Issue 3203: "Error 2 (net::ERR_FAILED): Unknown error." when connecting to  
https://www14.software.ibm.com/ on Vista
http://code.google.com/p/chromium/issues/detail?id=3203

Comment #6 by [EMAIL PROTECTED]:
This seems to be a TLS-intolerant server, at least IE7 on Vista handles
it as a TLS-intolerant server and retry with SSL 3.0.  The reason I'm not
sure if the server is TLS-intolerant is that Firefox has no problem with
the server at all.

The workaround is to turn off "Use TLS 1.0" in Control Panel > Internet  
Options >
Advanced > Security.  I don't really recommend this because you may forget
to turn it back on.

The SSL packet trace between IE7 on Vista and the server is as follows.
For Google Chrome, the SSL packet trace stops at the completion of
connection 1 (Connection 1 Complete [Wed Oct  8 12:24:29 2008]) because
Google Chrome doesn't retry with SSL 3.0.

Connection #1 [Wed Oct  8 12:24:29 2008]
Connected to www14.software.ibm.com:443
--> [
(134 bytes of 129)
SSLRecord { [Wed Oct  8 12:24:29 2008]
    0: 16 03 01 00  81                                     | .....
    type    = 22 (handshake)
    version = { 3,1 }
    length  = 129 (0x81)
    handshake {
    0: 01 00 00 7d                                         | ...}
       type = 1 (client_hello)
       length = 125 (0x00007d)
          ClientHelloV3 {
             client_version = {3, 1}
             random = {...}
    0: 48 ed 08 ec  6b a5 af 75  57 0f d4 37  e5 e5 b0 96  | H...k..uW..7....
   10: 2f ba a6 4c  49 64 74 a6  c4 e4 1c 31  7c 7a 08 7f  | /..LIdt....1|z. 
             session ID = {
                 length = 0
                 contents = {...}
             }
             cipher_suites[12] = {
                 (0x002f) TLS/RSA/AES128-CBC/SHA
                 (0x0035) TLS/RSA/AES256-CBC/SHA
                 (0x0005) SSL3/RSA/RC4-128/SHA
                 (0x000a) SSL3/RSA/3DES192EDE-CBC/SHA
                 (0xc009) TLS/ECDHE-ECDSA/AES128-CBC/SHA
                 (0xc00a) TLS/ECDHE-ECDSA/AES256-CBC/SHA
                 (0xc013) TLS/ECDHE-RSA/AES128-CBC/SHA
                 (0xc014) TLS/ECDHE-RSA/AES256-CBC/SHA
                 (0x0032) TLS/DHE-DSS/AES128-CBC/SHA
                 (0x0038) TLS/DHE-DSS/AES256-CBC/SHA
                 (0x0013) SSL3/DHE-DSS/DES192EDE3CBC/SHA
                 (0x0004) SSL3/RSA/RC4-128/MD5
             }
             compression[1] = { 00 }
             extensions[60] = {
               extension type server_name, length [29] = {
    0: 00 1b 00 00  18 66 69 70  73 2e 6d 74  76 2e 63 6f  | .....fips.mtv.co
   10: 72 70 2e 67  6f 6f 67 6c  65 2e 63 6f  6d           | rp.google.com
               }
               extension type status_request, length [5] = {
    0: 01 00 00 00  00                                     | .....
               }
               extension type elliptic_curves, length [8] = {
    0: 00 06 00 17  00 18 00 19                            | ........
               }
               extension type ec_point_formats, length [2] = {
    0: 01 00                                               | ..
               }
             }
          }
    }
}
]
<-- [
(1593 bytes of 1588)
SSLRecord { [Wed Oct  8 12:24:29 2008]
    0: 16 03 00 06  34                                     | ....4
    type    = 22 (handshake)
    version = { 3,0 }
    length  = 1588 (0x634)
    handshake {
    0: 02 00 00 46                                         | ...F
       type = 2 (server_hello)
       length = 70 (0x000046)
          ServerHello {
             server_version = {3, 0}
             random = {...}
    0: 00 00 00 48  57 e6 4a 3e  e5 b1 d4 dd  55 68 e0 8e  | ...HW.J>....Uh..
   10: a4 73 c2 d1  e4 a5 0e 95  ce c0 d2 f6  99 64 45 cd  | .s...........dE.
             session ID = {
                 length = 32
                 contents = {...}
    0: 00 01 71 be  c1 1b 70 82  07 82 b6 ee  07 21 cf a3  | ..q...p......!..
   10: a5 6b e4 83  58 58 58 58  48 ed 08 ed  01 87 ab fc  | .k..XXXXH.......
             }
             cipher_suite = (0x0035) TLS/RSA/AES256-CBC/SHA
             compression method = 00
          }
    0: 0b 00 05 e2                                         | ....
       type = 11 (certificate)
       length = 1506 (0x0005e2)
          CertificateChain {
             chainlength = 1503 (0x05df)
             Certificate {
                size = 693 (0x02b5)
                data = { saved in file 'cert.001' }
             }
             Certificate {
                size = 804 (0x0324)
                data = { saved in file 'cert.002' }
             }
          }
    0: 0e 00 00 00                                         | ....
       type = 14 (server_hello_done)
       length = 0 (0x000000)
    }
}
]
Read EOF on Client socket. [Wed Oct  8 12:24:29 2008]
Read EOF on Server socket. [Wed Oct  8 12:24:29 2008]
Connection 1 Complete [Wed Oct  8 12:24:29 2008]
Connection #2 [Wed Oct  8 12:24:29 2008]
Connected to www14.software.ibm.com:443
--> [
(56 bytes of 51)
SSLRecord { [Wed Oct  8 12:24:29 2008]
    0: 16 03 00 00  33                                     | ....3
    type    = 22 (handshake)
    version = { 3,0 }
    length  = 51 (0x33)
    handshake {
    0: 01 00 00 2f                                         | .../
       type = 1 (client_hello)
       length = 47 (0x00002f)
          ClientHelloV3 {
             client_version = {3, 0}
             random = {...}
    0: 48 ed 08 ed  f3 7c f6 ac  70 44 b1 56  f9 a5 8c 51  | H....|..pD.V...Q
   10: 09 cf da 97  66 ef 7d b9  9c 5c 8e 52  c5 34 4a ad  | ....f.}..\.R.4J.
             session ID = {
                 length = 0
                 contents = {...}
             }
             cipher_suites[4] = {
                 (0x0005) SSL3/RSA/RC4-128/SHA
                 (0x000a) SSL3/RSA/3DES192EDE-CBC/SHA
                 (0x0013) SSL3/DHE-DSS/DES192EDE3CBC/SHA
                 (0x0004) SSL3/RSA/RC4-128/MD5
             }
             compression[1] = { 00 }
          }
    }
}
]
<-- [
(1593 bytes of 1588)
SSLRecord { [Wed Oct  8 12:24:29 2008]
    0: 16 03 00 06  34                                     | ....4
    type    = 22 (handshake)
    version = { 3,0 }
    length  = 1588 (0x634)
    handshake {
    0: 02 00 00 46                                         | ...F
       type = 2 (server_hello)
       length = 70 (0x000046)
          ServerHello {
             server_version = {3, 0}
             random = {...}
    0: 00 00 00 48  1a f2 d0 3c  53 0e 08 88  c3 c9 55 6c  | ...H...<S.....Ul
   10: 42 b9 3e 85  13 c7 09 48  d8 8c d9 30  e7 41 1b 13  | B.>....H...0.A..
             session ID = {
                 length = 32
                 contents = {...}
    0: 00 01 b0 86  8f 10 54 de  41 28 d1 86  43 6c ae 8b  | ......T.A(..Cl..
   10: 04 6f 56 c0  58 58 58 58  48 ed 08 ed  01 8c 65 22  | .oV.XXXXH.....e"
             }
             cipher_suite = (0x0005) SSL3/RSA/RC4-128/SHA
             compression method = 00
          }
    0: 0b 00 05 e2                                         | ....
       type = 11 (certificate)
       length = 1506 (0x0005e2)
          CertificateChain {
             chainlength = 1503 (0x05df)
             Certificate {
                size = 693 (0x02b5)
                data = { saved in file 'cert.003' }
             }
             Certificate {
                size = 804 (0x0324)
                data = { saved in file 'cert.004' }
             }
          }
    0: 0e 00 00 00                                         | ....
       type = 14 (server_hello_done)
       length = 0 (0x000000)
    }
}
]
--> [
(208 bytes of 132, with 71 left over)
SSLRecord { [Wed Oct  8 12:24:29 2008]
    0: 16 03 00 00  84                                     | .....
    type    = 22 (handshake)
    version = { 3,0 }
    length  = 132 (0x84)
    handshake {
    0: 10 00 00 80                                         | ....
       type = 16 (client_key_exchange)
       length = 128 (0x000080)
          ClientKeyExchange {
             message = {...}
          }
    }
}
(208 bytes of 1, with 65 left over)
SSLRecord { [Wed Oct  8 12:24:29 2008]
    0: 14 03 00 00  01                                     | .....
    type    = 20 (change_cipher_spec)
    version = { 3,0 }
    length  = 1 (0x1)
    0: 01                                                  | .
}
(208 bytes of 60)
SSLRecord { [Wed Oct  8 12:24:29 2008]
    0: 16 03 00 00  3c                                     | ....<
    type    = 22 (handshake)
    version = { 3,0 }
    length  = 60 (0x3c)
             < encrypted >
}
]
<-- [
(6 bytes of 1)
SSLRecord { [Wed Oct  8 12:24:29 2008]
    0: 14 03 00 00  01                                     | .....
    type    = 20 (change_cipher_spec)
    version = { 3,0 }
    length  = 1 (0x1)
    0: 01                                                  | .
}
]
<-- [
(65 bytes of 60)
SSLRecord { [Wed Oct  8 12:24:29 2008]
    0: 16 03 00 00  3c                                     | ....<
    type    = 22 (handshake)
    version = { 3,0 }
    length  = 60 (0x3c)
             < encrypted >
}
]
Read EOF on Client socket. [Wed Oct  8 12:24:29 2008]
Read EOF on Server socket. [Wed Oct  8 12:24:29 2008]
Connection 2 Complete [Wed Oct  8 12:24:29 2008]



-- 
You received this message because you are listed in the owner
or CC fields of this issue, or because you starred this issue.
You may adjust your issue notification preferences at:
http://code.google.com/hosting/settings

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Chromium-bugs" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at 
http://groups.google.com/group/chromium-bugs?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to