An update... I've discovered that the cas.ucdavis.edu machine does not
correctly deal with fragmented IP packets. I thought this might be the
problem but then I went looking for those types of packets and found
none (I'll still try to get that fixed though).

Then I discovered that on the "client hello" packet (first packet after
the connection is established) on a Lucid machine shows up in wireshark
as the TLSv1 protocol and on a Karmic machine it shows up as a SSLv2
protocol.

I wonder why this changed? Did the defaults for openssl change or
something?

-- 
fopen fails on some SSL urls
https://bugs.launchpad.net/bugs/592442
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in ubuntu.

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs

Reply via email to