zlacker

[return to "BlueCoat and other proxies hang up during TLS 1.3"]
1. JoshTr+w[view] [source] 2017-02-28 01:38:28
>>codero+(OP)
Note that this happens even when using a BlueCoat proxy in non-MITM mode. BlueCoat tries to "analyze" TLS connections, and rejects anything it doesn't understand. This exact issue occurred with TLS 1.2 back when BlueCoat only understood 1.1/1.0.

In this case, it doesn't sound like they're reverting it because of overall breakage, but rather because it breaks the tool that would otherwise be used to control TLS 1.3 trials and other configuration. Firefox had a similar issue, where they temporarily used more conservative settings for their updater than for the browser itself, to ensure that people could always obtain updates that might improve the situation.

◧◩
2. codero+31[view] [source] 2017-02-28 01:47:50
>>JoshTr+w
Rejecting anything it doesn't understand sounds like a bug to me. If it sees that it's TLS, it should attempt a protocol downgrade. There's absolutely no reason for this to break, as TLS 1.3 exists alongside TLS 1.2 (For now).
◧◩◪
3. 234dd5+x6[view] [source] 2017-02-28 03:02:51
>>codero+31
It's a security feature, often malware will send encrypted traffic over 443 in an attempt to bypass firewalls. If BlueCoat can't understand the traffic, it drops it as it assumes it's malicious.
◧◩◪◨
4. jarym+gu[view] [source] 2017-02-28 08:31:24
>>234dd5+x6
The Bluecoat sales people did a number on you huh? Sounds really good until you ask 'why doesn't Bluecoat understand this traffic' - because it really should.
◧◩◪◨⬒
5. icebra+4G[view] [source] 2017-02-28 11:34:48
>>jarym+gu
TLS 1.3 is still quite new, doesn't seem outrageous that they take a bit to implement it.
◧◩◪◨⬒⬓
6. deatha+eC1[view] [source] 2017-02-28 18:56:14
>>icebra+4G
This is a failure to implement any version of TLS correctly, not just v1.3. (TLS has support for version negotiation including receiving a hello from a client with a future version, such as v1.3.)
[go to top]