Dr. Stephen Henson wrote:
> On Sat, Jan 23, 2010, Dr. Stephen Henson wrote:
>
>   
>> On Fri, Jan 22, 2010, Michael Stone wrote:
>>
>>     
>>>      This certainly looks like a 12-byte verify_data field encoded as a
>>>      variable-length vector (i.e. prefixed with a 1-byte length).
>>>
>>>   6. We receive a fatal unexpected_message alert:
>>>  
>>>        <<< TLS 1.0 Alert [length 0002], fatal unexpected_message
>>>            02 0a
>>>
>>>   7. The end.   
>>>
>>> ## Questions
>>>
>>>   1. Everything looks good until we get the unexpected_message
>>>      alert. Is there some reason why we should expect to see it?
>>>
>>>       
>> Just a quick note. I can reproduce this now and I'm investigating it further.
>>
>>     
>
> I've traced the cause this was *fun*. The full story is in:
>
> http://cvs.openssl.org/chngview?cn=19145
>
> This is a case of a bug in OpenSSL (PR#1949) being fixed but a related bug in
> Apache still existing in older versions. 
>
> The clue to this was that the hello request message was never sent back to the
> client. As a result it never initiated the renegotiation handsgake and 
> appeared
> to refuse the renegotiation request (which we regard as a fatal error) and
> that was the result.
>
> The above patch should address this, if you trace the reference in PR#1949
> you'll also see and Apache only fix for this.
>
> Steve.
> --
> Dr Stephen N. Henson. OpenSSL project core developer.
> Commercial tech support now available see: http://www.openssl.org
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
>   
Hi Steve,

I tried the new fix and it did not work for me. The Apache only fix did
make renegotiation work however. The new fix hangs with the following
output on s_client:

New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-SHA
Server public key is 1024 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
    Protocol  : TLSv1
    Cipher    : DHE-RSA-AES256-SHA
    Session-ID:
62ABA153873FB6B1739D45679F686975BD80C45E8B6428ACD465E44652941B08
    Session-ID-ctx:
    Master-Key:
09A9AB1A2499B6D4327FF84026111E829BC4077DD694A9AAA37E1B0AF641BE2DB651FBA9ED0EAC9367EF3A488A97B4ED
    Key-Arg   : None
    TLS session ticket: ...
    Start Time: 1264451239
    Timeout   : 300 (sec)
    Verify return code: 19 (self signed certificate in certificate chain)
---
GET /cgi-bin/client-cert-reneg/printenv?p1=v1&p2=v2&p3=v3 HTTP/1.0
Host: caqa3-3.ssltest.akamai.com

SSL_connect:SSL renegotiate ciphers
SSL_connect:SSLv3 write client hello A
SSL_connect:SSLv3 read server hello A
depth=1 /C=US/ST=California/L=San Mateo/O=Akamai Technologies/OU=Ghost CA 2
verify error:num=19:self signed certificate in certificate chain
verify return:0
SSL_connect:SSLv3 read server certificate A
SSL_connect:SSLv3 read server key exchange A
[hang]


Let me know if there is anything I can provide to help.

Thanks,

fred
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to