This is our old Q&A Site. Please post any new questions and answers at ask.wireshark.org.

Analyzing a capture of an https client talking to a server (A10 load balancer in this case), where the client is experiencing an SSL timeout issue, and the site fails to load. This happens at a random interval, and appears dependent on the current load the A10 is handling.

Looking at the capture, I see the client, for no reason I can find, change from TLSv1.2, and then the next request is for TLSv1. It will pass data with TLSv1 for a few sessions, and then eventually the client tries to connect via SSLv3, and never receives a response from the server (and it's not supposed to). When the client switches to SSLv3 is when the website times out with an SSL error.

What causes the client to change the TLS version while communicating with the same website?

Could previous Secure Session information from the server be telling the client to build future sessions at a lower version?

asked 24 Oct '15, 22:05

Bagurdes's gravatar image

Bagurdes
6112
accept rate: 0%

Be the first one to answer this question!
toggle preview

Follow this question

By Email:

Once you sign in you will be able to subscribe for any updates here

By RSS:

Answers

Answers and Comments

Markdown Basics

  • *italic* or _italic_
  • **bold** or __bold__
  • link:[text](http://url.com/ "title")
  • image?![alt text](/path/img.jpg "title")
  • numbered list: 1. Foo 2. Bar
  • to add a line break simply add two spaces to where you would like the new line to be.
  • basic HTML tags are also supported

Question tags:

×75
×6

question asked: 24 Oct '15, 22:05

question was seen: 1,001 times

last updated: 24 Oct '15, 22:05

p​o​w​e​r​e​d by O​S​Q​A