-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Failed to assert middlebox server message in ssl:connect on OTP 26 and 27 #8470
Comments
I do not think it is a bug to adhere to the protocol. If the server is broken just turn off the Middlebox Compatibility Mode Field measurements [Ben17a] [Ben17b] [Res17a] [Res17b] have found
When put together, these changes make the TLS 1.3 handshake resemble change_cipher_spec at any time during the handshake, as they must be |
Thank you for your reply and the additional information! What surprised me was that I agree that it's not a bug but there were only two options provided on issue creation, a feature request and a bug report. Would it be OK for me to PR an issue template for something like "unexpected behaviour" or "usability issue"? |
The assumption was that the default true would be the choice that would make as many connections as possible work out of the box, but in hindsight I am not sure that is how it turned out! I think you may call it a feature request, even if it is more of an enhancement. |
Describe the bug
I noticed that TLS connections to eagle.mxlogin.com:465 fail unless either
[{versions, ['tlsv1.2']}]
or[{versions, ['tlsv1.3']}, {middlebox_comp_mode, false}]
options are provided.To Reproduce
These work:
Expected behavior
The client connects with no extra options provided, as does
openssl
.openssl s_client -connect eagle.mxlogin.com:465
Affected versions
I've tried the following kerl versions:
All of them return the same error and log the same warnings.
Additional context
It might be related to #6772
The text was updated successfully, but these errors were encountered: