Hi!
I am a bit confused about https inspection and SNI-support.
We are running r80.20 take 80 with https inspection and we alse have enabled the "Categorize HTTPS websites" for non https-inspection machines.
Lately we encounter strange behaviours with websites running in Cloudflare.
ssllabs shows: "This site works only in browsers with SNI support." and most of them only supports ESCDA cipher suites that is only supported from the gateway to the server in R80.20
One example of the behaviour
Client using chrome (same issue with other browsers) to access https://oauth.net
Pcap from the client: Client web browser sends Client Hello , SNI=oauth.net
The gateway tries to connect to the server and tries the supported cipher suites.
Pcap from the gateway: After a while (after failing several times without sending ECDSA ciphers) they connect with the supported ECDSA cipher and the server sends correct SAN-names:
*.oauth.net, sni.cloudflare.com and oauth.net
Pcap from the client:
The client recieves wrong SAN-names: api2.hitta.se and sni.cloudflare.com and the web browser displays a certificate warning.
All wrong SAN-names displayed are also hosted on cloudflare, so my theory is that the firewall has cached the SAN-names and the corresponding ip-address.
After hitting F5 alot of times and accepting the wrong certificate the client can connect.
My questions:
Why is the client getting wrong SAN-names from the gateway?
Is there a https-cache (SAN-names to corresponding ip-address) that is causing this?
If so, can it be cleared?
Is there a way to get around this issue without disabling https-inspection to the cloudflare /14 subnet without upgrading to R80.30?
Adding screenshots of the behaviour.