WSSA agent installed and used to access the internet via Cloud Secure Web Gateway.
Disabling WSSA allows the Application to run normally.
Cloud Secure Web Gateway
WSS Agent
Although an issue is seen with the WSSA agent, the same problem can manifest itself with any 'SSL inspected' Application going through WSS that expects the origin server certificate chain to root.
Yarn Application has built-in logic to verify server certificate is issued by its CA
With WSS SSL inspection, the Proxy intercepts the server cert and chain from the Origin server, and sends down a server certificate with the same common name, but signed by the WSS CA
Any client that does certificate pinning and/or expects the server certificate to be that of the physical origin server will fail with SSL inspection enabled
Add an SSL inspection bypass for the destination domain.
Identifying the domain to bypass SSL inspection may be easy or difficult depending on the application and client.
In some cases, the Application may include details about the domain we are having issues with, and we simply take this and add it to the SSL bypass domain list.
In other cases, as with the one above, the Application does not give any such information. To identify the domain, one needs to do the following:
Here's an example of what the PCAP looked like when we failed