NOSRV/BADREQ from some Java based clients

2015-02-20 Thread NuSkooler
We have been in the process of deploying HAProxy as a SSL terminator between our client software and back end services. In the testing phases, everything is working great and looking good with one exception: Some old client software that utilizes a Java SSL implementation fail to connect and we

Re: NOSRV/BADREQ from some Java based clients [SSL handshake issue]

2015-02-23 Thread NuSkooler
I'm not currently sure on the JRE version. These are Android clients written with a old Android SDK. All new clients are C++ / OpenSSL based. I have set the DH param size to 1024 with the same results. Additionally, I set up a bind statement that reflects that of the backward compatibility link

Re: NOSRV/BADREQ from some Java based clients [SSL handshake issue]

2015-02-23 Thread NuSkooler
I have since set DH to 1024 in my configuration. Here is the results from cipherscan: Target: 10.3.2.74:443 prio ciphersuite protocols pfs_keysize 1 AES128-SHA TLSv1,TLSv1.1,TLSv1.2 2 DHE-RSA-AES256-SHA TLSv1,TLSv1.1,TLSv1.2 DH,1024bits Certificate:

Re: NOSRV/BADREQ from some Java based clients [SSL handshake issue]

2015-02-23 Thread NuSkooler
Thanks for updating the subject -- this does seem to be SSL/handshake related. I'm pretty confident that these are just bad clients that were getting away with whatever they're doing on the old Mochiweb SSL setup. As a last resort we're coming up with a backup plan on routing them to the old setup

Re: NOSRV/BADREQ from some Java based clients [SSL handshake issue]

2015-02-23 Thread NuSkooler
We do not expect SPDY to be used, no. The expected behavior is HTTP on TLS with JSON-RPC payloads (POST/response body). Perhaps I'm not reading something right here: Looking at #61 in Wireshark, I see the following: 61 16.127749 10.3.2.74 10.1.1.93 TLSv1 279 Application Data TLSv1 Record Layer:

Re: NOSRV/BADREQ from some Java based clients [SSL handshake issue]

2015-02-23 Thread NuSkooler
Attached is a pcap with the bind line cut+paste from your link. In this case I see Encrypted Alert, but I'm struggling to decrypt it in WS with this setup. On Mon, Feb 23, 2015 at 11:36 AM, Lukas Tribus luky...@hotmail.com wrote: There's some confusion here. For the sake of clarity, please,

Re: NOSRV/BADREQ from some Java based clients [SSL handshake issue]

2015-02-23 Thread NuSkooler
Attached is the information you requested -- and hopefully performed correctly :) * no_haproxy.pcap: This is a successful connection + POST to the original Mochiweb server. Note that here the port is 8443 not 443 (IP=10.3.3.3) * ha_self_signed.pcap: Failed attempt against HAProxy with a self

Re: NOSRV/BADREQ from some Java based clients [SSL handshake issue]

2015-02-24 Thread NuSkooler
Thanks, this has all been very helpful. Unfortunately it seems that some of the pieces to create a debuggable version of these old clients are currently missing here. If I can get that together I'll debug and hopefully find something. Until then, we'll be attempting to route their traffic around