-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Handshake failure with Microsoft SSL Server Test #11
Comments
Some Plesk Obsidian threads with this one The famous Plesk Obsidian changelog says:
The question is: are these web hosting control panels not working with Autodiscover because of:
Answer: Microsoft proxy servers only seem to communicate well with MS Exchange Servers, not third-party mail servers, regardless of the TLS setup. Again, migrating to the ISRG Root X2 cross-signed by ISRG Root X1 would have been a step forward if ECDSA ciphers were supported by MS but it is not. |
Python 3.10 and above with increased security of TLS settings should not be an issue with Nginx as a reverse proxy: python/cpython#88164. |
I contacted the Microsoft Remove Connectivity Analyzer team. We'll see.
Let's Encrypt cannot provide that.
Tasks:
|
Solved:
But I prefer not to use any more the MS SSL Server Test due to lack of support of ECDSA ciphers. |
Is it caused by Let's Encrypt expired root CA and a wrong SSL implementation on Microsoft's side?
Other example of issues with this expired root CA: transmission/transmission#1876 and this and that.
Theory: the SSL/TLS library used by Microsoft Remote Connectivity Analyzer has a TLS validation policy which will cause it to always fail if one of the intermediate paths fails, in our case the path using DST Root CA X3 because it is expired.
Microsoft Handshake failure with: https://testconnectivity.microsoft.com/tests/SslServer/input
Might be related to the root CA: https://stackoverflow.com/questions/6353849/received-fatal-alert-handshake-failure-through-sslhandshakeexception
The DST Root CA X3 expired in 09/2021: https://letsencrypt.org/docs/dst-root-ca-x3-expiration-september-2021/.
Microsoft Outlook Connectivity test requests a HTTPS address.
ssldump repo
Notes on ssldump ClientHello versions
Some ssldump review
Some TLS handshake failure guide
Solution: being added to the Production ECDSA allow-list takes time (at least one week) but that may solve the TLS handshake failure issue... This will make us switch to the ISRG Root X2 cross-signed by ISRG Root X1 when we renew ECDSA certificates which makes the chain of trust fine. But ECDSA ciphers are not supported by Microsoft.
The text was updated successfully, but these errors were encountered: