There is a bug in Java SSL Hello extension handling code which is exposed by 
newer openssl versions.

Newer versions of openssl (0.9.8j and greater) have enabled extensions in SSL 
handshakes by default. 
 
The client hello extension which is now enabled exposes a bug in Java hello 
extension handling.
 
. The SSL exception  we have received and the one shown here has the same back 
traces. Please see the below links.
     http://www.mail-archive.com/openssl-users@openssl.org/msg58269.html
 
 
 

      
following link mentions a flag in openssl that can be used to work around this 
problem

http://bugs.sun.com/bugdatabase/view_bug.do;jsessionid=e318b005a6a9260f018bac29c7ac?bug_id=6728126



i have to   build openssl with "no-tlsext" as a work around , 
but i am not sure what is the impact if i disable this flag.

 
can some one help me here.

 


      Yahoo! India has a new look. Take a sneak peek http://in.yahoo.com/trynew

Reply via email to