Hi,
I'm working on putting SSL/TLS session caching into Exim, and I've almost
got it working, borrowing heavily from the mod_ssl dbm caching code.
The problem I'm getting is that when I reuse a session from the client side,
I get this:
Initialised TLS
DBM file record @192.168.254.1 suggests
On Wed, Sep 18, 2002 at 02:58:53AM +0100, Steve Haslam wrote:
So, according to ssldump, the cipherSuite entry in the ServerHello is the
same the second time round. Is it a problem that the client seems to be in
read server hello B state twice?
OK, can anyone advise me? Is ssldump really
On Wed, Sep 18, 2002 at 09:09:41AM +0200, Steve Haslam via RT wrote:
On Wed, Sep 18, 2002 at 02:58:53AM +0100, Steve Haslam wrote:
So, according to ssldump, the cipherSuite entry in the ServerHello is the
same the second time round. Is it a problem that the client seems to be in
read
I'm developing an OpenSSL-based SSL sniffer that monitors decrypted
SSL traffic using the webserver's private keys on real site traffic
(similar to ssldump). For some reasons, part of the SSL traffic is
not being decrypted.
I'm looking for possible reasons for this. The ones I am
On Wed, Sep 18, 2002 at 03:47:52AM +0100, Steve Haslam wrote:
SSL DEBUG HACK: s-hit=1, c=0x815217c (EDH-DSS-DES-CBC3-SHA),
s-session-cipher=(nil) ((NONE))
In fact.. (talking to myself again, sorry), I looked in d2i_SSL_SESSION(),
and it sets cipher to NULL, although it sets cipher_id. So is
On Wed, Sep 18, 2002 at 09:18:22AM +0200, Lutz Jaenicke via RT wrote:
On Wed, Sep 18, 2002 at 09:09:41AM +0200, Steve Haslam via RT wrote:
SSL DEBUG HACK: s-hit=1, c=0x815217c (EDH-DSS-DES-CBC3-SHA),
s-session-cipher=(nil) ((NONE))
maybe there's a problem with deserialising the
On Wed, Sep 18, 2002 at 04:03:26PM +0200, Steve Haslam via RT wrote:
On Wed, Sep 18, 2002 at 09:18:22AM +0200, Lutz Jaenicke via RT wrote:
Workaround: the problem is does not appear, when
SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, which is part of
SSL_OP_ALL (see man
On Wed, Sep 18, 2002 at 09:18:22AM +0200, Lutz Jaenicke via RT wrote:
On Wed, Sep 18, 2002 at 09:09:41AM +0200, Steve Haslam via RT wrote:
SSL DEBUG HACK: s-hit=1, c=0x815217c (EDH-DSS-DES-CBC3-SHA),
s-session-cipher=(nil) ((NONE))
maybe there's a problem with deserialising the
I notice when using d2i_PUBKEY() to convert a string RSA
SubjectPublicKeyInfo to an EVP_PKEY struct that the string pointer ends up
pointing to random memory. Is this deliberate (e.g. for security reasons)
or a bug? I would like to have the public key string still available when
the function
I use the OpenSSL libraries on Solaris and Linux and have recently hacked my copy of
Makefile.org to create copies of the shared libraries libssl.so and libcrypto.so with
different names (eg libxyzssl.so and libxyzcrypto.so) - note: the hack is minimal,
just building _additional_ shared
10 matches
Mail list logo