dn Wed, Feb 09, 2005, Nauman Akbar wrote:

> Dear Users,
> 
> I am in urgent need of help. If anyone can guide, I will be very
> thankful. I have given problem details below after necessary
> introduction.
> 
> I have scanned through the list archive as much as possible and I
> could only find one message with similar problem. The message is
> http://marc.theaimsgroup.com/?l=openssl-users&m=109629664621684&w=2
> Nobody replied to it.
> I suspect this is with reference to DoS flaw (resolved on 17/03/2004)
> but I am not sure. I am already upgrading my OpenSSL version to check
> out. If anyone can help please respond.
> 
> In my case,
> - SSL_accept return -1
> - SSL_get_error returns SSL_EEROR_SSL
> - SSL_error_string returns "error:00000001:lib(0):func(0):reason(1)"
> - ERR_print_errors doesnot print anything so I presume queue is empty.
> 
> The most intriguing part is when I was writing this server, I
> developed a small client just to test connectivity. That client
> succeeds. However, when doing live testing not a single connection was
> accepted from outside. The test client was run on the same host. I
> obtained network traffic using "ssldump"
> (http://www.rtfm.com/ssldump/). Its dump is given below for a single
> connection.
> 
> System details are as follows:
> - Linux (RH 9)
> - OpenSSL 0.9.7a
> - x86 box
> 
> The ssldump gives
> New TCP connection #144: w.x.y.z <-> a.b.c.d
> 144 1  0.0872 (0.0872)  C>SV3.0(57)  Handshake
>       ClientHello
>         Version 3.0
>         random[32]=
>           42 0a 0e cb b1 24 f5 d0 9d b6 27 3b 40 bc e2 37
>           40 5d 24 05 c4 9b 31 d8 90 46 7b 28 c8 83 f5 c2
>         cipher suites
>         Unknown value 0x3a
>         Unknown value 0x34
>         SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
>         SSL_DH_anon_WITH_DES_CBC_SHA
>         SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
>         SSL_DH_anon_WITH_RC4_128_MD5
>         SSL_DH_anon_EXPORT_WITH_RC4_40_MD5
>         compression methods
>                   NULL
> 144 2  0.0874 (0.0001)  S>CV3.0(2)  Alert
>     level           fatal
>     value           handshake_failure
> 144    0.0875 (0.0001)  S>C  TCP FIN
> 144    0.1368 (0.0492)  C>S  TCP FIN
> Sometimes the last two lines of "TCP FIN" are there, sometimes not. I
> am unable to obtain ssldump for test localhost client.
> 
> Please guys, it is quite an urgent situation. Please respond quickly.
> 

If those are the only cipher suites the client is sending then you'll need to
set some DH parameters and enable anon-DH in the cipher string. It must also
be a non standard client to only support anon-DH. 

You can simulate that situation using:

openssl s_client -cipher ADH:@STRENGTH [other options]

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to