On Thu, Mar 10, 2016 at 12:58:34PM +0000, Irena Johnson via RT wrote:

> Our clients are having trouble connecting to our GRAM server, which has a
> sha256 host certificate.

The reason for the connection failures may be unrelated to the
certificate signature algorithm.  What specific symptoms lead to
the conclusion that this is the problem?

In OpenSSL 1.0.1 sha256 is enabled by default (via SSL_library_init()
also known as OpenSSL_add_ssl_algorithms()).

> and it appears it's not compatible with sha256 encryption:

This is simply not the case.

> The command "openssl ciphers -v | grep 256" returns nothing.

Not even "AES256" ciphers?  That's rather odd, those have been
around since 0.9.8 IIRC.

And, in any case, this is the wrong test for support for SHA256 in
certificates.  Your problem is with the server certificate, not
the MAC algorithm used in TLS ciphers.

> What version of openssl should they install? Thank you for your help,

The problem is almost certainly elsewhere.  It is of course possible
to build OpenSSL with various algorithms disabled, including
"no-sha256", ... so please report the output of

    $ openssl version -v -p -o -f

and "ldd" output showing the library dependencies of both the "openssl"
command, and your application.

        $ ldd /usr/bin/openssl | egrep 'lib(ssl|crypto)'
        $ ldd /some/executable | egrep 'lib(ssl|crypto)'

-- 
        Viktor.
-- 
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Reply via email to