Do you use any reqrep/resprep rules? I'm asking because I had the same kind
of problem, also with java apps.

First I changed the global section to:
tune.ssl.default-dh-param 1024
ssl-default-bind-ciphers
EECDH+aRSA+AES:kRSA+AES:+AES256:RC4-SHA:!kEDH:!LOW:!EXP:!MD5:!aNULL:!eNULL
ssl-default-bind-options no-sslv3

Also modified a few reqrep/respreq, few rules only accepted HTTP/1.1, but
the clients made the requests using HTTP/1.0. That was the reason I was
getting the 400 error
Hope it helps.


Regards.

On Mon, Feb 23, 2015 at 3:36 PM, Lukas Tribus <luky...@hotmail.com> wrote:

> Hi,
>
>
> > I'm not currently sure on the JRE version. These are Android clients
> > written with a old Android SDK. All new clients are C++ / OpenSSL
> > based.
> >
> > I have set the DH param size to 1024 with the same results.
> > Additionally, I set up a bind statement that reflects that of the
> > backward compatibility link you provided from Mozilla. Again, with no
> > luck.
> >
> > Attached two pcap files:
> > haproxy_1.pcap: Capture of client against HAProxy with the target
> > configuration I started with + 1024 DH param. HAProxy is @ 10.3.2.74
> > here
> > haproxy_2.pcap: Capture of the client against OpenSSL s_server run as
> such:
> > openssl s_server -accept 443 -cert
> > ~/Downloads/json_rpc_server_cert_and_key.pem -msg -debug -state.
> > s_client is @ 10.3.2.118 here
>
> There's some confusion here.
>
> For the sake of clarity, please, for the time being, use the Mozilla cipher
> recommendations, and configure your bind line *exactly* like this (don't
> specify the named curves, just configure the ciphers without any additional
> configuration):
>
> http://pastebin.com/raw.php?i=XswSbviN
>
>
> and provide the pcap file of the failed handshake of *that* specific
> configuration, not your original configuration.
>
>
> "verify optional" on the bind line will certainly upset buggy clients,
> because
> the server will ask the client to provide a certificate, don't use it when
> troubleshooting SSL problems that are unrelated to client cert auth.
>
>
>
> I don't see any SPDY traffic in the traces either ...
>
>
> Regards,
>
> Lukas
>
>
>

Reply via email to