Dear openssl-users@ and, in particular, Dr. Henson,

First, apologies that I didn't realize I was writing to you in my
previous response to Fred. I'll check my To: lines more carefully in the
future. 

Second, thanks for your earlier assistance in diagnosing this
issue. Your suggestions have led me to some interesting data, which I
will now try to summarize for you. (Full data are attached.)

## Test Setup:

  1. As before, Fred has set up Apache with openssl-0.9.8m as follows:
    
     ./configure --prefix=/usr/local/apache2 --enable-ssl
     --with-ssl=../openssl-0.9.8m-beta1

  2. I have compiled today's snapshot


     # curl .../openssl-0.9.8-stable-SNAP-20100122.tar.gz | tar xzf
     # cd openssl-*
     ./config --prefix=~/ssl
     make -j4
     make install

  3. To produce the attached log, excerpts of which are quoted below, I
     ran

         ./openssl s_client -connect 72.247.216.155:443 -state -msg \
              -crlf &> log.txt <<EOF
GET /cgi-bin/client-cert-reneg/printenv?p1=v1&p2=v2&p3=v3 HTTP/1.0
Host: caqa3-3.ssltest.akamai.com

EOF

  4. Then I sat down with

      http://tools.ietf.org/html/rfc5246
      http://tools.ietf.org/html/draft-ietf-tls-renegotiation-03
      http://www.iana.org/assignments/tls-parameters/
      http://www.iana.org/assignments/tls-extensiontype-values/

     and a text editor.

## Observations

  1. In the attached log, the initial ClientHello contains the SCSV and
     no renegotiation_info extension. 
     
       >>> TLS 1.0 Handshake [length 005b], ClientHello
           01 00 00 57 03 01 4b 5a 1f 82 89 98 93 ad d5 3e
           d4 04 d5 1a 72 da 56 55 1e 74 3e da 34 38 3c 59
           fb 45 04 c3 e9 fb 00 00 2a 00 39 00 38 00 35 00
           16 00 13 00 0a 00 33 00 32 00 2f 00 07 00 05 00
           04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00
           03|00 ff|01 00 00|04 00 23 00 00|

     (The |00 ff| is the SCSV; the |04 00 23 00 00| is the extensions
     section and contains only a SessionTicket extension with no
     extension data.)

  2. The corresponding ServerHello contains a renegotiation_info
     extension whose renegotiated_connection field contains only a
     0-length vector and no SCSV.

       <<< TLS 1.0 Handshake [length 0035], ServerHello
           02 00 00 31 03 01 4b 5a 1f 82 66 a3 76 ad cb db
           44 ed 10 e6 05 e7 24 9f ac d7 1f 8a 4e e9 6f fe
           39 be 8e b5 2f 19 00 00 39 00 00 09|ff 01 00 01
           00|00 23 00 00

  3. We happily exchange handshake messages and, eventually, write
     Client ChangeCipherSpec and Finished messages. Then we receive the
     NewSessionTicket message that we indicated support for followed by
     the Server ChangeCipherSpec and Finished messages. Then we exchange
     some application data. Yay!

  4. We receive a HelloRequest from the server, as expected in our test
     case.

  5. We send our second ClientHello:

       >>> TLS 1.0 Handshake [length 006a], ClientHello
           01 00 00 66 03 01 4b 5a 1f 85 c1 3f f1 ff 9c 47
           73 15 ef 33 f0 61 53 95 ed 9b 18 ce b6 ef e8 b8
           45 64 f3 49 82 d6 00 00 28 00 39 00 38 00 35 00
           16 00 13 00 0a 00 33 00 32 00 2f 00 07 00 05 00
           04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00
           03 01 00 00 15 ff 01 00 0d 0c c4 b3 49 4f 90 f0
           37 9d 7d 63 bb 9a 00 23 00 00

     without SCSV and with a renegotiation_info extension with
     renegotiated_connection data of length 0x000d with contents 

           0c c4 b3 49 4f 90 f0 37 9d 7d 63 bb 9a

     This certainly looks like a 12-byte verify_data field encoded as a
     variable-length vector (i.e. prefixed with a 1-byte length).

  6. We receive a fatal unexpected_message alert:
 
       <<< TLS 1.0 Alert [length 0002], fatal unexpected_message
           02 0a

  7. The end.   

## Questions

  1. Everything looks good until we get the unexpected_message
     alert. Is there some reason why we should expect to see it?

  2. Does openssl s_client have a flag that will cause it to print the
     Client's Finished.verify_data and the server's Finished.verify_data
     as part of the secure renegotiation session state?

  3. I'm confused about whether the Client's previous
     Finished.verify_data field is properly encoded into the
     renegotiation_info extension's renegotiated_connection field.

     My concern is based on my (perhaps incorrect?) reading of
     draft-ietf-tls-renegotiation-03. I read that text as saying that I
     should be seeing a 12-byte value. However, I see a 13-byte
     value. 

     My reading also seems to be consistent with RFC 5246, which
     specifies Finished.verify_data

         struct {
             opaque verify_data[verify_data_length];
         } Finished;

     as a fixed-length vector (whose length happens to be calculated
     dynamically based on the negotiated ciphersuite).

     Finally, while I recall that this issue was discussed on
     t...@ietf.org, I am unable to find a normative statement supporting
     OpenSSL's encoding.

## Ending

First, I hope that these observations are of some help in diagnosing the
problem. Please let me know if I can collect other observations which
would be more helpful.

Second, I'll try to spend some quality time with the OpenSSL codebase
next week looking for implementation-level clues. Maybe I'll spot the
problem then.

Third, Fred and I will look carefully next week to see if we can spot
any differences between the behavior of openssl s_server and
Apache. Maybe we'll find a simpler test case.

Finally, thanks for making these patches available for testing and, in
general, for being a great project to work with!

Regards,

Michael

SSL_connect:before/connect initialization
CONNECTED(00000003)
>>> TLS 1.0 Handshake [length 005b], ClientHello
    01 00 00 57 03 01 4b 5a 1f 82 89 98 93 ad d5 3e
    d4 04 d5 1a 72 da 56 55 1e 74 3e da 34 38 3c 59
    fb 45 04 c3 e9 fb 00 00 2a 00 39 00 38 00 35 00
    16 00 13 00 0a 00 33 00 32 00 2f 00 07 00 05 00
    04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00
    03 00 ff 01 00 00 04 00 23 00 00
SSL_connect:SSLv2/v3 write client hello A
<<< TLS 1.0 Handshake [length 0035], ServerHello
    02 00 00 31 03 01 4b 5a 1f 82 66 a3 76 ad cb db
    44 ed 10 e6 05 e7 24 9f ac d7 1f 8a 4e e9 6f fe
    39 be 8e b5 2f 19 00 00 39 00 00 09 ff 01 00 01
    00 00 23 00 00
SSL_connect:SSLv3 read server hello A
<<< TLS 1.0 Handshake [length 080e], Certificate
    0b 00 08 0a 00 08 07 00 03 e9 30 82 03 e5 30 82
    02 cd a0 03 02 01 02 02 02 00 bd 30 0d 06 09 2a
    86 48 86 f7 0d 01 01 04 05 00 30 69 31 0b 30 09
    06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55
    04 08 13 0a 43 61 6c 69 66 6f 72 6e 69 61 31 12
    30 10 06 03 55 04 07 13 09 53 61 6e 20 4d 61 74
    65 6f 31 1c 30 1a 06 03 55 04 0a 13 13 41 6b 61
    6d 61 69 20 54 65 63 68 6e 6f 6c 6f 67 69 65 73
    31 13 30 11 06 03 55 04 0b 13 0a 47 68 6f 73 74
    20 43 41 20 32 30 1e 17 0d 30 36 30 31 31 37 30
    31 35 36 35 34 5a 17 0d 33 36 30 31 31 37 30 31
    35 36 35 34 5a 30 81 91 31 0b 30 09 06 03 55 04
    06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a
    43 61 6c 69 66 6f 72 6e 69 61 31 12 30 10 06 03
    55 04 07 13 09 53 61 6e 20 4d 61 74 65 6f 31 1c
    30 1a 06 03 55 04 0a 13 13 41 6b 61 6d 61 69 20
    54 65 63 68 6e 6f 6c 6f 67 69 65 73 31 1c 30 1a
    06 03 55 04 0b 13 13 47 68 6f 73 74 20 2d 20 67
    6f 6f 64 20 63 65 72 74 20 31 31 1d 30 1b 06 03
    55 04 03 14 14 2a 2e 73 73 6c 74 65 73 74 2e 61
    6b 61 6d 61 69 2e 63 6f 6d 30 81 9f 30 0d 06 09
    2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30
    81 89 02 81 81 00 c1 46 53 48 dd 11 87 72 8f 93
    97 ef bc 33 00 9c 2e 21 84 25 90 38 f7 35 8f 7c
    30 e4 eb 0b 4b ba e4 90 56 24 e8 d6 c1 37 a3 3c
    ec df 00 5b ed 5e c6 e4 f2 5b 01 dd 05 71 4b 54
    ad 53 80 7f 31 26 20 a2 67 4f 79 f0 b4 6d 0c 10
    fb 8e 07 09 57 9d 11 3d b4 50 61 61 dc 65 64 d1
    31 bd 88 cf f0 59 0f c8 a5 7c 51 ec 92 af 0e bd
    22 4b 92 47 5d a5 c0 fd 2c 9d 74 72 cc 82 a0 6e
    fe c1 eb 51 7d 19 02 03 01 00 01 a3 81 f1 30 81
    ee 30 09 06 03 55 1d 13 04 02 30 00 30 2c 06 09
    60 86 48 01 86 f8 42 01 0d 04 1f 16 1d 4f 70 65
    6e 53 53 4c 20 47 65 6e 65 72 61 74 65 64 20 43
    65 72 74 69 66 69 63 61 74 65 30 1d 06 03 55 1d
    0e 04 16 04 14 4f cd 6e f3 b1 0f 57 11 51 a2 a6
    91 79 1e eb c2 31 d7 13 5c 30 81 93 06 03 55 1d
    23 04 81 8b 30 81 88 80 14 63 7f b3 b7 45 db 11
    f6 d2 d5 03 11 9d d5 ce 1e d2 53 9e 0a a1 6d a4
    6b 30 69 31 0b 30 09 06 03 55 04 06 13 02 55 53
    31 13 30 11 06 03 55 04 08 13 0a 43 61 6c 69 66
    6f 72 6e 69 61 31 12 30 10 06 03 55 04 07 13 09
    53 61 6e 20 4d 61 74 65 6f 31 1c 30 1a 06 03 55
    04 0a 13 13 41 6b 61 6d 61 69 20 54 65 63 68 6e
    6f 6c 6f 67 69 65 73 31 13 30 11 06 03 55 04 0b
    13 0a 47 68 6f 73 74 20 43 41 20 32 82 01 00 30
    0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 82
    01 01 00 7d 74 c1 69 96 6f 13 41 55 99 a8 53 7b
    fa 7c 9a 0c a0 be 51 59 76 31 bd 70 7a 75 43 25
    d8 c5 04 cb d0 5a d5 1c 46 8d 43 6e 26 4b e3 5e
    70 7c fd 6e ea a0 5f f7 ba 83 35 88 bb a6 99 8d
    48 f8 e2 2b 7e 74 d9 35 97 0b b6 b9 bb c2 dd 8b
    ec b3 49 2e b0 03 69 b6 1b c3 68 b1 41 f0 6b 12
    6a b7 20 35 1b c9 bb 83 b7 06 3e 7b 49 a6 e0 c6
    ce 95 3e 76 02 cd c5 6f 66 ce 47 ae 51 d5 6c 7c
    70 4e 57 d4 80 ec 5c 68 84 c9 3b 2f f3 ec fb 50
    2f 8d 50 c3 c5 ce a2 c7 1b ec 51 b6 aa 48 4c 06
    61 8c 43 26 bc 36 1c 65 d3 e2 a7 30 86 9a 0e 64
    5f 32 0a ee ca 9b 51 9e f1 08 fd 41 a2 58 4f 10
    31 54 98 7a 2e 66 5d 44 7a cf 51 91 25 b6 5d c0
    c0 75 23 f9 4b 50 9f 47 bf 4f 51 55 45 4c de d4
    d5 37 b2 da d7 a6 df 7b b2 ca 78 00 b8 8e 10 69
    fa 4a 52 d9 c2 7a f7 37 98 51 82 87 da 20 5d c7
    d1 88 a5 00 04 18 30 82 04 14 30 82 02 fc a0 03
    02 01 02 02 01 00 30 0d 06 09 2a 86 48 86 f7 0d
    01 01 04 05 00 30 69 31 0b 30 09 06 03 55 04 06
    13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 43
    61 6c 69 66 6f 72 6e 69 61 31 12 30 10 06 03 55
    04 07 13 09 53 61 6e 20 4d 61 74 65 6f 31 1c 30
    1a 06 03 55 04 0a 13 13 41 6b 61 6d 61 69 20 54
    65 63 68 6e 6f 6c 6f 67 69 65 73 31 13 30 11 06
    03 55 04 0b 13 0a 47 68 6f 73 74 20 43 41 20 32
    30 1e 17 0d 30 33 31 32 32 39 32 30 35 32 33 31
    5a 17 0d 33 33 31 32 32 38 32 30 35 32 33 31 5a
    30 69 31 0b 30 09 06 03 55 04 06 13 02 55 53 31
    13 30 11 06 03 55 04 08 13 0a 43 61 6c 69 66 6f
    72 6e 69 61 31 12 30 10 06 03 55 04 07 13 09 53
    61 6e 20 4d 61 74 65 6f 31 1c 30 1a 06 03 55 04
    0a 13 13 41 6b 61 6d 61 69 20 54 65 63 68 6e 6f
    6c 6f 67 69 65 73 31 13 30 11 06 03 55 04 0b 13
    0a 47 68 6f 73 74 20 43 41 20 32 30 82 01 22 30
    0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82
    01 0f 00 30 82 01 0a 02 82 01 01 00 b8 36 e3 86
    1c a3 2e 70 1f 28 ac a2 c5 e2 75 0c 73 64 12 78
    ab f0 4f de ce cd 32 45 5f a2 e4 01 d2 39 d4 0c
    47 0e 2a 05 2f 27 83 68 83 17 32 cb e1 d8 7c 06
    bf ef 89 9e 62 92 38 c8 e7 9d ba 96 84 3b 15 f8
    c3 30 47 a3 74 22 41 f4 85 1d a5 d7 0f aa 2d fc
    56 62 07 7f 98 26 8a 82 09 8b 32 07 be 46 01 f0
    47 71 fa 7e 2e 06 8a 59 28 aa 58 c1 ab d7 66 42
    3e 86 00 0f d1 6f 82 8b cd 29 cd bf ec db d3 52
    34 16 5b df 22 84 5e f3 90 0a 0b 5b 61 57 e6 d2
    46 6e a2 d1 3a 0f f0 20 13 d4 b0 77 d5 c2 be db
    c8 cb 7a 57 a7 0a ef 9e d0 b8 c6 b3 0e 0a f0 0f
    88 0d 11 12 2a 43 fe 0c 6f 0f ce f7 95 23 ed 76
    d9 75 82 2a 17 76 e4 5a 77 4d be ca 40 b9 47 83
    45 7f ff fb 06 f6 e2 12 7a d4 c9 e4 f0 45 66 e3
    4f cb c1 80 69 fb af fb 91 e3 82 83 8d 25 7c 32
    b5 81 a1 ee 2d 6b 7a ff 64 6e fb 1b 02 03 01 00
    01 a3 81 c6 30 81 c3 30 1d 06 03 55 1d 0e 04 16
    04 14 63 7f b3 b7 45 db 11 f6 d2 d5 03 11 9d d5
    ce 1e d2 53 9e 0a 30 81 93 06 03 55 1d 23 04 81
    8b 30 81 88 80 14 63 7f b3 b7 45 db 11 f6 d2 d5
    03 11 9d d5 ce 1e d2 53 9e 0a a1 6d a4 6b 30 69
    31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30
    11 06 03 55 04 08 13 0a 43 61 6c 69 66 6f 72 6e
    69 61 31 12 30 10 06 03 55 04 07 13 09 53 61 6e
    20 4d 61 74 65 6f 31 1c 30 1a 06 03 55 04 0a 13
    13 41 6b 61 6d 61 69 20 54 65 63 68 6e 6f 6c 6f
    67 69 65 73 31 13 30 11 06 03 55 04 0b 13 0a 47
    68 6f 73 74 20 43 41 20 32 82 01 00 30 0c 06 03
    55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a 86
    48 86 f7 0d 01 01 04 05 00 03 82 01 01 00 96 f2
    10 9d 13 07 cd 45 1e 8a af 79 be 3c 4a 70 e7 3f
    82 03 58 56 b4 ba 9b 44 51 a4 09 0e 5d 64 d9 4a
    b9 be 9b 1d be b7 75 70 9c 36 bd 7e 10 9c a9 1f
    67 5e cd e2 39 29 3d fd 9e e6 3f 73 da 64 0d 5a
    97 b1 d9 ae 85 26 51 05 c9 39 12 b6 d5 27 27 eb
    c4 bd 99 08 d5 44 4c 9a 82 02 32 be 35 54 d7 d5
    9c 5d e6 b8 fc 59 3c cd d3 20 df 3d ca 61 cc 3c
    4c 24 5e 95 93 05 44 9a 3e 81 2a bc 47 1e 13 12
    db d9 16 01 39 5e 90 0f aa ba cf f1 9f 06 8e 60
    bd e4 fd 3b ac 31 7a 17 c7 e3 63 27 86 14 40 28
    55 58 e3 f4 6a 77 60 04 d0 43 87 91 cb 48 24 1c
    d2 55 73 f6 3a a4 7d eb c5 c7 33 1d 71 47 73 df
    9b 55 b0 28 4f 61 cf 3e 00 78 13 6d 9e 16 bb 3d
    09 18 3c 1b 95 10 2b 67 ce 8f 4b e1 06 9f f7 2a
    46 53 ed b1 eb 77 22 b0 9d 89 d5 08 dd 0f e8 19
    a9 46 52 25 d1 b6 3b e2 69 48 d8 cb 31 66
depth=1 /C=US/ST=California/L=San Mateo/O=Akamai Technologies/OU=Ghost CA 2
verify error:num=19:self signed certificate in certificate chain
verify return:0
SSL_connect:SSLv3 read server certificate A
<<< TLS 1.0 Handshake [length 018d], ServerKeyExchange
    0c 00 01 89 00 80 d6 7d e4 40 cb bb dc 19 36 d6
    93 d3 4a fd 0a d5 0c 84 d2 39 a4 5f 52 0b b8 81
    74 cb 98 bc e9 51 84 9f 91 2e 63 9c 72 fb 13 b4
    b4 d7 17 7e 16 d5 5a c1 79 ba 42 0b 2a 29 fe 32
    4a 46 7a 63 5e 81 ff 59 01 37 7b ed dc fd 33 16
    8a 46 1a ad 3b 72 da e8 86 00 78 04 5b 07 a7 db
    ca 78 74 08 7d 15 10 ea 9f cc 9d dd 33 05 07 dd
    62 db 88 ae aa 74 7d e0 f4 d6 e2 bd 68 b0 e7 39
    3e 0f 24 21 8e b3 00 01 02 00 80 50 7c 0c d5 f8
    1b 3a e1 3f 59 29 b9 fb 98 0f be 68 f9 57 7d bf
    cc f1 46 6f 33 f9 ad 9b a2 2a 5f 14 0a 13 3b 80
    6d 76 b3 8e 78 f5 c4 29 13 7f 8b d8 18 77 08 96
    1f 17 c1 f5 60 9c cd 9e 03 7a fd 0b b1 a6 26 08
    0b 7c 80 d5 9f 96 da c5 d9 97 c9 b9 9f 43 36 cf
    21 4b 84 93 95 55 9a 5e 47 b3 3e 7c af f1 91 8a
    79 32 b3 89 4c 2e e6 38 3f e9 e2 54 4d 7c 36 a6
    30 49 0a 52 67 3d d6 f1 18 73 21 00 80 43 0e 6e
    4b 34 31 bf 46 7f 9e b8 a5 14 69 be e4 c7 77 b4
    1b bf 1d 5a 9c 4d 5b 5b 13 be 96 6d 51 96 a4 36
    72 e4 5f eb 0e 28 d4 5b a4 cd 6e 6c 27 44 cf 09
    0c 2f f5 87 60 17 01 72 d6 fb b3 f2 eb d8 f3 4a
    69 8d 9a 0d 9c 49 5c e6 54 5e d7 e4 05 e8 b2 84
    be c0 b8 69 27 73 a7 c3 7a 2e d3 67 c2 b1 a8 da
    fa 21 7f 53 5a 6c 13 dd 64 1e ab d0 28 b5 2b 57
    1e 81 a1 27 23 f2 b7 df 35 dc f3 86 55
SSL_connect:SSLv3 read server key exchange A
<<< TLS 1.0 Handshake [length 0004], ServerHelloDone
    0e 00 00 00
SSL_connect:SSLv3 read server done A
>>> TLS 1.0 Handshake [length 0086], ClientKeyExchange
    10 00 00 82 00 80 5e 66 f5 ff b5 47 1d 47 49 28
    dc 2a ef 4e 03 fc 7a 12 8b 89 00 ef e1 3f c4 9f
    18 c8 f1 26 e9 0b 3d cf 80 0c 30 ab a6 3b e9 82
    66 10 9a 19 3d 4d 4d ab 3a 63 71 22 ae 5d 3d 1e
    df ec fc f9 60 4f 3a 64 d5 15 f0 64 92 04 0b 7f
    7a 85 ae d9 04 9c dc 5e a0 99 d5 3e 8f 88 ec 43
    d0 bc 5c 04 23 e2 57 ab 80 72 f8 7c 7a 48 f2 d0
    38 f9 94 f3 7c 2e 31 4d a0 2f b0 04 47 71 8c 39
    e1 42 2f 37 2d 61
SSL_connect:SSLv3 write client key exchange A
>>> TLS 1.0 ChangeCipherSpec [length 0001]
    01
SSL_connect:SSLv3 write change cipher spec A
>>> TLS 1.0 Handshake [length 0010], Finished
    14 00 00 0c c4 b3 49 4f 90 f0 37 9d 7d 63 bb 9a
SSL_connect:SSLv3 write finished A
SSL_connect:SSLv3 flush data
<<< TLS 1.0 Handshake [length 00ca]???
    04 00 00 c6 00 00 00 00 00 c0 7f 74 70 a9 52 65
    40 e4 39 d5 ff 3b d6 4c 3e 2d ec ae fb 47 d8 e3
    b3 c1 64 0e 8a b8 22 97 66 7a 2d 2c 49 24 72 32
    3d 9c 8f e7 b3 cf 3d d7 98 bf 41 99 df 70 f9 fe
    c5 48 dc 5b e3 ca 97 50 3a 0e bf 8b 8b e0 59 40
    f8 b9 56 7e df 35 3d 08 5b 02 4b 99 7c 94 b0 49
    23 1e 14 63 9c a3 c5 30 a1 f7 a0 e3 8b 15 58 7a
    21 2c 3f b1 8e 4b 96 94 84 6e ab 9a 8e cc 9a f9
    ed 7a 0b 79 c0 50 a3 0b 2c 3b b1 59 0f b5 2f b2
    37 92 96 f5 51 f6 4f 64 60 fa 16 1d c9 c7 5c 58
    ae 6f d8 15 4b b3 4d 0b 32 62 2b 7f ad e1 db e2
    6e 5b 8f 07 af 6c e3 cc d4 63 9c e5 4e 40 a6 58
    4f 39 ea a2 0e c7 5b 34 67 b2
SSL_connect:SSLv3 read server session ticket A
<<< TLS 1.0 ChangeCipherSpec [length 0001]
    01
<<< TLS 1.0 Handshake [length 0010], Finished
    14 00 00 0c 0f 67 c5 1d 2f 62 b6 21 ca 8f b0 f0
SSL_connect:SSLv3 read finished A
---
Certificate chain
 0 s:/C=US/ST=California/L=San Mateo/O=Akamai Technologies/OU=Ghost - good cert 
1/CN=*.ssltest.akamai.com
   i:/C=US/ST=California/L=San Mateo/O=Akamai Technologies/OU=Ghost CA 2
 1 s:/C=US/ST=California/L=San Mateo/O=Akamai Technologies/OU=Ghost CA 2
   i:/C=US/ST=California/L=San Mateo/O=Akamai Technologies/OU=Ghost CA 2
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/C=US/ST=California/L=San Mateo/O=Akamai Technologies/OU=Ghost - good 
cert 1/CN=*.ssltest.akamai.com
issuer=/C=US/ST=California/L=San Mateo/O=Akamai Technologies/OU=Ghost CA 2
---
No client certificate CA names sent
---
SSL handshake has read 2802 bytes and written 294 bytes
---
New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-SHA
Server public key is 1024 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
    Protocol  : TLSv1
    Cipher    : DHE-RSA-AES256-SHA
    Session-ID: BD26D858B47E7E4BF1338A2F8F659B49D138633401AB3118911D77560299E3DD
    Session-ID-ctx: 
    Master-Key: 
0513B0C35A3EDAE975041FB4E0E6E695FE7B2D05680EBB584EE050959B859CF3DC944ECB8EF2FC1EDDDD8FE3FA518318
    Key-Arg   : None
    TLS session ticket:
    0000 - 7f 74 70 a9 52 65 40 e4-39 d5 ff 3b d6 4c 3e 2d   .tp...@.9..;.L>-
    0010 - ec ae fb 47 d8 e3 b3 c1-64 0e 8a b8 22 97 66 7a   ...G....d...".fz
    0020 - 2d 2c 49 24 72 32 3d 9c-8f e7 b3 cf 3d d7 98 bf   -,I$r2=.....=...
    0030 - 41 99 df 70 f9 fe c5 48-dc 5b e3 ca 97 50 3a 0e   A..p...H.[...P:.
    0040 - bf 8b 8b e0 59 40 f8 b9-56 7e df 35 3d 08 5b 02   .....@..v~.5=.[.
    0050 - 4b 99 7c 94 b0 49 23 1e-14 63 9c a3 c5 30 a1 f7   K.|..I#..c...0..
    0060 - a0 e3 8b 15 58 7a 21 2c-3f b1 8e 4b 96 94 84 6e   ....Xz!,?..K...n
    0070 - ab 9a 8e cc 9a f9 ed 7a-0b 79 c0 50 a3 0b 2c 3b   .......z.y.P..,;
    0080 - b1 59 0f b5 2f b2 37 92-96 f5 51 f6 4f 64 60 fa   .Y../.7...Q.Od`.
    0090 - 16 1d c9 c7 5c 58 ae 6f-d8 15 4b b3 4d 0b 32 62   ....\X.o..K.M.2b
    00a0 - 2b 7f ad e1 db e2 6e 5b-8f 07 af 6c e3 cc d4 63   +.....n[...l...c
    00b0 - 9c e5 4e 40 a6 58 4f 39-ea a2 0e c7 5b 34 67 b2   ....@.xo9....[4g.

    Start Time: 1264197506
    Timeout   : 300 (sec)
    Verify return code: 19 (self signed certificate in certificate chain)
---
<<< TLS 1.0 Handshake [length 0004], HelloRequest
    00 00 00 00
SSL_connect:SSL renegotiate ciphers
>>> TLS 1.0 Handshake [length 006a], ClientHello
    01 00 00 66 03 01 4b 5a 1f 85 c1 3f f1 ff 9c 47
    73 15 ef 33 f0 61 53 95 ed 9b 18 ce b6 ef e8 b8
    45 64 f3 49 82 d6 00 00 28 00 39 00 38 00 35 00
    16 00 13 00 0a 00 33 00 32 00 2f 00 07 00 05 00
    04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00
    03 01 00 00 15 ff 01 00 0d 0c c4 b3 49 4f 90 f0
    37 9d 7d 63 bb 9a 00 23 00 00
SSL_connect:SSLv3 write client hello A
<<< TLS 1.0 Alert [length 0002], fatal unexpected_message
    02 0a
SSL3 alert read:fatal:unexpected_message
SSL_connect:failed in SSLv3 read server hello A
11345:error:140943F2:SSL routines:SSL3_READ_BYTES:sslv3 alert unexpected 
message:s3_pkt.c:1102:SSL alert number 10
11345:error:140940E5:SSL routines:SSL3_READ_BYTES:ssl handshake 
failure:s3_pkt.c:1006:

Attachment: pgpmkDnlka2m8.pgp
Description: PGP signature

Reply via email to