MobileIron Sentry should now be able to support SNI, but I am still having issues with Docs@Work and Web@Work to establish a connection with the use of ADFS Web Application Proxy (Windows Server 2012 R2). Since I can leverage only one external IP address for Core and all the Sentries, I have to publish the URL rules on the ADFS proxy. When publishing these rules everything seems to work fine except the connections to the backend servers for Web@Work and Docs@Work.
I have tested two different Sentrys MICS portals on the ADFS proxy without any issues - the forward is always correct.
For Web@Work or Docs@Work, I can see the correct SNI value while doing a network trace.
0.0.0.0:443 is added correctly on the ADFS - and also the user agents.
Any ideas guys?
you are absolutely right, Web@Work and Docs@Work use a client cert for the AppTunnel and there is no sign within the trace.
I have to do a trace of the internal traffic, currently I am on vacation!
Good question about the offloading TLS termination - could you give a hint how to find that out?
SNI is an extension of TLS protocol.
It is generally used to host multiple TLS certificates from the same server and port.
As part of a TLS handshake the client supplies a server name in the Client Hello.
Based on this Client Name the server knows which certificate and web service is being requested.
HTTP host headers do not play any part of this, as once the HTTP header is presented you already have a TLS connection established to the server.
Also you won’t see host headers in your trace since HTTP data is encrypted, unless of course you decrypt the trace.
Ok thanks got it.
You mentioned the SSL termination on the ADFS that might cause the problem - what is the alternative?
Every MobileIron service depending on a user certificate fails.
Will try to decrypt the Wireshark traffic tomorrow and keep you up to date on my findings.