Troubleshooting HTTP/3 in http.sys

Published Apr 01 2022 09:00 AM 2,051 Views

HTTP/3 is a major change to HTTP. It switches away from using TCP as a transport and TLS separately to using QUIC as a transport which has TLS 1.3 or higher built in. These changes mean that migrating from HTTP/2 to HTTP/3 can uncover unexpected issues due to previously non-problematic configurations. Here are some configurations to check if HTTP/3 is not working on Windows Server 2022 and above.

 

Checking the basics


First things first: is HTTP/3 properly enabled? This blog post walks through the process of enabling HTTP/3 for http.sys on Windows Server 2022. Earlier versions of Windows Server do not support HTTP/3 in http.sys.

 

HTTP/3 requires QUIC and by extension TLS 1.3. Check the IIS configuration for the site binding and ensure TLS 1.3 and QUIC are not disabled. Here is an example of an HTTP/3 friendly site binding:

 

tojens_0-1648759347689.png

 

The above steps will turn on HTTP/3 advertising over HTTP/3 ALTSVC frames. If the HTTP/3 clients also expect an alt-svc header to advertise support, check that the service is providing one. Here is an example of the most basic alt-svc header that advertises HTTP/3 support in the IIS “HTTP Response Header” UI:

 

tojens_1-1648759347691.png

 

Narrowing down the issue


If HTTP/3, its dependencies, and its advertisements are properly enabled and it is still not working, try comparing a fresh Windows Server installation against the server under investigation. Be sure to not apply any custom configuration such as GPOs or initialization scripts for this comparison. The intention is to compare the existing server with out-of-the-box Windows Server.

 

If the fresh install of Windows Server can use HTTP/3 as expected, it is likely that the issue is being caused by non-default Windows TLS configuration. Proceed to the “TLS 1.3 Configuration” section to learn more.

 

If the fresh installation of Windows Server also cannot use HTTP/3, check the networking environment. HTTP/3 uses QUIC, which requires port 443 UDP to be open on the host and network firewalls. Proxies that perform TLS interception (also known as SSL termination) may also be causing issues.

 

TLS 1.3 Configuration

 

TLS 1.3 is supported and enabled by default on Windows 11 and Windows Server 2022 and later operating systems. Check whether TLS 1.3 has been disabled on a supported machine using Transport Layer Security (TLS) registry settings | Microsoft Docs.

 

HTTP/3 may not be working because the server was previously configured to disable cipher suites that TLS 1.3 requires. Schannel supports only three cipher suites for TLS 1.3:

 

TLS_AES_256_GCM_SHA384

Enabled by default

TLS_AES_128_GCM_SHA256

Enabled by default

TLS_CHACHA20_POLY1305_SHA256

Disabled by default

 

 

Troubleshooting TLS 1.3 Cipher Suite Configuration:

  1. To see what TLS cipher suites are currently enabled on a machine, use the PowerShell cmdlet Get-TlsCipherSuites.
  2. Check that the enabled list output contains at least one supported TLS 1.3 cipher suite listed above.
  3. Ensure TLS 1.3 cipher suites have not been disabled by Group Policy  by checking the following registry key value: “HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Cryptography\Configuration\SSL”
  4. If no TLS 1.3 supporting cipher suites are enabled, manually enable one or more by using the PowerShell cmdlet Enable-TlsCipherSuite. They should be added to the top of the priority list using the Position flag, where the highest priority value is 0.

 

Additional troubleshooting resources

 

The msquic GitHub repo has several useful documents with additional context specific to QUIC:

  • Deployment considerations (link)
  • Diagnosing issues (link)
  • Settings to tinker with (link)
  • Troubleshooting guide (link)
%3CLINGO-SUB%20id%3D%22lingo-sub-3273139%22%20slang%3D%22en-US%22%3ETroubleshooting%20HTTP%2F3%20in%20http.sys%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3273139%22%20slang%3D%22en-US%22%3E%3CP%3EHTTP%2F3%20is%20a%20major%20change%20to%20HTTP.%20It%20switches%20away%20from%20using%20TCP%20as%20a%20transport%20and%20TLS%20separately%20to%20using%20QUIC%20as%20a%20transport%20which%20has%20TLS%201.3%20or%20higher%20built%20in.%20These%20changes%20mean%20that%20migrating%20from%20HTTP%2F2%20to%20HTTP%2F3%20can%20uncover%20unexpected%20issues%20due%20to%20previously%20non-problematic%20configurations.%20Here%20are%20some%20configurations%20to%20check%20if%20HTTP%2F3%20is%20not%20working%20on%20Windows%20Server%202022%20and%20above.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-393725212%22%20id%3D%22toc-hId-416761400%22%3EChecking%20the%20basics%3C%2FH2%3E%0A%3CP%3E%3CBR%20%2F%3EFirst%20things%20first%3A%20is%20HTTP%2F3%20properly%20enabled%3F%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fnetworking-blog%2Fenabling-http-3-support-on-windows-server-2022%2Fba-p%2F2676880%22%20target%3D%22_blank%22%3EThis%20blog%20post%3C%2FA%3E%20walks%20through%20the%20process%20of%20enabling%20HTTP%2F3%20for%20http.sys%20on%20Windows%20Server%202022.%20Earlier%20versions%20of%20Windows%20Server%20do%20not%20support%20HTTP%2F3%20in%20http.sys.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EHTTP%2F3%20requires%20QUIC%20and%20by%20extension%20TLS%201.3.%20Check%20the%20IIS%20configuration%20for%20the%20site%20binding%20and%20ensure%20TLS%201.3%20and%20QUIC%20are%20not%20disabled.%20Here%20is%20an%20example%20of%20an%20HTTP%2F3%20friendly%20site%20binding%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22tojens_0-1648759347689.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F360416i5FB24DCCD540B300%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22tojens_0-1648759347689.png%22%20alt%3D%22tojens_0-1648759347689.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20above%20steps%20will%20turn%20on%20HTTP%2F3%20advertising%20over%20HTTP%2F3%20ALTSVC%20frames.%20If%20the%20HTTP%2F3%20clients%20also%20expect%20an%20alt-svc%20header%20to%20advertise%20support%2C%20check%20that%20the%20service%20is%20providing%20one.%20Here%20is%20an%20example%20of%20the%20most%20basic%20alt-svc%20header%20that%20advertises%20HTTP%2F3%20support%20in%20the%20IIS%20%E2%80%9CHTTP%20Response%20Header%E2%80%9D%20UI%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22tojens_1-1648759347691.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F360415i5B9C1D861C697966%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22tojens_1-1648759347691.png%22%20alt%3D%22tojens_1-1648759347691.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1413729251%22%20id%3D%22toc-hId--1390693063%22%3ENarrowing%20down%20the%20issue%3C%2FH2%3E%0A%3CP%3E%3CBR%20%2F%3EIf%20HTTP%2F3%2C%20its%20dependencies%2C%20and%20its%20advertisements%20are%20properly%20enabled%20and%20it%20is%20still%20not%20working%2C%20try%20comparing%20a%20fresh%20Windows%20Server%20installation%20against%20the%20server%20under%20investigation.%20Be%20sure%20to%20not%20apply%20any%20custom%20configuration%20such%20as%20GPOs%20or%20initialization%20scripts%20for%20this%20comparison.%20The%20intention%20is%20to%20compare%20the%20existing%20server%20with%20out-of-the-box%20Windows%20Server.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20the%20fresh%20install%20of%20Windows%20Server%20can%20use%20HTTP%2F3%20as%20expected%2C%20it%20is%20likely%20that%20the%20issue%20is%20being%20caused%20by%20non-default%20Windows%20TLS%20configuration.%20Proceed%20to%20the%20%E2%80%9CTLS%201.3%20Configuration%E2%80%9D%20section%20to%20learn%20more.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20the%20fresh%20installation%20of%20Windows%20Server%20also%20cannot%20use%20HTTP%2F3%2C%20check%20the%20networking%20environment.%20HTTP%2F3%20uses%20QUIC%2C%20which%20requires%20port%20443%20UDP%20to%20be%20open%20on%20the%20host%20and%20network%20firewalls.%20Proxies%20that%20perform%20TLS%20interception%20(also%20known%20as%20SSL%20termination)%20may%20also%20be%20causing%20issues.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1073783582%22%20id%3D%22toc-hId-1096819770%22%3ETLS%201.3%20Configuration%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETLS%201.3%20is%20supported%20and%20enabled%20by%20default%20on%20Windows%2011%20and%20Windows%20Server%202022%20and%20later%20operating%20systems.%20Check%20whether%20TLS%201.3%20has%20been%20disabled%20on%20a%20supported%20machine%20using%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fdocs.microsoft.com%252Fen-us%252Fwindows-server%252Fsecurity%252Ftls%252Ftls-registry-settings%2523tls-dtls-and-ssl-protocol-version-settings%26amp%3Bdata%3D04%257C01%257CJess.Krynitsky%2540microsoft.com%257Ca52704e6676e42a90cc808da0e808dba%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637838242559292682%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%26amp%3Bsdata%3DpyAmdbJJQboFcq4yE83mPjlmFsNGdMld%252BfdHZCS%252B7Cg%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3ETransport%20Layer%20Security%20(TLS)%20registry%20settings%20%7C%20Microsoft%20Docs%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EHTTP%2F3%20may%20not%20be%20working%20because%20the%20server%20was%20previously%20configured%20to%20disable%20cipher%20suites%20that%20TLS%201.3%20requires.%20Schannel%20supports%20only%20three%20cipher%20suites%20for%20TLS%201.3%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CTABLE%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22235%22%3E%3CP%3ETLS_AES_256_GCM_SHA384%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22140%22%3E%3CP%3EEnabled%20by%20default%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22235%22%3E%3CP%3ETLS_AES_128_GCM_SHA256%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22140%22%3E%3CP%3EEnabled%20by%20default%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22235%22%3E%3CP%3ETLS_CHACHA20_POLY1305_SHA256%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22140%22%3E%3CP%3EDisabled%20by%20default%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETroubleshooting%20TLS%201.3%20Cipher%20Suite%20Configuration%3A%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3ETo%20see%20what%20TLS%20cipher%20suites%20are%20currently%20enabled%20on%20a%20machine%2C%20use%20the%20PowerShell%20cmdlet%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fpowershell%2Fmodule%2Ftls%2Fget-tlsciphersuite%3Fview%3Dwindowsserver2019-ps%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EGet-TlsCipherSuites%3C%2FA%3E.%3C%2FLI%3E%0A%3CLI%3ECheck%20that%20the%20enabled%20list%20output%20contains%20at%20least%20one%20supported%20TLS%201.3%20cipher%20suite%20listed%20above.%3C%2FLI%3E%0A%3CLI%3EEnsure%20TLS%201.3%20cipher%20suites%20have%20not%20been%20disabled%20by%20Group%20Policy%20%26nbsp%3Bby%20checking%20the%20following%20registry%20key%20value%3A%20%E2%80%9CHKEY_LOCAL_MACHINE%5CSOFTWARE%5CPolicies%5CMicrosoft%5CCryptography%5CConfiguration%5CSSL%E2%80%9D%3C%2FLI%3E%0A%3CLI%3EIf%20no%20TLS%201.3%20supporting%20cipher%20suites%20are%20enabled%2C%20manually%20enable%20one%20or%20more%20by%20using%20the%20PowerShell%20cmdlet%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fpowershell%2Fmodule%2Ftls%2Fenable-tlsciphersuite%3Fview%3Dwindowsserver2019-ps%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EEnable-TlsCipherSuite%3C%2FA%3E.%20They%20should%20be%20added%20to%20the%20top%20of%20the%20priority%20list%20using%20the%20%3CEM%3EPosition%20%3C%2FEM%3Eflag%2C%20where%20the%20highest%20priority%20value%20is%200.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--733670881%22%20id%3D%22toc-hId--710634693%22%3EAdditional%20troubleshooting%20resources%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20msquic%20GitHub%20repo%20has%20several%20useful%20documents%20with%20additional%20context%20specific%20to%20QUIC%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EDeployment%20considerations%20(%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2Fmicrosoft%2Fmsquic%2Fblob%2Fmain%2Fdocs%2FDeployment.md%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Elink%3C%2FA%3E)%3C%2FLI%3E%0A%3CLI%3EDiagnosing%20issues%20(%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2Fmicrosoft%2Fmsquic%2Fblob%2Fmain%2Fdocs%2FDiagnostics.md%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Elink%3C%2FA%3E)%3C%2FLI%3E%0A%3CLI%3ESettings%20to%20tinker%20with%20(%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2Fmicrosoft%2Fmsquic%2Fblob%2Fmain%2Fdocs%2FSettings.md%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Elink%3C%2FA%3E)%3C%2FLI%3E%0A%3CLI%3ETroubleshooting%20guide%20(%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2Fmicrosoft%2Fmsquic%2Fblob%2Fmain%2Fdocs%2FTSG.md%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Elink%3C%2FA%3E)%3C%2FLI%3E%0A%3C%2FUL%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-3273139%22%20slang%3D%22en-US%22%3E%3CP%3EA%20review%20of%20some%20common%20HTTP%2F3%20deployment%20challenges%20and%20how%20to%20address%20them%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-3273139%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3Ehttp.sys%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3Ehttp3%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EQUIC%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ETLS%201.3%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EWS2022%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Version history
Last update:
‎Apr 01 2022 09:00 AM
Updated by: