Closed
Description
Using Windows and the shadow sample I immediately get disconnected after connecting and performing the TLS handshake. Wireshark shows the following output:
61 2.313533 192.168.15.167 54.154.234.121 TCP 66 61059 → 8883 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
69 2.358743 54.154.234.121 192.168.15.167 TCP 66 8883 → 61059 [SYN, ACK] Seq=0 Ack=1 Win=26883 Len=0 MSS=1380 SACK_PERM=1 WS=256
70 2.358819 192.168.15.167 54.154.234.121 TCP 54 61059 → 8883 [ACK] Seq=1 Ack=1 Win=66048 Len=0
72 2.373734 192.168.15.167 54.154.234.121 TLSv1.2 257 Client Hello
75 2.418502 54.154.234.121 192.168.15.167 TCP 60 8883 → 61059 [ACK] Seq=1 Ack=204 Win=28160 Len=0
76 2.420811 54.154.234.121 192.168.15.167 TCP 1434 [TCP segment of a reassembled PDU]
77 2.420849 54.154.234.121 192.168.15.167 TLSv1.2 1008 Server Hello, Certificate, Server Key Exchange, Certificate Request, Server Hello Done
78 2.420872 192.168.15.167 54.154.234.121 TCP 54 61059 → 8883 [ACK] Seq=204 Ack=2335 Win=66048 Len=0
79 2.427508 192.168.15.167 54.154.234.121 TLSv1.2 1315 Certificate, Client Key Exchange, Certificate Verify, Change Cipher Spec, Hello Request, Hello Request
83 2.474559 54.154.234.121 192.168.15.167 TLSv1.2 105 Change Cipher Spec, Hello Request, Hello Request
85 2.514520 192.168.15.167 54.154.234.121 TCP 54 61059 → 8883 [FIN, ACK] Seq=1465 Ack=2386 Win=66048 Len=0
89 2.559828 54.154.234.121 192.168.15.167 TCP 60 8883 → 61059 [FIN, ACK] Seq=2386 Ack=1466 Win=30720 Len=0
90 2.559864 192.168.15.167 54.154.234.121 TCP 54 61059 → 8883 [ACK] Seq=1466 Ack=2387 Win=66048 Len=0
As you can see directly after line 83, a FIN ACK is sent closing the connection. Using OpenSSL and the following commandline openssl s_client -connect <endpoint>:8883 -CApath C:/AWS -cert <thingname>/cert.pem -key <thingname>/privkey.pem
I instead get a working connection. I can also use for instance MQTT.fx to connect and communicate.
18012 638.716527 192.168.15.167 52.50.121.37 TCP 66 61408 → 8883 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
18015 638.761403 52.50.121.37 192.168.15.167 TCP 66 8883 → 61408 [SYN, ACK] Seq=0 Ack=1 Win=26883 Len=0 MSS=1380 SACK_PERM=1 WS=256
18016 638.761490 192.168.15.167 52.50.121.37 TCP 54 61408 → 8883 [ACK] Seq=1 Ack=1 Win=66048 Len=0
18017 638.761721 192.168.15.167 52.50.121.37 TLSv1.2 362 Client Hello
18018 638.806599 52.50.121.37 192.168.15.167 TCP 60 8883 → 61408 [ACK] Seq=1 Ack=309 Win=28160 Len=0
18019 638.811071 52.50.121.37 192.168.15.167 TCP 1434 [TCP segment of a reassembled PDU]
18020 638.811142 52.50.121.37 192.168.15.167 TCP 1434 [TCP segment of a reassembled PDU]
18021 638.811182 192.168.15.167 52.50.121.37 TCP 54 61408 → 8883 [ACK] Seq=309 Ack=2761 Win=66048 Len=0
18022 638.811432 52.50.121.37 192.168.15.167 TLSv1.2 408 Server Hello, Certificate, Server Key Exchange, Certificate Request, Server Hello Done
18023 638.815252 192.168.15.167 52.50.121.37 TLSv1.2 1325 Certificate, Client Key Exchange, Certificate Verify, Change Cipher Spec, Encrypted Handshake Message
18032 638.862213 52.50.121.37 192.168.15.167 TLSv1.2 105 Change Cipher Spec, Hello Request, Hello Request
18033 638.904352 192.168.15.167 52.50.121.37 TCP 54 61408 → 8883 [ACK] Seq=1580 Ack=3166 Win=65792 Len=0