On 12/11/06, chris busbey <[EMAIL PROTECTED]> wrote:
On 12/11/06, Marek Marcola <[EMAIL PROTECTED]> wrote:
> > It almost seems like the server is accepted SSL3 msgs, but sending out
> > another protocol type.  Any suggestions?
> If you using Linux, can you send ssldump or wireshark dump
> of this session.

Here is an ssldump of s_client connecting to my server.  I am getting
a "Length mismatch" error following the client key exchange.  In this
run, the server ctx is set to receive SSLv23, the ssl on s_client was
not specified.  Would the Length Mismatch indicate a bad key?

Another trial forcing tls1 on both sides of the connection did not
result in the above "Length Mismatch" error.  Here is the output of
that trial's ssl dump.  Any thoughts?

New TCP connection #67: localhost.localdomain(42489) <->
localhost.localdomain(5758)
67 1  0.0032 (0.0032)  C>SV3.1(95)  Handshake
     ClientHello
       Version 3.1
       random[32]=
         45 7d 8d 96 89 31 b1 d3 cf 44 80 ae 06 eb 1d ac
         48 d0 8e bd 96 b5 b8 da c9 cc c0 0c e5 6a ec d7
       cipher suites
       Unknown value 0x39
       Unknown value 0x38
       Unknown value 0x35
       TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
       TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
       TLS_RSA_WITH_3DES_EDE_CBC_SHA
       Unknown value 0x33
       Unknown value 0x32
       Unknown value 0x2f
       TLS_DHE_DSS_WITH_RC4_128_SHA
       TLS_RSA_WITH_RC4_128_SHA
       TLS_RSA_WITH_RC4_128_MD5
       TLS_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA
       TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA
       TLS_RSA_EXPORT1024_WITH_RC2_CBC_56_MD5
       TLS_DHE_RSA_WITH_DES_CBC_SHA
       TLS_DHE_DSS_WITH_DES_CBC_SHA
       TLS_RSA_WITH_DES_CBC_SHA
       TLS_DHE_DSS_WITH_RC2_56_CBC_SHA
       TLS_RSA_EXPORT1024_WITH_RC4_56_SHA
       TLS_RSA_EXPORT1024_WITH_RC4_56_MD5
       TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
       TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
       TLS_RSA_EXPORT_WITH_DES40_CBC_SHA
       TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5
       TLS_RSA_EXPORT_WITH_RC4_40_MD5
       compression methods
                 NULL
67 2  0.0083 (0.0050)  S>CV3.1(74)  Handshake
     ServerHello
       Version 3.1
       random[32]=
         45 7d 8d 96 f6 1e ca 93 7f 6d f7 31 69 33 c9 e2
         6e 9e bf 5c d3 e8 fd e3 66 0f 5e 81 8d f9 ab f3
       session_id[32]=
         36 22 f7 71 b0 84 9e 23 03 0c 1e ac 88 dd 36 67
         24 75 08 ea b3 9d de 70 87 56 40 dc 45 fc 33 28
       cipherSuite         Unknown value 0x35
       compressionMethod                   NULL
67 3  0.0083 (0.0000)  S>CV3.1(889)  Handshake
     Certificate
67 4  0.0083 (0.0000)  S>CV3.1(4)  Handshake
     ServerHelloDone
67 5  0.0244 (0.0160)  C>SV3.1(134)  Handshake
     ClientKeyExchange
67 6  0.0657 (0.0413)  C>SV3.1(1)  ChangeCipherSpec
67 7  0.0657 (0.0000)  C>SV3.1(48)  Handshake
67 8  0.0666 (0.0008)  S>CV3.1(1)  ChangeCipherSpec
67 9  0.0666 (0.0000)  S>CV3.1(48)  Handshake
67 10 14.4262 (14.3595)  C>SV3.1(32)  application_data
Unknown SSL content type 0
67 11 14.4282 (0.0020)  C>SV44.0(32)  Alert
67    14.4285 (0.0003)  C>S  TCP RST
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [email protected]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to