Stuart,

There are several strange things about this trace.

1. There are no SSL/TLS "close notify" alerts being shown prior to the
transmission of the TCP FINs by either side.  
Seems unlikely that both sides would fail to send those alerts.  
Is the monitor program just not showing them?  
Are there possible other SSL/TLS alerts not being shown?
If there are other alerts we're not seeing, they may explain what's really
going on.

2. In SSL record "4 9", the clientHello does not include an SSL/TLS session 
ID (called a "resume" in record "4 1").  This is suboptimal, but not wrong.

3. Having requested another handshake ("4 8"), and having received a new 
clientHello ("4 9"), the server fails to continue the handshake it requested. 
Unless there's a missing alert here, it looks like a server error.

NSS's SSL API allows the application to suppress the use of the SSL session
cache.  However, you're using the LDAP SDK API, not the SSL API.  I'm not
an LDAP SDK expert, but if there's a way to disable SSL session caching 
through the LDAP SDK API, I'm not aware of it.  Sorry.

--
Nelson Bolyard            
Disclaimer:                  I speak for myself, not for Netscape

Reply via email to