Hi Mike,
Thanks for the quick response - appreciated. Having had a closer look at TLS, I think everything looks ok but have supplied a little more information below just in case there's anything that stands out.
These are the results from sslscan, indicating - if I'm interpreting it properly - that the Velociraptor server supports and prefers TLSv1.3? With the --show-certificate flag, sslcert also successfully retrieves the Velociraptor certificate.
>> sslscan.exe <VelociraptorServerFQDN>:8000
Version: 2.1.1 Windows 64-bit (Mingw)
OpenSSL 3.0.9 30 May 2023
Connected to
<VelociraptorServerIP>
Testing SSL server <VelociraptorServerFQDN> on port 8000 using SNI name <VelociraptorServerFQDN>
SSL/TLS Protocols:
SSLv2 disabled
SSLv3 disabled
TLSv1.0 disabled
TLSv1.1 disabled
TLSv1.2 disabled
TLSv1.3 enabled
TLS Fallback SCSV:
Server supports TLS Fallback SCSV
TLS renegotiation:
Session renegotiation not supported
TLS Compression:
Compression disabled
Heartbleed:
TLSv1.3 not vulnerable to heartbleed
Supported Server Cipher(s):
Preferred TLSv1.3 128 bits TLS_AES_128_GCM_SHA256 Curve P-521 DHE 521
Accepted TLSv1.3 256 bits TLS_AES_256_GCM_SHA384 Curve P-521 DHE 521
Accepted TLSv1.3 256 bits TLS_CHACHA20_POLY1305_SHA256 Curve P-521 DHE 521
Server Key Exchange Group(s):
TLSv1.3 128 bits secp256r1 (NIST P-256)
TLSv1.3 192 bits secp384r1 (NIST P-384)
TLSv1.3 260 bits secp521r1 (NIST P-521)
SSL Certificate:
Signature Algorithm: sha256WithRSAEncryption
RSA Key Strength: 2048
Subject: VelociraptorServer
Altnames: DNS:VelociraptorServer
Issuer: /O=Velociraptor CA
Not valid before: Apr 8 10:44:54 2023 GMT
Not valid after: Apr 7 10:44:54 2024 GMT
Couple of additional bits that may be relevant:
- I've noticed is that on the (Azure) Firewall, through which the clients traffic initially egresses, there are logs that it's denying requests for 'velociraptorserver' (without a Domain name) from the client on port 8000 which doesn't resolve. Is this normal / expected behaviour?
- Have given v0.7.1 of the Velociraptor client a spin with exactly the same results unfortunately.
- A Wireshark trace appears to indicate that, following a 'Client Hello', a 'Server Hello' is never actually received back, though the server does acknowledge the client hello
Again, thanks for your help here.
cheers,
John