[openssl.org #2240] Missing Supported Point Formats Extension in ServerHello should be ignored

2010-11-25 Thread Stephen Henson via RT
 [ste...@uplinklabs.net - Fri Oct 01 00:59:01 2010]:
 
 
 The patch you attached to PR 2240 works perfectly here. Was having
 difficulty connecting to an OpenFire Jabber server via Gajim, Psi, and
 Kopete, but now I'm not.
 

I've now committed an equivalent patch which should resolve this issue.

 Another fix I discovered for the Psi/Kopete issue was to use
 SSLv3_server_method() instead of SSLv23_server_method() in qca-ossl.
 Any idea why this makes a difference?
 

That would work because the point format extension is not sent for SSLv3.

Steve.
-- 
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org

__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: [openssl.org #2240] Missing Supported Point Formats Extension in ServerHello should be ignored

2010-10-01 Thread Mounir IDRASSI via RT
  Hi Steven,

Can you please check the protocol and the cipher used for each case 
(SSLv3_server_method vs SSLv23_server_method) using the same client?
The only explanation for the difference you are seeing is that when you 
use SSLv3_server_method, TLS extension ECPointFormats is sent with 
ServerHello message whereas it is not sent when SSLv23_server_method is 
used.

--
Mounir IDRASSI
IDRIX
http://www.idrix.fr

On 10/1/2010 12:59 AM, Steven Noonan via RT wrote:
 Hi Mounir,

 The patch you attached to PR 2240 works perfectly here. Was having
 difficulty connecting to an OpenFire Jabber server via Gajim, Psi, and
 Kopete, but now I'm not.

 Another fix I discovered for the Psi/Kopete issue was to use
 SSLv3_server_method() instead of SSLv23_server_method() in qca-ossl.
 Any idea why this makes a difference?

 - Steven


 __
 OpenSSL Project http://www.openssl.org
 Development Mailing List   openssl-dev@openssl.org
 Automated List Manager   majord...@openssl.org


__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: [openssl.org #2240] Missing Supported Point Formats Extension in ServerHello should be ignored

2010-09-30 Thread Steven Noonan
Hi Mounir,

The patch you attached to PR 2240 works perfectly here. Was having
difficulty connecting to an OpenFire Jabber server via Gajim, Psi, and
Kopete, but now I'm not.

Another fix I discovered for the Psi/Kopete issue was to use
SSLv3_server_method() instead of SSLv23_server_method() in qca-ossl.
Any idea why this makes a difference?

- Steven
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: [openssl.org #2240] Missing Supported Point Formats Extension in ServerHello should be ignored

2010-09-30 Thread Steven Noonan via RT
Hi Mounir,

The patch you attached to PR 2240 works perfectly here. Was having
difficulty connecting to an OpenFire Jabber server via Gajim, Psi, and
Kopete, but now I'm not.

Another fix I discovered for the Psi/Kopete issue was to use
SSLv3_server_method() instead of SSLv23_server_method() in qca-ossl.
Any idea why this makes a difference?

- Steven


__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


RE: [openssl.org #2240] Missing Supported Point Formats Extension in ServerHello should be ignored

2010-04-25 Thread Sugimoto, Koichi - GlobalSign K.K.
Hello.

Great!
With all web servers 1)-3) works well.
Here is the part of s_client message log with IIS7:

[r...@mstestsv2 ~]# openssl s_client -host 192.168.220.182 -port 
443 -showcerts -msg
CONNECTED(0003)
 TLS 1.0 Handshake [length 00cd], ClientHello
01 00 00 c9 03 01 4b d4 ed a6 5e 55 e3 b9 e3 83
93 7b ba f2 e8 a3 7b 54 21 83 a9 4b 68 99 46 8e
b7 b8 82 4f e3 87 00 00 5c c0 14 c0 0a 00 39 00
38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0
08 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 00
33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00
2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00
05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00
06 00 03 00 ff 01 00 00 44 00 0b 00 04 03 00 01
02 00 0a 00 34 00 32 00 01 00 02 00 03 00 04 00
05 00 06 00 07 00 08 00 09 00 0a 00 0b 00 0c 00
0d 00 0e 00 0f 00 10 00 11 00 12 00 13 00 14 00
15 00 16 00 17 00 18 00 19 00 23 00 00
 TLS 1.0 Handshake [length 004a], ServerHello
02 00 00 46 03 01 4b d4 f2 f8 3a 8b 05 e8 61 d2
4b 2f c6 f1 f6 be a5 56 e1 e9 0d 1d 3e fd cb b6
83 6b 4a f7 85 11 20 90 26 00 00 51 2f a5 f3 11
88 6d 74 3e 78 53 b3 05 f7 c0 49 fe b0 27 da 38
9b 9b 0a 0d 1f ae 7d c0 09 00
 TLS 1.0 Handshake [length 05da], Certificate
0b 00 05 d6 00 05 d3 00 02 fc 30 82 02 f8 30 82
02 9d a0 03 02 01 02 02 08 33 9d 56 4d bd 65 1e
fc 30 0a 06 08 2a 86 48 ce 3d 04 03 02 30 43 31
1a 30 18 06 03 55 04 03 13 11 53 48 41 32 35 36


Thanks.

Regards,
Koichi Sugimoto.



-Original Message-
From: owner-openssl-...@openssl.org [mailto:owner-openssl-...@openssl.org] On 
Behalf Of Mounir IDRASSI via RT
Sent: Sunday, April 25, 2010 2:13 PM
To: ll...@randombit.net
Cc: openssl-dev@openssl.org
Subject: Re: [openssl.org #2240] Missing Supported Point Formats Extension in 
ServerHello should be ignored

Hi,

I'm attaching a simple patch that should correct this behavior.
Can you test it and tell us the results?
Thanks,

--
Mounir IDRASSI
IDRIX
http://www.idrix.fr


 Dear openssl support,

 I investigated the following web servers.
 But all of them failed with the same error.

 1) apache-tomcat-6.0.26 + bcprov-ext-jdk16-145 + jdk1.6.0_17 (centos
 5)
 2) jboss-4.2.3.GA + bcprov-jdk15 + jdk1.6.0_17 (centos 5)
 3) IIS 7 (windows 7)

 On the other hand, many browsers except for opera successfully connect
 to the servers.
 Something wrong?

 Regards,
 Koichi Sugimoto.

 2010/4/20 Jack Lloyd via RT r...@openssl.org


 RFC 4492 says:

   A client that receives a ServerHello message containing a Supported
   Point Formats Extension MUST respect the server's choice of point
   formats during the handshake (cf. Sections 5.6 and 5.7).  If no
   Supported Point Formats Extension is received with the ServerHello,
   this is equivalent to an extension allowing only the uncompressed
   point format.

 OpenSSL 1.0.0 rejects such a negotiation, always requiring the
 extension to exist in the ServerHello:

 CONNECTED(0003)
  TLS 1.0 Handshake [length 00cd], ClientHello
01 00 00 c9 03 01 4b cc f2 87 fc 1d 05 2d 0c 1f
4a 74 8b 8c 6f 20 c3 56 fb 35 4a 73 b0 9c e0 c1
6f 34 1b 10 f9 9f 00 00 5c c0 14 c0 0a 00 39 00
38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0
08 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 00
33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00
2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00
05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00
06 00 03 00 ff 01 00 00 44 00 0b 00 04 03 00 01
02 00 0a 00 34 00 32 00 01 00 02 00 03 00 04 00
05 00 06 00 07 00 08 00 09 00 0a 00 0b 00 0c 00
0d 00 0e 00 0f 00 10 00 11 00 12 00 13 00 14 00
15 00 16 00 17 00 18 00 19 00 23 00 00  TLS 1.0 Handshake
 [length 002a], ServerHello
02 00 00 26 03 01 20 3f 72 c5 29 9f 22 b1 a6 af
4b 81 31 eb 4c 85 bf bb 3a a5 8b b8 21 86 16 c5
7c 84 5c 73 4a 4a 00 c0 08 00
 139742562498200:error:1411809D:SSL
 routines:SSL_CHECK_SERVERHELLO_TLSEXT:tls invalid ecpointformat
 list:t1_lib.c:1440:
 139742562498200:error:14092113:SSL
 routines:SSL3_GET_SERVER_HELLO:serverhello tlsext:s3_clnt.c:942:

 OpenSSL 1.0.0 29 Mar 2010
 built on: Mon Apr 19 19:52:35 EDT 2010
 platform: linux-x86_64
 options:  bn(64,64) rc4(1x,char) des(idx,cisc,16,int) idea(int)
 blowfish(idx)
 compiler: gcc -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN
 -DHAVE_DLFCN_H
 -m64 -DL_ENDIAN -DTERMIO -O3 -Wall -DMD32_REG_T=int
 -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DSHA1_ASM -DSHA256_ASM
 -DSHA512_ASM -DMD5_ASM -DAES_ASM -DWHIRLPOOL_ASM
 OPENSSLDIR: /usr/local/ssl

 __
 OpenSSL Project http://www.openssl.org
 Development Mailing List   openssl-dev@openssl.org
 Automated List Manager   majord...@openssl.org





smime.p7s
Description: S/MIME cryptographic signature


Re: [openssl.org #2240] Missing Supported Point Formats Extension in ServerHello should be ignored

2010-04-24 Thread Mounir IDRASSI
Hi,

I'm attaching a simple patch that should correct this behavior.
Can you test it and tell us the results?
Thanks,

--
Mounir IDRASSI
IDRIX
http://www.idrix.fr


 Dear openssl support,

 I investigated the following web servers.
 But all of them failed with the same error.

 1) apache-tomcat-6.0.26 + bcprov-ext-jdk16-145 + jdk1.6.0_17 (centos 5)
 2) jboss-4.2.3.GA + bcprov-jdk15 + jdk1.6.0_17 (centos 5)
 3) IIS 7 (windows 7)

 On the other hand, many browsers except for opera successfully connect to
 the servers.
 Something wrong?

 Regards,
 Koichi Sugimoto.

 2010/4/20 Jack Lloyd via RT r...@openssl.org


 RFC 4492 says:

   A client that receives a ServerHello message containing a Supported
   Point Formats Extension MUST respect the server's choice of point
   formats during the handshake (cf. Sections 5.6 and 5.7).  If no
   Supported Point Formats Extension is received with the ServerHello,
   this is equivalent to an extension allowing only the uncompressed
   point format.

 OpenSSL 1.0.0 rejects such a negotiation, always requiring the
 extension to exist in the ServerHello:

 CONNECTED(0003)
  TLS 1.0 Handshake [length 00cd], ClientHello
01 00 00 c9 03 01 4b cc f2 87 fc 1d 05 2d 0c 1f
4a 74 8b 8c 6f 20 c3 56 fb 35 4a 73 b0 9c e0 c1
6f 34 1b 10 f9 9f 00 00 5c c0 14 c0 0a 00 39 00
38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0
08 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 00
33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00
2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00
05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00
06 00 03 00 ff 01 00 00 44 00 0b 00 04 03 00 01
02 00 0a 00 34 00 32 00 01 00 02 00 03 00 04 00
05 00 06 00 07 00 08 00 09 00 0a 00 0b 00 0c 00
0d 00 0e 00 0f 00 10 00 11 00 12 00 13 00 14 00
15 00 16 00 17 00 18 00 19 00 23 00 00
  TLS 1.0 Handshake [length 002a], ServerHello
02 00 00 26 03 01 20 3f 72 c5 29 9f 22 b1 a6 af
4b 81 31 eb 4c 85 bf bb 3a a5 8b b8 21 86 16 c5
7c 84 5c 73 4a 4a 00 c0 08 00
 139742562498200:error:1411809D:SSL
 routines:SSL_CHECK_SERVERHELLO_TLSEXT:tls invalid ecpointformat
 list:t1_lib.c:1440:
 139742562498200:error:14092113:SSL
 routines:SSL3_GET_SERVER_HELLO:serverhello tlsext:s3_clnt.c:942:

 OpenSSL 1.0.0 29 Mar 2010
 built on: Mon Apr 19 19:52:35 EDT 2010
 platform: linux-x86_64
 options:  bn(64,64) rc4(1x,char) des(idx,cisc,16,int) idea(int)
 blowfish(idx)
 compiler: gcc -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H
 -m64 -DL_ENDIAN -DTERMIO -O3 -Wall -DMD32_REG_T=int -DOPENSSL_IA32_SSE2
 -DOPENSSL_BN_ASM_MONT -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM
 -DAES_ASM -DWHIRLPOOL_ASM
 OPENSSLDIR: /usr/local/ssl

 __
 OpenSSL Project http://www.openssl.org
 Development Mailing List   openssl-dev@openssl.org
 Automated List Manager   majord...@openssl.org




t1_lib.c.diff
Description: Binary data


Re: [openssl.org #2240] Missing Supported Point Formats Extension in ServerHello should be ignored

2010-04-24 Thread Mounir IDRASSI via RT
Hi,

I'm attaching a simple patch that should correct this behavior.
Can you test it and tell us the results?
Thanks,

--
Mounir IDRASSI
IDRIX
http://www.idrix.fr


 Dear openssl support,

 I investigated the following web servers.
 But all of them failed with the same error.

 1) apache-tomcat-6.0.26 + bcprov-ext-jdk16-145 + jdk1.6.0_17 (centos 5)
 2) jboss-4.2.3.GA + bcprov-jdk15 + jdk1.6.0_17 (centos 5)
 3) IIS 7 (windows 7)

 On the other hand, many browsers except for opera successfully connect to
 the servers.
 Something wrong?

 Regards,
 Koichi Sugimoto.

 2010/4/20 Jack Lloyd via RT r...@openssl.org


 RFC 4492 says:

   A client that receives a ServerHello message containing a Supported
   Point Formats Extension MUST respect the server's choice of point
   formats during the handshake (cf. Sections 5.6 and 5.7).  If no
   Supported Point Formats Extension is received with the ServerHello,
   this is equivalent to an extension allowing only the uncompressed
   point format.

 OpenSSL 1.0.0 rejects such a negotiation, always requiring the
 extension to exist in the ServerHello:

 CONNECTED(0003)
  TLS 1.0 Handshake [length 00cd], ClientHello
01 00 00 c9 03 01 4b cc f2 87 fc 1d 05 2d 0c 1f
4a 74 8b 8c 6f 20 c3 56 fb 35 4a 73 b0 9c e0 c1
6f 34 1b 10 f9 9f 00 00 5c c0 14 c0 0a 00 39 00
38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0
08 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 00
33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00
2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00
05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00
06 00 03 00 ff 01 00 00 44 00 0b 00 04 03 00 01
02 00 0a 00 34 00 32 00 01 00 02 00 03 00 04 00
05 00 06 00 07 00 08 00 09 00 0a 00 0b 00 0c 00
0d 00 0e 00 0f 00 10 00 11 00 12 00 13 00 14 00
15 00 16 00 17 00 18 00 19 00 23 00 00
  TLS 1.0 Handshake [length 002a], ServerHello
02 00 00 26 03 01 20 3f 72 c5 29 9f 22 b1 a6 af
4b 81 31 eb 4c 85 bf bb 3a a5 8b b8 21 86 16 c5
7c 84 5c 73 4a 4a 00 c0 08 00
 139742562498200:error:1411809D:SSL
 routines:SSL_CHECK_SERVERHELLO_TLSEXT:tls invalid ecpointformat
 list:t1_lib.c:1440:
 139742562498200:error:14092113:SSL
 routines:SSL3_GET_SERVER_HELLO:serverhello tlsext:s3_clnt.c:942:

 OpenSSL 1.0.0 29 Mar 2010
 built on: Mon Apr 19 19:52:35 EDT 2010
 platform: linux-x86_64
 options:  bn(64,64) rc4(1x,char) des(idx,cisc,16,int) idea(int)
 blowfish(idx)
 compiler: gcc -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H
 -m64 -DL_ENDIAN -DTERMIO -O3 -Wall -DMD32_REG_T=int -DOPENSSL_IA32_SSE2
 -DOPENSSL_BN_ASM_MONT -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM
 -DAES_ASM -DWHIRLPOOL_ASM
 OPENSSLDIR: /usr/local/ssl

 __
 OpenSSL Project http://www.openssl.org
 Development Mailing List   openssl-dev@openssl.org
 Automated List Manager   majord...@openssl.org





t1_lib.c.diff
Description: Binary data


Re: [openssl.org #2240] Missing Supported Point Formats Extension in ServerHello should be ignored

2010-04-23 Thread koichi sugimoto
Dear openssl support,

I investigated the following web servers.
But all of them failed with the same error.

1) apache-tomcat-6.0.26 + bcprov-ext-jdk16-145 + jdk1.6.0_17 (centos 5)
2) jboss-4.2.3.GA + bcprov-jdk15 + jdk1.6.0_17 (centos 5)
3) IIS 7 (windows 7)

On the other hand, many browsers except for opera successfully connect to
the servers.
Something wrong?

Regards,
Koichi Sugimoto.

2010/4/20 Jack Lloyd via RT r...@openssl.org


 RFC 4492 says:

   A client that receives a ServerHello message containing a Supported
   Point Formats Extension MUST respect the server's choice of point
   formats during the handshake (cf. Sections 5.6 and 5.7).  If no
   Supported Point Formats Extension is received with the ServerHello,
   this is equivalent to an extension allowing only the uncompressed
   point format.

 OpenSSL 1.0.0 rejects such a negotiation, always requiring the
 extension to exist in the ServerHello:

 CONNECTED(0003)
  TLS 1.0 Handshake [length 00cd], ClientHello
01 00 00 c9 03 01 4b cc f2 87 fc 1d 05 2d 0c 1f
4a 74 8b 8c 6f 20 c3 56 fb 35 4a 73 b0 9c e0 c1
6f 34 1b 10 f9 9f 00 00 5c c0 14 c0 0a 00 39 00
38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0
08 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 00
33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00
2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00
05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00
06 00 03 00 ff 01 00 00 44 00 0b 00 04 03 00 01
02 00 0a 00 34 00 32 00 01 00 02 00 03 00 04 00
05 00 06 00 07 00 08 00 09 00 0a 00 0b 00 0c 00
0d 00 0e 00 0f 00 10 00 11 00 12 00 13 00 14 00
15 00 16 00 17 00 18 00 19 00 23 00 00
  TLS 1.0 Handshake [length 002a], ServerHello
02 00 00 26 03 01 20 3f 72 c5 29 9f 22 b1 a6 af
4b 81 31 eb 4c 85 bf bb 3a a5 8b b8 21 86 16 c5
7c 84 5c 73 4a 4a 00 c0 08 00
 139742562498200:error:1411809D:SSL
 routines:SSL_CHECK_SERVERHELLO_TLSEXT:tls invalid ecpointformat
 list:t1_lib.c:1440:
 139742562498200:error:14092113:SSL
 routines:SSL3_GET_SERVER_HELLO:serverhello tlsext:s3_clnt.c:942:

 OpenSSL 1.0.0 29 Mar 2010
 built on: Mon Apr 19 19:52:35 EDT 2010
 platform: linux-x86_64
 options:  bn(64,64) rc4(1x,char) des(idx,cisc,16,int) idea(int)
 blowfish(idx)
 compiler: gcc -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H
 -m64 -DL_ENDIAN -DTERMIO -O3 -Wall -DMD32_REG_T=int -DOPENSSL_IA32_SSE2
 -DOPENSSL_BN_ASM_MONT -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM
 -DAES_ASM -DWHIRLPOOL_ASM
 OPENSSLDIR: /usr/local/ssl

 __
 OpenSSL Project http://www.openssl.org
 Development Mailing List   openssl-dev@openssl.org
 Automated List Manager   majord...@openssl.org



[openssl.org #2240] Missing Supported Point Formats Extension in ServerHello should be ignored

2010-04-20 Thread Jack Lloyd via RT

RFC 4492 says:

   A client that receives a ServerHello message containing a Supported
   Point Formats Extension MUST respect the server's choice of point
   formats during the handshake (cf. Sections 5.6 and 5.7).  If no
   Supported Point Formats Extension is received with the ServerHello,
   this is equivalent to an extension allowing only the uncompressed
   point format.

OpenSSL 1.0.0 rejects such a negotiation, always requiring the
extension to exist in the ServerHello:

CONNECTED(0003)
 TLS 1.0 Handshake [length 00cd], ClientHello
01 00 00 c9 03 01 4b cc f2 87 fc 1d 05 2d 0c 1f
4a 74 8b 8c 6f 20 c3 56 fb 35 4a 73 b0 9c e0 c1
6f 34 1b 10 f9 9f 00 00 5c c0 14 c0 0a 00 39 00
38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0
08 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 00
33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00
2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00
05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00
06 00 03 00 ff 01 00 00 44 00 0b 00 04 03 00 01
02 00 0a 00 34 00 32 00 01 00 02 00 03 00 04 00
05 00 06 00 07 00 08 00 09 00 0a 00 0b 00 0c 00
0d 00 0e 00 0f 00 10 00 11 00 12 00 13 00 14 00
15 00 16 00 17 00 18 00 19 00 23 00 00
 TLS 1.0 Handshake [length 002a], ServerHello
02 00 00 26 03 01 20 3f 72 c5 29 9f 22 b1 a6 af
4b 81 31 eb 4c 85 bf bb 3a a5 8b b8 21 86 16 c5
7c 84 5c 73 4a 4a 00 c0 08 00
139742562498200:error:1411809D:SSL routines:SSL_CHECK_SERVERHELLO_TLSEXT:tls 
invalid ecpointformat list:t1_lib.c:1440:
139742562498200:error:14092113:SSL routines:SSL3_GET_SERVER_HELLO:serverhello 
tlsext:s3_clnt.c:942:

OpenSSL 1.0.0 29 Mar 2010
built on: Mon Apr 19 19:52:35 EDT 2010
platform: linux-x86_64
options:  bn(64,64) rc4(1x,char) des(idx,cisc,16,int) idea(int) blowfish(idx) 
compiler: gcc -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -m64 
-DL_ENDIAN -DTERMIO -O3 -Wall -DMD32_REG_T=int -DOPENSSL_IA32_SSE2 
-DOPENSSL_BN_ASM_MONT -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DAES_ASM 
-DWHIRLPOOL_ASM
OPENSSLDIR: /usr/local/ssl

__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org