Urjit,

I got it working once I replaced 
"EXP-DES-CBC-SHA" with 
"DES-CBC-SHA"

I think you might have to do something special to
enable export quality ciphers. 

regards,
Girish

--- Urjit Gokhale <[EMAIL PROTECTED]>
wrote:

> Hi,
> I have attached the sample server and client
> programs for your
> consideration. As these are minimal sample codes
> that reproduce my problem,
> error handling is not done.
> To run the server, you need to provide the port on
> the command line
> To run the client, you need to provide host and port
> where server is
> listening for ssl connections on the command line.
> 
> > > >For me this seems that server do not want to
> accept this
> > > >proposition because:
> > > > - do not have RSA support (maybe)
> > > > - do not have SHA support (maybe)
> > > > - do not have DES support (maybe) or DES40 is
> too
> > > weak.
> 
> As you would see in the server code, there are no
> explicit restrictions
> except for the fact that both server and client set
> the ssl method as SSLv3
> and ssl cipher list as "EXP-DES-CBC-SHA". So I am
> not sure if the support
> for RSA / SHA / DES is disabled.
> 
> > > Well ... as per my understanding, the cipher
> support is
> > > property of the crypto library. And my client
> and server both
> > > use the same crypto library. So I wonder why
> would the server
> > > reject the clients request.
> > Yes, but you have control what ciphers should be
> used.
> If you are suggesting the use of
> SSL_set_cipher_list(), I have already used
> it. If you are talking about some other approach,
> could you please elaborate
> more?
> 
> >
> > But after some testing I think that incompatible
> SSL3/TLS1
> > method may cause problem (as suggested by
> girish1729).
> >
> > For example, running server with command:
> > $ openssl s_server -key key.pem -cert cert.pem
> -tls1
> I am not sure if what you are trying here represents
> the same scenario that
> I am talking about. Here you are explicitly using
> tls1 method for server and
> hence the connection attempt will surely fail. But
> this is not the case with
> my application. I am setting ssl method as SSLv3 in
> both server and client
> and still the server refuses the connection :-(
> 
> > And on server side we see:
> > 8064:error:1408A10B:SSL
> routines:SSL3_GET_CLIENT_HELLO:wrong version
> > number:s3_srvr.c:685:
> > My suggestion is to display errors after bad
> SSL_accept()
> > in server code, for example:
> > char buf[256];
> > u_long err;
> >
> > while ((err = ERR_get_error()) != 0) {
> > ERR_error_string_n(err, buf, sizeof(buf));
> > fprintf(stderr, "%s", buf);
> > }
> I did try this and all I get is
> "error:1408A0C1:SSL
> routines:SSL3_GET_CLIENT_HELLO:no shared cipher"
> Googling for this error message did not return any
> helful information.
> 
> > other methods may be callback function at state or
> msg layer.
> I will have to try this. Any pointer in this
> direction will be helpful
> 
> Kyle,
> in your response you mentioned something about
> export ciphers. Could you
> take a look at the code and comment on "whether
> server really requires
> non-export cipher suits"? Because my understanding
> is that the server
> doesn't having any such restriction :-(
> 
> I am reiterating here that all the 4 binaries,
> sample_server, sample_client,
> s_server and s_client are using the same ssl
> library. I confirmed that with
> ldd. So the question still remains ...
> Why sample_server reject connection request from
> s_client, whereas s_server
> works just fine?
> 
> Thanks a lot for your responses,
> ~ Urjit
> 
> DISCLAIMER
> ==========
> This e-mail may contain privileged and confidential
> information which is the property of Persistent
> Systems Pvt. Ltd. It is intended only for the use of
> the individual or entity to which it is addressed.
> If you are not the intended recipient, you are not
> authorized to read, retain, copy, print, distribute
> or use this message. If you have received this
> communication in error, please notify the sender and
> delete all copies of this message. Persistent
> Systems Pvt. Ltd. does not accept any liability for
> virus infected mails.
> 


__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to