Using Chrome to try and access www.plus.net I get the following block from IDS
Alert ET INFO TLS Handshake Failure
Alert sid 2029340
Protocol TCP
Source IP 212.159.8.2
Destination IP 192.168.0.101
Source port 443
Destination port 62196
Interface LAN
When I use Firefox I have no problem. Can anyone shed light on this?
Using OPNsense 20.1.8_1-amd64
FreeBSD 11.2-RELEASE-p20-HBSD
OpenSSL 1.1.1g 21 Apr 2020
I am not an expert but here are some suggestions that come to mind.
I believe that the rule 2029340 is classed as "informational". That means that before assigning a drop action to it you should determine whether within your own environment it is appropriate to drop the packet (or indeed activate the rule).
The technical meaning of the rule can be found from https://doc.emergingthreats.net/bin/view/Main/WebSearch?search=2029340&scope=all&web=Main (https://doc.emergingthreats.net/bin/view/Main/WebSearch?search=2029340&scope=all&web=Main). Here is what it says for 2029340:
alert tls $EXTERNAL_NET any -> $HOME_NET any (msg:"ET INFO TLS Handshake Failure"; flow:established,to_client; dsize:7; content:"|15|"; depth:1; content:"|00 02 02 28|"; distance:2; within:4; fast_pattern; metadata: former_category INFO; classtype:bad-unknown; sid:2029340; rev:2; metadata:attack_target Client_Endpoint, deployment Perimeter, signature_severity Informational, created_at 2020_01_30, updated_at 2020_01_30;)
My bit level knowledge of TLS is very rusty so I unable to tell you what the content 00 02 02 28 means. But given that Suricata has found an objectionable TLS message during the handshake from the server to the client, it seems plausible that the server did not like the TLS Client hello sent by Chrome but it does like the TLS Client Hello from Firefox.
I note that SSLlabs at https://www.ssllabs.com/ssltest/analyze.html?d=www.plus.net (https://www.ssllabs.com/ssltest/analyze.html?d=www.plus.net) says that only TLS 1.2 is supported by www.plus.net.
My suggestions are:
(1) Do you really want to assign the Drop action to that Rule?
(2) Review your TLS cryptographic settings on Chrome by comparing then to those of Firefox. Including SSLVersionMin (not set to 1.3 is it?).
(3) Given that the problem is reproducible it might be worth your while capturing the TLS traffic (with Wireshark) to see what is going on.