-
Notifications
You must be signed in to change notification settings - Fork 45
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Doesn't work with TLS_RSA_WITH_AES_256_CBC_SHA256 cipher #6
Comments
Interesting. At first glance, it doesn't look like they actually removed
the ciphers. It appears they simply disabled them by default. That means
this should be fixable!
A fix to this problem would likely be just figuring out how to explicitly
enable the needed cipher in the go code.
Are you able to provide the exact error message you are referring to?
…On Sun, Oct 13, 2019, 7:52 PM Ian Bishop ***@***.***> wrote:
Not a bug, just an FYI for others.
Golang dropped support for cipher TLS_RSA_WITH_AES_256_CBC_SHA256 here
<https://go-review.googlesource.com/c/go/+/35290/>.
My anyconnect provider has locked their endpoint to only accept this
cipher, and so I get a negotiation failure :(
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#6?email_source=notifications&email_token=ACUP4TKVFZEBQYHJH62NJX3QOOYENA5CNFSM4JAJEYBKYY3PNVWWK3TUL52HS4DFUVEXG43VMWVGG33NNVSW45C7NFSM4HRPBLAQ>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ACUP4TM2OL3VTTPENTFR273QOOYENANCNFSM4JAJEYBA>
.
|
The error I get when connecting to the Anyconnect endpoint is: Nmap scan of the endpoint shows this:
I tried this: func handleConnection(conn net.Conn, isTLS bool, hostscan Hostscan) {
[...]
conf := tls.Config{
InsecureSkipVerify: true,
CipherSuites: []uint16{tls.TLS_RSA_WITH_AES_256_CBC_SHA256},
} but get compile error: |
I don't see After some digging around it appears someone else added support for |
You're right - I misread that earlier commit! Thanks, I'll check out that other repo. UPDATE: that repo fails to build 😞 |
Hmm.. Well, I can't exactly test this idea but I don't see many changes in the commit that adds support for the I'd make a backup of the current |
I tried building go with your file but it fails. What version of Go did you base that off? I followed the build instructions here https://golang.org/doc/install/source which uses 1.13.1 |
I made an assumption I was on the latest version when in fact I was on version
Here's the version of |
I tried again with the updated file. Compilation succeeds, however the test suite fails. Using the resulting |
That's odd. I'd assume if the SSL handshake went poorly that the connection would abort.. Are you using the EDIT: Also, are you seeing the AnyConnect client perform a posture assessment upon connection? The client is supposed to perform a Go to |
I've emailed you the console output which includes server messages. |
Thank you for the log file! Looking over the log file you sent me I don't see any indication of hostscan being used in your environment. Are you sure your organization is using hostscan? You should see the following text should be visible when connecting with your AnyConnect client. You could also try browsing to the following URL to see if there's any hostscan requirements being published.
|
You're right - it seems that no hostscan is required. Using |
That's correct- the bypass was never intended to be a general purpose proxy. By the sounds of it you don't need the
Or if your environment doesn't allow the use of Linux/OS X you could try:
Hostscan is a feature that companies use to lockdown which assets are "allowed" to connect to the VPN. That's when you would need to use the |
That fails to negotiate TLS (due to the missing cipher support - it would appear that Go is not the only client that doesn't support that unusual cipher!). I'm just using |
If that's true I'd recommend opening up an issue on the OpenConnect repository over on gitlab. The devs are very responsive and quite helpful. I'd reference this issue while opening a request to add support for the You could use the EDIT: I am going to close this issue. If you decide to open an issue with the OpenConnect devs- feel free to post the link back here! I wouldn't mind seeing what they have to say on this. |
Good idea! I've created ticket here: https://gitlab.com/openconnect/openconnect/issues/83 |
Not a bug, just an FYI for others.
Go dropped support for cipher
TLS_RSA_WITH_AES_256_CBC_SHA256
here.My anyconnect provider has locked their endpoint to only accept this cipher, and so I get a TLS negotiation failure when attempting to connect 😢
The text was updated successfully, but these errors were encountered: