The Burp Suite User Forum was discontinued on the 1st November 2024.

Burp Suite User Forum

For support requests, go to the Support Center. To discuss with other Burp users, head to our Discord page.

SUPPORT CENTER DISCORD

Error: Remote host terminated the handshake

rajjder | Last updated: Oct 10, 2024 08:19PM UTC

Hi! I'm struggling to proxy traffic via Burp and keep getting "Remote host terminated the handshake" on a particular domain I'm testing. It works on other websites. Things I've tried: - Multiple browsers (firefox, chrome and built-in chromium browser) - Reset and made sure the Burp certificate is uploaded and trusted. - Disabled TLS 1.3 (website supports 1.2 and 1.3, downgrade seems successful). - Enabled all cipher suites. - No error messages in console - Tweaked on most settings in settings/TLS, e.g. "Allow unsafe renegotiation", "Enable algorithms blocked by Java.." etc.. - Tried to switch port to something other than 8080. I'm on the newest version of burp v.2024.8.4 at the time of writing. Any other ideas here? From diagnostics: --------------------------------------------------------------------------------------------------------- SYSTEM PROPERTIES --------------------------------------------------------------------------------------------------------- awt.dnd.drag.threshold 15 com.sun.net.ssl.requireCloseNotify false exe4j.moduleName /opt/BurpSuitePro/BurpSuitePro file.encoding UTF-8 file.separator / flatlaf.uiScale.enabled false install4j.appDir /opt/BurpSuitePro/ install4j.exeDir /opt/BurpSuitePro/ install4j.jvmDir /opt/BurpSuitePro/jre install4j.launcherId 70 install4j.swt false java.class.path /opt/BurpSuitePro/.install4j/i4jruntime.jar:/opt/BurpSuitePro/.install4j/launcherccf7dac9.jar:/opt/BurpSuitePro/burpsuite_pro.jar java.class.version 65.0 java.home /opt/BurpSuitePro/jre java.io.tmpdir /tmp java.library.path /usr/java/packages/lib:/usr/lib64:/lib64:/lib:/usr/lib java.net.useSystemProxies true java.runtime.name OpenJDK Runtime Environment java.runtime.version 21.0.4+7-LTS java.specification.name Java Platform API Specification java.specification.vendor Oracle Corporation java.specification.version 21 java.vendor Eclipse Adoptium java.vendor.url https://adoptium.net/ java.vendor.url.bug https://github.com/adoptium/adoptium-support/issues java.vendor.version Temurin-21.0.4+7 java.version 21.0.4 java.version.date 2024-07-16 java.vm.compressedOopsMode Zero based java.vm.info mixed mode java.vm.name OpenJDK 64-Bit Server VM java.vm.specification.name Java Virtual Machine Specification java.vm.specification.vendor Oracle Corporation java.vm.specification.version 21 java.vm.vendor Eclipse Adoptium java.vm.version 21.0.4+7-LTS jdk.debug release jdk.tls.allowUnsafeServerCertChange true jdk.tls.maxCertificateChainLength 1337 jsse.enableSNIExtension false native.encoding UTF-8 org.bouncycastle.jsse.client.dh.minimumPrimeBits 1024 org.bouncycastle.jsse.client.dh.unrestrictedGroups true os.arch amd64 os.name Linux os.version 5.15.0-122-generic path.separator : stderr.encoding UTF-8 stdout.encoding UTF-8 sun.arch.data.model 64 sun.awt.enableExtraMouseButtons true sun.boot.library.path /opt/BurpSuitePro/jre/lib sun.cpu.endian little sun.io.unicode.encoding UnicodeLittle sun.java.command install4j.burp.StartBurp sun.java.launcher SUN_STANDARD sun.jnu.encoding UTF-8 sun.management.compiler HotSpot 64-Bit Tiered Compilers user.country US user.dir /opt/BurpSuitePro user.home /home/... user.language en user.name user.timezone Europe/Oslo --------------------------------------------------------------------------------------------------------- SYSTEM RESOURCES --------------------------------------------------------------------------------------------------------- Number of processors 8 Total JVM memory 600 MiB Max JVM memory 7.64 GiB Free JVM memory 256.44 MiB Total physical memory 15.28 GiB Free physical memory 1.57 GiB Total swap 980 MiB Free swap 2.24 MiB --------------------------------------------------------------------------------------------------------- BURP PROPERTIES --------------------------------------------------------------------------------------------------------- Burp Version 2024.8.4 Build Number 32909 Product Name Burp Suite Professional Update Channel Stable Burp Browser [version=129.0.6668.70, installationPath=/opt/BurpSuitePro/burpbrowser/129.0.6668.70] Code source /opt/BurpSuitePro/burpsuite_pro.jar Debug ID qe8bhb0m176pn1xaijs7:gb6a JAR type Installer currenttimemillis 1728591330026 nanotime 74087932178668 superuser false --------------------------------------------------------------------------------------------------------- EXTENSIONS --------------------------------------------------------------------------------------------------------- Montoya build number 20240804000032909 Retire.js Extension type: Java, Scanner checks: 1 WAFDetect Extension type: Java Software Vulnerability Scanner Extension type: Java Software Version Reporter Extension type: Java Meth0dMan Extension type: Java JSON Web Tokens Extension type: Java JavaScript Security Extension type: Java CSRF Scanner Extension type: Java Attack Surface Detector Extension type: Java Active Scan++ Extension type: Python Autorize Extension type: Python SSL Scanner Extension type: Python Timeinator, Time Based Attacker Extension type: Python Request Timer Extension type: Java GraphQL Raider Extension type: Java InQL - Introspection GraphQL Scanner Extension type: Python Filter Options Method Extension type: Python Custom Extension type: Java, HTTP handlers: 1, Http request editor providers: 1, Http response editor providers: 1, Context menu providers: 1, Suite tabs: 1 Stepper Extension type: Java, Extension state listeners: 1, HTTP handlers: 1, Http request editor providers: 1, Http response editor providers: 1, Context menu providers: 1, Suite tabs: 1

rajjder | Last updated: Oct 11, 2024 10:29AM UTC

So, I kind of find a solution that works for now. I realized that OWASP Zap actually works which lead me to this blog post: https://labs.nettitude.com/tutorials/how-to-fix-burp-suite-ssltls-connection-problems/ Basically, I'm using owasp zap as a proxy for burp to handle the TLS handshake. Still think this a bug that should be fixed.

Michelle, PortSwigger Agent | Last updated: Oct 14, 2024 09:29AM UTC