> [appro - Sat Feb 11 14:24:23 2012]:
> 
> Note that above referred post to openssl-users discusses insufficient
> buffer for CertificateRequest message (when server is configured for
> client certificate authentication and collects *all* suitable root
> certificates it can find in computer's certificate store). But here we
> are talking about ServerHello message! The only possibility for blow-up
> is extensions, which makes me really wonder what kind of extension is
> it? Therefore I wonder if you, Massimiliano, can collect network traffic
> capture (e.g. with Wireshark) when it works.
> 

Perhaps someone is using an MPEG-of-cat extension but for ServerHello now?

The output of -tlsextdebug option to s_client would be useful when it
works too.

Steve.
-- 
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to