So the Saga Continues, What we found reviewing the PCAP line for Line was the client was inserting 2 cyphers that were tls1.3 cyphers. TLS_AES_256_GCM_SHA384 Yes TLS 1.3 TLS_AES_128_GCM_SHA256 Yes TLS 1.3 Responding server does not yet support tls1.3. Disabled the TLS1.3 cyphers and now the initial Handshake connects ok. It does introduce another issue subsequent connection attempts get ignored and fail to connect server. I suspect between the VM interface and Miraki PCAP now only show the initial SYN,ECE,CWR with TCP conversation [completeness: incomplete, NO_DATA]
... View more