RE: [External]Re: openconnect+OpenSSL failing DTLS handshake with ocserv+GnuTLS

2021-07-19 Thread Vuille, Martin (Martin)
I single-stepped through start_dtls_handshake() and I can see that we end up at line 520 in openssl-dtls.c, where generate_dtls_session() is called with DTLS1_VERSION for the dtlsver argument. So that explains why the ClientHello has version 1.0 record/1.0 handshake. I don't understand why ocserv

Re: [External]Re: openconnect+OpenSSL failing DTLS handshake with ocserv+GnuTLS

2021-07-19 Thread Daniel Lenski
On Mon, Jul 19, 2021 at 8:48 AM Vuille, Martin (Martin) wrote: > > I single-stepped through start_dtls_handshake() and I can see that > we end up at line 520 in openssl-dtls.c, where generate_dtls_session() > is called with DTLS1_VERSION for the dtlsver argument. Makes sense. The generate_dtls_se

RE: [External]Re: openconnect+OpenSSL failing DTLS handshake with ocserv+GnuTLS

2021-07-19 Thread Vuille, Martin (Martin)
> Good to know. I don't think we would want to use this as a "permanent" > solution, however, since the intent of PSK-NEGOTIATE is that it will, well, > "negotiate" the desired version of DTLS. Indeed. Hence my further test. > That's confusing! generate_dtls_session should definitely be setting