > > > * TLSv1.0 (OUT), TLS header, Certificate Status (22):
> > > > * TLSv1.3 (OUT), TLS handshake, Client hello (1):
> > > > * TLSv1.2 (IN), TLS header, Certificate Status (22):
> > > > * TLSv1.3 (IN), TLS handshake, Server hello (2):
> > > > * TLSv1.2 (IN), TLS handshake, Certificate (11):
> > > > * TLSv1.2 (IN), TLS handshake, Server key exchange (12):
> > > > * TLSv1.2 (IN), TLS handshake, Server finished (14):
> > > > * TLSv1.2 (OUT), TLS header, Certificate Status (22):
> > > > * TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
> > > > * TLSv1.2 (OUT), TLS header, Finished (20):
> > > > * TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
> > > > * TLSv1.2 (OUT), TLS header, Certificate Status (22):
> > > > * TLSv1.2 (OUT), TLS handshake, Finished (20):
> > > > * TLSv1.2 (IN), TLS header, Finished (20):
> > > > * TLSv1.2 (IN), TLS header, Certificate Status (22):
> > > > * TLSv1.2 (IN), TLS handshake, Finished (20):
> > > > * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
> > > > * ALPN, server accepted to use h2
> > > > [etc]
> > > > 
> > > > Another host in the same vlan with IP addr. 10.215.111.199 is
> > > > unable
> > > > to connect to the exact same site and at the same time
> > > > (52.113.194.132):
> > > > 
> > > > curl --verbose --head https://teams.microsoft.com
> > > > *   Trying 52.113.194.132:443...
> > > > * Connected to teams.microsoft.com (52.113.194.132) port 443
> > > > (#0)
> > > > * ALPN, offering h2
> > > > * ALPN, offering http/1.1
> > > > *  CAfile: C:\curl\curl-ca-bundle.crt
> > > > *  CApath: none
> > > > * TLSv1.0 (OUT), TLS header, Certificate Status (22):
> > > > * TLSv1.3 (OUT), TLS handshake, Client hello (1):
> > > > * TLSv1.0 (OUT), TLS header, Unknown (21):
> > > > * TLSv1.3 (OUT), TLS alert, decode error (562):
> > > > * error:0A000126:SSL routines::unexpected eof while reading
> > > > * Closing connection 0
> > > > curl: (35) error:0A000126:SSL routines::unexpected eof while
> > > > reading
> > > > 
> > > > This is what I see with tcpdump while trying the above
> > > > connection
> > > > ("wan" is the interface facing Internet):
> > > > 
> > > > # tcpdump -n -i wan host 10.215.111.199
> > > > dropped privs to pcap
> > > > tcpdump: verbose output suppressed, use -v[v]... for full
> > > > protocol
> > > > decode
> > > > listening on wan, link-type EN10MB (Ethernet), snapshot length
> > > > 262144 bytes
> > > > 10:58:55.602587 IP 10.215.111.199.60258 > 52.113.194.132.443:
> > > > Flags
> > > > [S], seq 1097095637, win 64240, options [mss 1460,nop,wscale
> > > > 8,nop,nop,sackOK], length 0
> > > > 10:58:55.602797 IP 52.113.194.132.443 > 10.215.111.199.60258:
> > > > Flags
> > > > [S.], seq 2635751257, ack 1097095638, win 14600, options [mss
> > > > 1460,nop,nop,sackOK,nop,wscale 7], length 0
> > > > 10:58:55.604900 IP 10.215.111.199.60258 > 52.113.194.132.443:
> > > > Flags
> > > > [.], ack 1, win 1026, length 0
> > > > 10:58:55.880427 IP 10.215.111.199.60258 > 52.113.194.132.443:
> > > > Flags
> > > > [P.], seq 1:518, ack 1, win 1026, length 517
> > > > 10:58:55.880581 IP 52.113.194.132.443 > 10.215.111.199.60258:
> > > > Flags
> > > > [.], ack 518, win 123, length 0
> > > > 
> > > > What makes things "worse" is that if I tamper with this host's
> > > > "hosts"
> > > > file and manually set the name resolution of
> > > > teams.microsoft.com to
> > > > 52.113.195.132 (another valid IP addr. for teams.microsoft.com)
> > > > then
> > > > it can finally connect as expected.
> > > > 
> > > > There's no shorewall rule to block 52.113.194.132:443 so I
> > > > don't
> > > > know
> > > > why the TLS handshake is failing.
> > > > 
> > > > I'd like to determine if this is a communications issue (ie.
> > > > Shorewall) or a client/server hosts problem.
> > > > 
> > > 
> > > I'm not sure that this is the issue, but Teams requires lots of
> > > open
> > > ports to work.
> > > I had to open those for the Desktop edition.
> > > 
> > 
> > _______________________________________________
> > Shorewall-users mailing list
> > Shorewall-users@lists.sourceforge.net
> > https://lists.sourceforge.net/lists/listinfo/shorewall-users
> > 
> 
> 
> 
> 
> _______________________________________________
> Shorewall-users mailing list
> Shorewall-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/shorewall-users

_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to