Quantcast
Channel: LoadRunner Practitioners Forum topics
Viewing all articles
Browse latest Browse all 3978

Why does a TLS 1.2 call take 2 TCP/IP connections?

$
0
0

All, I have an HP VuGen client that is using 2 TCP/IP connections to do the TLS v1.2 handshake with my server when mutual authentication is enabled.

According to Wireshark, the sequence is approximately this:

  1. Client SYN
  2. TLS v1.2 client hello
  3. Server sends server hello, certificate, server key exchange, certificate request, server hello done
  4. Client FIN's the old connection
  5. Client SYN's a new connection
  6. Server handshake failure on the old connection (out of order packet)
  7. TLS v1.2 client hello
  8. Server hello, certificate, server key exchange, certificate request, server hello done
  9. (everything is ok after this)

Neither OpenSSL nor a standalone java client exhibits this same behavior. When the server asks for the client certificate the first time, they send it.

With VuGen, I can't see anything different about the two client hello message, nor the server responses. There are definitely two connections, though, because there are 2 FIN's from the client using 2 different outbound ports.

I would like to prevent this because I don't think our production clients do this (since neither OpenSSL nor a java app do it.)

FWIW, it doesn't matter whether I go through a load balancer or not. I get the same behavior.

I believe this has something to do with the server asking for the client certificate because the same server has another non-MA port open that is otherwise configured the same and the VuGen client only makes a single connection there.

Thanks


Viewing all articles
Browse latest Browse all 3978

Trending Articles