On Thu, Dec 23, 2021 at 12:51:14AM +0100, Leo Unglaub wrote: > Here is the successful response: > > >CONNECTED(00000003) > >3143473289712:error:1400442E:SSL routines:CONNECT_CR_SRVR_HELLO:tlsv1 alert > >protocol version:/usr/src/lib/libssl/tls13_lib.c:151: > >--- > >no peer certificate available > >--- > >No client certificate CA names sent > >--- > >SSL handshake has read 5 bytes and written 201 bytes > >--- > >New, (NONE), Cipher is (NONE) > >Secure Renegotiation IS NOT supported > >Compression: NONE > >Expansion: NONE > >No ALPN negotiated > >SSL-Session: > > Protocol : TLSv1.2 > > Cipher : 0000 > > Session-ID: Session-ID-ctx: Master-Key: Start Time: > >1640216653 > > Timeout : 7200 (sec) > > Verify return code: 0 (ok) > >---
That is not a successful response. Try this: # echo "foobar" | nc -l localhost 12345 & # openssl s_client -tls1_2 -connect localhost:12345 and compare the output to what you have above. Then try: # echo "foobar" | nc -l -c -C /etc/ssl/server.crt -K /etc/ssl/private/server.key localhost 12345 & # openssl s_client -tls1_2 -connect localhost:12345 To see what a successful response looks like.