rman
March 15, 2016, 6:53pm
1
Hi,
Some https sites are working for me ie Google, Facebook. However, I cannot download anything from WeTransfer. The download starts and sits at 0% indefinitely. Some https sites will not load at all.
Everything was working for months, and suddenly this problem appeared. The issue is the same in all browsers. I’ve tried Chrome, Firefox, and Konqueror.
I’m running Tumbleweed. I have a dual boot with Windows, and this is not a problem on the windows machine so I know it’s not a network issue. It must be something specific to the way OpenSuse is handling SSL.
I would appreciate any help you can offer! I’ve tried many thing already and I just can’t make any progress.
Thanks!
Hi
I would guess it’s openssl and the recent vulnerabilities with respect to drown etc with regard to SSLv2, sounds like windows hasn’t hardened things up yet…?
Maybe a capture with wireshark may give some clues as to what’s happening. Just fire up the browser and have a tab ready with one of the url’s your having issues with, make sure as little as possible is running which may generate traffic, start a wireshark capture and then try to go to the url.
Could also check your DNS settings on both windows and openSUSE to see they are the same… I prefer to use the openDNS ones as find my ISP’s one are unreliable at times…
rman
March 15, 2016, 7:47pm
3
Thanks for the reply!
This download did not work.
644 0.779885852 192.168.8.22 -> 54.230.38.247 TCP 54 29629 → 443 [ACK] Seq=1944 Ack=550094 Win=1130752 Len=0
645 0.780016692 54.230.38.247 -> 192.168.8.22 TCP 1468 [TCP Previous segment not captured] [TCP segment of a reassembled PDU]
646 0.780022668 192.168.8.22 -> 54.230.38.247 TCP 54 [TCP Window Update] 29629 → 443 [ACK] Seq=1944 Ack=550094 Win=1133568 Len=0
647 0.780157830 54.230.38.247 -> 192.168.8.22 TLSv1.2 1468 [TCP Previous segment not captured] Ignored Unknown Record
648 0.780161121 192.168.8.22 -> 54.230.38.247 TCP 54 [TCP Window Update] 29629 → 443 [ACK] Seq=1944 Ack=550094 Win=1136640 Len=0
649 0.780305921 54.230.38.247 -> 192.168.8.22 TLSv1.2 1468 Ignored Unknown Record
650 0.780309458 192.168.8.22 -> 54.230.38.247 TCP 54 [TCP Window Update] 29629 → 443 [ACK] Seq=1944 Ack=550094 Win=1139456 Len=0
651 0.780368208 54.230.38.247 -> 192.168.8.22 TLSv1.2 1468 Ignored Unknown Record
652 0.780370734 192.168.8.22 -> 54.230.38.247 TCP 54 [TCP Window Update] 29629 → 443 [ACK] Seq=1944 Ack=550094 Win=1142272 Len=0
653 0.780502404 54.230.38.247 -> 192.168.8.22 TLSv1.2 1468 Ignored Unknown Record
654 0.780507382 192.168.8.22 -> 54.230.38.247 TCP 54 [TCP Window Update] 29629 → 443 [ACK] Seq=1944 Ack=550094 Win=1145088 Len=0
655 0.780643408 54.230.38.247 -> 192.168.8.22 TLSv1.2 1468 Ignored Unknown Record
656 0.780661480 192.168.8.22 -> 54.230.38.247 TCP 54 [TCP Window Update] 29629 → 443 [ACK] Seq=1944 Ack=550094 Win=1147904 Len=0
**
This one did**
17271 7.311685514 192.168.8.22 -> 206.223.178.165 TCP 54 58343 → 443 [ACK] Seq=1 Ack=16017282 Win=9873 Len=0
17272 7.311822616 206.223.178.165 -> 192.168.8.22 TCP 1468 [TCP segment of a reassembled PDU]
17273 7.311921884 206.223.178.165 -> 192.168.8.22 TCP 1468 [TCP segment of a reassembled PDU]
17274 7.311924100 192.168.8.22 -> 206.223.178.165 TCP 54 58343 → 443 [ACK] Seq=1 Ack=16020110 Win=9873 Len=0
17275 7.312057095 206.223.178.165 -> 192.168.8.22 TCP 1468 [TCP segment of a reassembled PDU]
17276 7.312160516 206.223.178.165 -> 192.168.8.22 SSLv2 1468 Encrypted Data
17277 7.312162817 192.168.8.22 -> 206.223.178.165 TCP 54 58343 → 443 [ACK] Seq=1 Ack=16022938 Win=9873 Len=0
17278 7.312299736 206.223.178.165 -> 192.168.8.22 TCP 1468 [TCP segment of a reassembled PDU]
17279 7.312400164 206.223.178.165 -> 192.168.8.22 TCP 1468 [TCP segment of a reassembled PDU]
17280 7.312402122 192.168.8.22 -> 206.223.178.165 TCP 54 58343 → 443 [ACK] Seq=1 Ack=16025766 Win=9873 Len=0
17281 7.312535298 206.223.178.165 -> 192.168.8.22 TCP 1468 [TCP segment of a reassembled PDU]
17282 7.312663287 206.223.178.165 -> 192.168.8.22 TCP 1468 [TCP segment of a reassembled PDU]
Hi
I’m pretty sure this is why…TLSv1.2, if you check Firefox about:config and change (AS A TEST ONLY!!) security.tls.version.fallback-limit to 1, it will probably download…
649 0.780305921 54.230.38.247 -> 192.168.8.22 TLSv1.2 1468 Ignored Unknown Record
So it’s the website…
I would check your windows internet option TLS settings… it’s probably vulnerable…
rman
March 15, 2016, 8:21pm
5
I made the change in about:config
Tried to download the same WeTrasnfer link with the same result. It downloaded a few bytes and got stuck.
9 0.446263596 184.150.153.246 -> 192.168.8.22 TCP 60 [TCP ACKed unseen segment] 80 → 6968 [ACK] Seq=1 Ack=2 Win=237 Len=0
10 0.553732531 192.168.8.22 -> 31.13.71.7 TCP 54 56776 → 80 [ACK] Seq=1 Ack=1 Win=544 Len=0
11 0.575570191 31.13.71.7 -> 192.168.8.22 TCP 60 [TCP ACKed unseen segment] 80 → 56776 [ACK] Seq=1 Ack=2 Win=60 Len=0
12 0.657732625 192.168.8.22 -> 184.84.143.147 TCP 54 3681 → 80 [ACK] Seq=1 Ack=1 Win=202 Len=0
13 0.691973269 184.84.143.147 -> 192.168.8.22 TCP 60 [TCP ACKed unseen segment] 80 → 3681 [ACK] Seq=1 Ack=2 Win=924 Len=0
14 1.333739840 192.168.8.22 -> 173.254.28.133 TCP 54 10910 → 80 [ACK] Seq=1 Ack=1 Win=170 Len=0
15 1.336374270 173.254.28.133 -> 192.168.8.22 TCP 60 [TCP ACKed unseen segment] 80 → 10910 [FIN, ACK] Seq=1 Ack=2 Win=254 Len=0
16 1.336460754 192.168.8.22 -> 173.254.28.133 TCP 54 [TCP Previous segment not captured] 10910 → 80 [FIN, ACK] Seq=2 Ack=2 Win=170 Len=0
17 1.377733365 192.168.8.22 -> 173.254.28.133 TCP 54 10890 → 80 [ACK] Seq=1 Ack=1 Win=236 Len=0
18 1.380795876 173.254.28.133 -> 192.168.8.22 TCP 60 [TCP ACKed unseen segment] 80 → 10890 [FIN, ACK] Seq=1 Ack=2 Win=262 Len=0
19 1.380840639 192.168.8.22 -> 173.254.28.133 TCP 54 [TCP Previous segment not captured] 10890 → 80 [FIN, ACK] Seq=2 Ack=2 Win=236 Len=0
20 1.381735443 192.168.8.22 -> 173.254.28.133 TCP 54 10918 → 80 [ACK] Seq=1 Ack=1 Win=118 Len=0
21 1.383697787 173.254.28.133 -> 192.168.8.22 TCP 60 [TCP ACKed unseen segment] 80 → 10918 [FIN, ACK] Seq=1 Ack=2 Win=237 Len=0
22 1.383741404 192.168.8.22 -> 173.254.28.133 TCP 54 [TCP Previous segment not captured] 10918 → 80 [FIN, ACK] Seq=2 Ack=2 Win=118 Len=0
23 1.413148618 173.254.28.133 -> 192.168.8.22 TCP 60 80 → 10906 [FIN, ACK] Seq=1 Ack=1 Win=237 Len=0
24 1.413193172 192.168.8.22 -> 173.254.28.133 TCP 54 10906 → 80 [FIN, ACK] Seq=1 Ack=2 Win=130 Len=0
25 1.416291438 173.254.28.133 -> 192.168.8.22 TCP 60 [TCP Dup ACK 15#1] [TCP ACKed unseen segment] 80 → 10910 [ACK] Seq=2 Ack=2 Win=254 Len=0
26 1.418306693 173.254.28.133 -> 192.168.8.22 TCP 60 80 → 10910 [ACK] Seq=2 Ack=3 Win=254 Len=0
27 1.461902511 173.254.28.133 -> 192.168.8.22 TCP 60 [TCP Dup ACK 21#1] [TCP ACKed unseen segment] 80 → 10918 [ACK] Seq=2 Ack=2 Win=237 Len=0
28 1.463835071 173.254.28.133 -> 192.168.8.22 TCP 60 80 → 10918 [ACK] Seq=2 Ack=3 Win=237 Len=0
29 1.658245646 173.254.28.133 -> 192.168.8.22 TCP 60 [TCP ACKed unseen segment] [TCP Spurious Retransmission] 80 → 10890 [FIN, ACK] Seq=1 Ack=2 Win=262 Len=0
30 1.658253736 192.168.8.22 -> 173.254.28.133 TCP 54 [TCP Dup ACK 19#1] 10890 → 80 [ACK] Seq=3 Ack=2 Win=236 Len=0
31 1.665731137 192.168.8.22 -> 173.254.28.133 TCP 54 [TCP Retransmission] 10890 → 80 [FIN, ACK] Seq=2 Ack=2 Win=236 Len=0
32 1.746380096 173.254.28.133 -> 192.168.8.22 TCP 60 80 → 10890 [ACK] Seq=2 Ack=3 Win=262 Len=0
33 1.771919746 54.230.38.166 -> 192.168.8.22 SSL 1468 Continuation Data
34 1.771931550 192.168.8.22 -> 54.230.38.166 TCP 54 [TCP ACKed unseen segment] 35755 → 443 [ACK] Seq=1 Ack=2829 Win=4015 Len=0
35 1.793919433 54.230.38.166 -> 192.168.8.22 SSL 1468 [TCP Previous segment not captured] Continuation Data
36 1.793932038 192.168.8.22 -> 54.230.38.166 TCP 54 [TCP Window Update] [TCP ACKed unseen segment] 35755 → 443 [ACK] Seq=1 Ack=2829 Win=4026 Len=0
37 1.794038492 54.230.38.166 -> 192.168.8.22 SSL 1468 Continuation Data
38 1.794050242 192.168.8.22 -> 54.230.38.166 TCP 54 [TCP Window Update] 35755 → 443 [ACK] Seq=1 Ack=2829 Win=4037 Len=0
39 1.953750303 192.168.8.22 -> 52.49.211.221 TCP 54 40039 → 443 [ACK] Seq=1 Ack=1 Win=467 Len=0
40 1.977730642 192.168.8.22 -> 173.254.28.133 TCP 54 [TCP Retransmission] 10906 → 80 [FIN, ACK] Seq=1 Ack=2 Win=130 Len=0
On Tue 15 Mar 2016 07:26:01 PM CDT, rman wrote:
I made the change in about:config
Tried to download the same WeTrasnfer link with the same result. It
downloaded a few bytes and got stuck.
9 0.446263596 184.150.153.246 -> 192.168.8.22 TCP 60 [TCP ACKed unseen
segment] 80 → 6968 [ACK] Seq=1 Ack=2 Win=237 Len=0
10 0.553732531 192.168.8.22 -> 31.13.71.7 TCP 54 56776 → 80 [ACK]
Seq=1 Ack=1 Win=544 Len=0
11 0.575570191 31.13.71.7 -> 192.168.8.22 TCP 60 [TCP ACKed unseen
segment] 80 → 56776 [ACK] Seq=1 Ack=2 Win=60 Len=0
12 0.657732625 192.168.8.22 -> 184.84.143.147 TCP 54 3681 → 80 [ACK]
Seq=1 Ack=1 Win=202 Len=0
13 0.691973269 184.84.143.147 -> 192.168.8.22 TCP 60 [TCP ACKed unseen
segment] 80 → 3681 [ACK] Seq=1 Ack=2 Win=924 Len=0
14 1.333739840 192.168.8.22 -> 173.254.28.133 TCP 54 10910 → 80 [ACK]
Seq=1 Ack=1 Win=170 Len=0
15 1.336374270 173.254.28.133 -> 192.168.8.22 TCP 60 [TCP ACKed unseen
segment] 80 → 10910 [FIN, ACK] Seq=1 Ack=2 Win=254 Len=0
16 1.336460754 192.168.8.22 -> 173.254.28.133 TCP 54 [TCP Previous
segment not captured] 10910 → 80 [FIN, ACK] Seq=2 Ack=2 Win=170 Len=0
17 1.377733365 192.168.8.22 -> 173.254.28.133 TCP 54 10890 → 80 [ACK]
Seq=1 Ack=1 Win=236 Len=0
18 1.380795876 173.254.28.133 -> 192.168.8.22 TCP 60 [TCP ACKed unseen
segment] 80 → 10890 [FIN, ACK] Seq=1 Ack=2 Win=262 Len=0
19 1.380840639 192.168.8.22 -> 173.254.28.133 TCP 54 [TCP Previous
segment not captured] 10890 → 80 [FIN, ACK] Seq=2 Ack=2 Win=236 Len=0
20 1.381735443 192.168.8.22 -> 173.254.28.133 TCP 54 10918 → 80 [ACK]
Seq=1 Ack=1 Win=118 Len=0
21 1.383697787 173.254.28.133 -> 192.168.8.22 TCP 60 [TCP ACKed unseen
segment] 80 → 10918 [FIN, ACK] Seq=1 Ack=2 Win=237 Len=0
22 1.383741404 192.168.8.22 -> 173.254.28.133 TCP 54 [TCP Previous
segment not captured] 10918 → 80 [FIN, ACK] Seq=2 Ack=2 Win=118 Len=0
23 1.413148618 173.254.28.133 -> 192.168.8.22 TCP 60 80 → 10906 [FIN,
ACK] Seq=1 Ack=1 Win=237 Len=0
24 1.413193172 192.168.8.22 -> 173.254.28.133 TCP 54 10906 → 80 [FIN,
ACK] Seq=1 Ack=2 Win=130 Len=0
25 1.416291438 173.254.28.133 -> 192.168.8.22 TCP 60 [TCP Dup ACK 15#1]
[TCP ACKed unseen segment] 80 → 10910 [ACK] Seq=2 Ack=2 Win=254 Len=0
26 1.418306693 173.254.28.133 -> 192.168.8.22 TCP 60 80 → 10910 [ACK]
Seq=2 Ack=3 Win=254 Len=0
27 1.461902511 173.254.28.133 -> 192.168.8.22 TCP 60 [TCP Dup ACK 21#1]
[TCP ACKed unseen segment] 80 → 10918 [ACK] Seq=2 Ack=2 Win=237 Len=0
28 1.463835071 173.254.28.133 -> 192.168.8.22 TCP 60 80 → 10918 [ACK]
Seq=2 Ack=3 Win=237 Len=0
29 1.658245646 173.254.28.133 -> 192.168.8.22 TCP 60 [TCP ACKed unseen
segment] [TCP Spurious Retransmission] 80 → 10890 [FIN, ACK] Seq=1
Ack=2 Win=262 Len=0
30 1.658253736 192.168.8.22 -> 173.254.28.133 TCP 54 [TCP Dup ACK 19#1]
10890 → 80 [ACK] Seq=3 Ack=2 Win=236 Len=0
31 1.665731137 192.168.8.22 -> 173.254.28.133 TCP 54 [TCP
Retransmission] 10890 → 80 [FIN, ACK] Seq=2 Ack=2 Win=236 Len=0
32 1.746380096 173.254.28.133 -> 192.168.8.22 TCP 60 80 → 10890 [ACK]
Seq=2 Ack=3 Win=262 Len=0
33 1.771919746 54.230.38.166 -> 192.168.8.22 SSL 1468 Continuation Data
34 1.771931550 192.168.8.22 -> 54.230.38.166 TCP 54 [TCP ACKed unseen
segment] 35755 → 443 [ACK] Seq=1 Ack=2829 Win=4015 Len=0
35 1.793919433 54.230.38.166 -> 192.168.8.22 SSL 1468 [TCP Previous
segment not captured] Continuation Data
36 1.793932038 192.168.8.22 -> 54.230.38.166 TCP 54 [TCP Window Update]
[TCP ACKed unseen segment] 35755 → 443 [ACK] Seq=1 Ack=2829 Win=4026
Len=0
37 1.794038492 54.230.38.166 -> 192.168.8.22 SSL 1468 Continuation Data
38 1.794050242 192.168.8.22 -> 54.230.38.166 TCP 54 [TCP Window Update]
35755 → 443 [ACK] Seq=1 Ack=2829 Win=4037 Len=0
39 1.953750303 192.168.8.22 -> 52.49.211.221 TCP 54 40039 → 443 [ACK]
Seq=1 Ack=1 Win=467 Len=0
40 1.977730642 192.168.8.22 -> 173.254.28.133 TCP 54 [TCP
Retransmission] 10906 → 80 [FIN, ACK] Seq=1 Ack=2 Win=130 Len=0
Hi
What about if you use wget to grab the file?
–
Cheers Malcolm °¿° LFCS, SUSE Knowledge Partner (Linux Counter #276890 )
SUSE Linux Enterprise Desktop 12 SP1|GNOME 3.10.4|3.12.53-60.30-default
If you find this post helpful and are logged into the web interface,
please show your appreciation and click on the star below… Thanks!
rman
March 16, 2016, 12:51am
7
Same thing using wget. Do you have any other ideas to diagnose the problem?
resolving download.wetransfer.com (download.wetransfer.com )… 54.230.38.130, 54.230.38.48, 54.230.38.247, …
Connecting to download.wetransfer.com (download.wetransfer.com )|54.230.38.130|:443… connected. HTTP request sent, awaiting response… 200 OK
Length: 17730886 (17M) [application/zip]
Saving to: ‘we.test.zip’
we.test.zip 1%> ] 320.34K 44.5KB/s eta 6m 22s
Hi
Hmm, just tried a test file from here with Tumbleweed and Firefox 44.0.2 and it worked fine…
Sure it’s not just a funky file on their site…?
tsu2
March 19, 2016, 11:39pm
9
Especially since you’re running TW,
Have you updated your system recently? You may still have old packages, in particular your earlier trace suggests that your SSL/TLS version was not only old (v 1.2) but that your system’s SSL/TLS isn’t successfully resolving the remote machine’s Domain Name (The problem is being ignored which is one of the exploitable vulnerabilities of v1.2). This might or might not be a problem with the higher level app using SSL/TLS.
Try updating your system with either “up” or “dup” (on a TW these commands do the same thing) and try again…
zypper dup
TSU