TLS1.2 RST After Server Key Exchange, Server Hello Done
I am not sure if this is a TLS1.2 connection issue or something else. I have this WireShark trace summary.
I have a client and Exchange server. I am using below command on client machine.
Invoke-WebRequest -Uri https://autodiscover.contoso.com -UseBasicParsing
As far as I understand , The client is closing the connection after receiving the server certificate - which suggest that the client does not like the server certificate.
What could be causing this?
Please let me know if you need anymore info.
Wireshark Output :
2647 6.854017 SOURCE DESTINATION TCP 66 18543 → 443 [SYN, ECE, CWR] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM
2649 6.869529 DESTINATION SOURCE TCP 66 443 → 18543 [SYN, ACK] Seq=0 Ack=1 Win=8190 Len=0 MSS=1460 WS=256 SACK_PERM
2650 6.869602 SOURCE DESTINATION TCP 54 18543 → 443 [ACK] Seq=1 Ack=1 Win=262656 Len=0
2651 6.870704 SOURCE DESTINATION TLSv1.2 217 Client Hello (SNI=autodiscover.companyB.com)
2703 6.883765 DESTINATION SOURCE TCP 1514 443 → 18543 [PSH, ACK] Seq=1 Ack=164 Win=130816 Len=1460 [TCP segment of a reassembled PDU]
2708 6.885744 DESTINATION SOURCE TCP 1514 443 → 18543 [PSH, ACK] Seq=1461 Ack=164 Win=130816 Len=1460 [TCP segment of a reassembled PDU]
2709 6.885775 SOURCE DESTINATION TCP 54 18543 → 443 [ACK] Seq=164 Ack=2921 Win=262656 Len=0
2710 6.885900 DESTINATION SOURCE TLSv1.2 914 Server Hello, Certificate
2713 6.887267 SOURCE DESTINATION TCP 54 18543 → 443 [FIN, ACK] Seq=164 Ack=3781 Win=261888 Len=0
2753 6.904773 DESTINATION SOURCE TLSv1.2 396 Server Key Exchange, Server Hello Done
2754 6.904773 DESTINATION SOURCE TCP 60 443 → 18543 [FIN, ACK] Seq=4123 Ack=165 Win=130816 Len=0
2757 6.904839 SOURCE DESTINATION TCP 54 18543 → 443 [RST, ACK] Seq=165 Ack=4123 Win=0 Len=0
2758 6.904889 SOURCE DESTINATION TCP 54 18543 → 443 [RST] Seq=165 Win=0 Len=0
FROM WORKING MACHINE WIRESHARK RESULT :
1636 11.029014 SOURCE DESTINATION TCP 66 62424 → 443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM
1639 11.042309 DESTINATION SOURCE TCP 66 443 → 62424 [SYN, ACK] Seq=0 Ack=1 Win=8190 Len=0 MSS=1460 WS=256 SACK_PERM
1640 11.042440 SOURCE DESTINATION TCP 54 62424 → 443 [ACK] Seq=1 Ack=1 Win=262656 Len=0
1641 11.045394 SOURCE DESTINATION TLSv1.2 217 Client Hello (SNI=autodiscover.contoso.com)
1642 11.058038 DESTINATION SOURCE TCP 1514 443 → 62424 [PSH, ACK] Seq=1 Ack=164 Win=130816 Len=1460 [TCP segment of a reassembled PDU]
1643 11.058672 DESTINATION SOURCE TCP 1514 443 → 62424 [PSH, ACK] Seq=1461 Ack=164 Win=130816 Len=1460 [TCP segment of a reassembled PDU]
1644 11.058700 SOURCE DESTINATION TCP 54 62424 → 443 [ACK] Seq=164 Ack=2921 Win=262656 Len=0
1645 11.059453 DESTINATION SOURCE TLSv1.2 914 Server Hello, Certificate
1647 11.070975 DESTINATION SOURCE TLSv1.2 396 ...