[Privoxy-users] Weird TLS problem with Apple watch
Rainer Sokoll
rainer+lists.privoxy.org at sokoll.com
Tue Mar 3 20:10:05 UTC 2020
> Am 03.03.2020 um 21:00 schrieb Ian Silvester <iansilvester at fastmail.fm>:
>
> I see.
>
> In your original post though the packet isn't actually the one that failed - according to the IETF link the packet is an alert stating that the HTTPS decryption failed - I am going to assume that this has been originally sent by the Siri server since Privoxy does not decrypt HTTPS, assuming you do not have any additional software in the chain to decrypt HTTPS at the router?
>
> If the above is all true, then the problem packet was an earlier one sent by the watch to the phone for retransmission to the server, or else one generated by the phone (again, it all depends on the Siri piggyback protocol).
>
> Since you're only seeing the problem with Privoxy in the chain, my thinking is that one of the piggyback Siri URLs contains a pattern that Privoxy is blocking. The next step would therefore be to enable logging of blocked (and also perhaps not-blocked) requests (see the Privoxy documentation for details of how to do this), ensure nothing else is using Privoxy, then launch a Siri query from the phone.
>
> You can then peruse the log file and see if any requests look like ones you needed, then apply an appropriate unblocker to let them through.
All good points to consider, thank you.
Will take a couple of days to check (I am on a business trip)
Rainer
More information about the Privoxy-users
mailing list