On Mon, Feb 04, 2008 at 08:28:04AM -0800, JCA wrote:

>     OK, I found it. In case this helps somebody out there, the way it
> works for me is the following:
> 
>     The client is invoked as
> 
> openssl s_client -connect 127.0.0.1:443 -cipher COMPLEMENTOFALL:aNULL
> 
> and the server as
> 
> openssl s_server -msg -accept 443 -nocert -cipher COMPLEMENTOFALL:aNULL
> 
> With this, the server accepts the TLS_RSA_WITH_NULL_SHA ciphersuite
> without complaints.
> 

Completely wrong.

Now, you are asking not for "no encryption" (eNULL) ciphers, but
rather ciphers without certificates (i.e. aNULL) ciphers. The correct
syntax is:

        ALL+aNULL
    
not

        COMPLEMENTOFALL:aNULL

The TLS_RSA_WITH_NULL_SHA is an "eNULL" cipher, it is not an aNULL cipher,
and it requires a server certificate. As you provide no server cert, only
the aNULL ciphers are used.

With OpenSSL 0.9.8, the "ALL+aNULL" definition yields:

ADH-AES256-SHA          SSLv3 Kx=DH       Au=None Enc=AES(256)  Mac=SHA1
ADH-AES128-SHA          SSLv3 Kx=DH       Au=None Enc=AES(128)  Mac=SHA1
ADH-DES-CBC3-SHA        SSLv3 Kx=DH       Au=None Enc=3DES(168) Mac=SHA1
ADH-DES-CBC-SHA         SSLv3 Kx=DH       Au=None Enc=DES(56)   Mac=SHA1
EXP-ADH-DES-CBC-SHA     SSLv3 Kx=DH(512)  Au=None Enc=DES(40)   Mac=SHA1 export
ADH-RC4-MD5             SSLv3 Kx=DH       Au=None Enc=RC4(128)  Mac=MD5
EXP-ADH-RC4-MD5         SSLv3 Kx=DH(512)  Au=None Enc=RC4(40)   Mac=MD5  export

-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to