On Fri, Mar 16, 2001 at 08:22:13PM +0000, Daniel Leddy wrote:
> When I try running openssl s_server -nocert
> and connecting a client to it this is what I get:
> 
> 1.
> C:\SSL>openssl s_server -nocert
> Loading 'screen' into random state - done
> Using default temp DH parameters
> ACCEPT
> 
> 2.
> C:\SSL>openssl s_client
> Loading 'screen' into random state - done
> CONNECTED(00000084)
> 4294831691:error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert 
> handsh
> ake failure:./ssl/s23_clnt.c:453:
> 
> 3. Back on the server side
> bad gethostbyaddr
> ERROR
> 4294688291:error:1408A0C1:SSL routines:SSL3_GET_CLIENT_HELLO:no shared 
> cipher:./
> ssl/s3_srvr.c:769:
> shutting down SSL
> CONNECTION CLOSED
> ACCEPT

The server _must_ present a certificate. For RSA ciphers a RSA cert must
be available, for DSA ciphers a DSA certificate must be available.
Since you do not give the server a certificate it does not support any
cipher, so the "no shared cipher" error must occur.
There are ciphers without certificate (anonymous with DH parameters: ADH),
but these are not secure against man-in-the-middle attacks and are therefore
disabled by default. You must explicitly allow them on s_client and s_server
with the -cipher option, see "man ciphers" for more details.

Best regards,
        Lutz
-- 
Lutz Jaenicke                             [EMAIL PROTECTED]
BTU Cottbus               http://www.aet.TU-Cottbus.DE/personen/jaenicke/
Lehrstuhl Allgemeine Elektrotechnik                  Tel. +49 355 69-4129
Universitaetsplatz 3-4, D-03044 Cottbus              Fax. +49 355 69-4153
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to