![]() Note that the TCP and SSL handshake happens whenever an HTTPS request made. ![]() Since we don't have a good information in our browser test, we move to the second step of our troubleshooting which is to check if the TCP and SSL handshake is done without a problem. NET configuration, TLS negotiation in the SSL handshake may behave differently. ![]() When it is an ASP.NET application that runs as a client, depending on the. This difference may cause different behaviors.Īlso, when testing with browser, we rely on the browser TLS negotiation settings and its choices during the SSL handshake. When ASP.NET application is used it will use the computer account's store. Remember that our ASP.NET web application is making an HTTP web request to URL so our ASP.NET web application is acting as a client here.Īlthough a browser can be used to test the communication, this may not be the safest way to test each and every scenario because this test will use current user's certificate store. Now we have faced another problem but the browser test did not show any problem so the certificate seems valid in our browser test, and, we are still seeing the very same error message telling us that the existing connection is forcibly closed by the remote host. We made some basic tests, such as a "browser test" and found that the certificate was not valid. In our first scenario, we troubleshooted a "The underlying connection was closed: Could not establish trust relationship for the SSL/TLS secure channel" error message. ![]() This is the second part of our series of articles about troubleshooting TLS / SSL communications problems when you make Http Web Request or WCF queries from your ASP.NET applications to SSL endpoints. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |