Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

egress-policy: audit Is Blocking Outbound UDP 443 #112

Closed
nibanks opened this issue Mar 16, 2022 · 4 comments · Fixed by #114
Closed

egress-policy: audit Is Blocking Outbound UDP 443 #112

nibanks opened this issue Mar 16, 2022 · 4 comments · Fixed by #114

Comments

@nibanks
Copy link

nibanks commented Mar 16, 2022

I am having to remove this from any of my actions that makes outbound UDP 443 (QUIC) connections. When this is enabled I get no connectivity. Related: microsoft/msquic#2534 and nibanks/msh3#28.

@nibanks
Copy link
Author

nibanks commented Mar 16, 2022

This effectively breaks the QUIC and HTTP/3 protocols (for which we are doing active development). So I have to remove usage of this in any jobs that are making outbound requests.

@varunsh-coder
Copy link
Member

Thanks @nibanks for reporting. will address it ASAP.

@varunsh-coder
Copy link
Member

@nibanks just tested out the fixed int version of harden-runner on fork of msh3 and msquic.

Looks like the UDP request is going through. Can you please verify if this is what is expected?
https://github.com/varunsh-coder/msh3/runs/5605370590?check_suite_focus=true#step:9:22
https://github.com/varunsh-coder/msquic/runs/5605545963?check_suite_focus=true#step:10:31

If this looks as expected, will continue with the release. Thanks!

@nibanks
Copy link
Author

nibanks commented Mar 18, 2022

Yep. Both look good to me.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants