The connection in his screenshots are to localhost and the server. If something were blocking those requests it would not affect all users. What you’re failing to understand is there are different issues.

Yet I’ve answered that twice now. I never said it wasn’t on their end, I said server in reference to tls.

I did. You appear to have no idea how TLS nor SSL, I can’t help with that.

You mean telling yet another user to disable their firewall without addressing the core issue? Agreed.

all servers present a certificate with this CN. this user would probably have an issue with a web filter trying to mitm and failing because it doesn’t realize the certificate is meant to be invalid according to normal CA chains.

a firewall/filter/antivirus that doesn’t respect the intent of a legitimate application/user is one that you don’t want to have installed on your system.

1 Like

It’s unlikely most users have any idea how their virus scanners work especially with content filters.

Completely agree. Have you seen what browsers have been doing however? They do not respect such things. TLS1.2, and soon 1.3 is being forced down the internets throat. What I mean by that is you will not be able to use untrusted certs. Hell with pinning you already can’t on your own systems without recompiling that shit out of your browser. CEF appears at least for now immune to some of it. Problems will continue to happen with CDN’s and other infrastructure upstream regardless. It became mandatory for PCI compliance last June.

FWIW I have removed all trust from CAs and do SSL/TLS intercept. I’m quite aware of what breaks.

If someone comes up with a solution or already know one please tell me because im having that problem right now

I have removed all firewalls and even tried a DMZ, did not help!

This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.