Screw the latest versions...

I fixed this by downgrading to:

Crypt-SSLeay-0.22
and libwww-perl-5.51

For Solaris 2.7 perl 5.6.1 and for Linux RedHat 6.2 perl 5.005_03

What a complete waste of 2 days.

- George

-----Original Message-----
From: Joshua Chamas [mailto:[EMAIL PROTECTED]]
Sent: Thursday, September 13, 2001 12:14 AM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: Crypt::SSLeay - problems connecting to 128 bit sites (not
56bit sites) Solaris 2.7 and openssl .96b, latest version of
Crypt::SSLeay


George Richman wrote:
>
> Support,
>
> Does Crypt::SSLeay support 128 bit encrypted sites??
>
> When I use lwp-request https://login.zeborg.com , it does not connect
> properly.  I get a:
> ...
> Then when I try it against a lower bit encrypted site (56bit), it actually
> works:
>
> lwp-request https://laborla.zeborg.com/
>
> I am using Solaris 2.7 and openssl .96b.
>

My version of Crypt::SSLeay, v.31, seems to work, see below,
note that .31 is a dev version, but nothing about connections
changed in it, only build & debugging config stuff.  .29 was
the last release to CPAN and should work the same, so I'd
guess its openssl 0.9.6b that's the problem.  You could
try a downgrade to 0.9.6a, and see how it goes.

--Josh

WinNT perl5.004_04 works fine, same as below
#define OPENSSL_VERSION_TEXT    "OpenSSL 0.9.6a 5 Apr 2001"

Linux perl5.005xx works fine [ see below ]
#define OPENSSL_VERSION_TEXT    "OpenSSL 0.9.6a 5 Apr 2001"

# lwp-request -ed https://login.zeborg.com
Cache-Control: no-store
Connection: Close
Pragma: no-cache
Server: WebLogic 5.1.0 Service Pack 8 12/20/2000 16:34:54 #95137
Content-Length: 3797
Content-Type: text/html
Expires: 1
Client-Date: Thu, 13 Sep 2001 07:10:35 GMT
Client-Peer: 209.10.152.150:443
Client-SSL-Cert-Issuer: /O=VeriSign Trust Network/OU=VeriSign,
Inc./OU=VeriSign International Server CA - Class 3/OU=www.verisign.com/CPS
Incorp.by
Ref. LIABILITY LTD.(c)97 VeriSign
Client-SSL-Cert-Subject: /C=US/ST=New York/L=New
York/O=Zeborg/OU=Globix/CN=login.zeborg.com
Client-SSL-Cipher: RC4-SHA
Client-SSL-Warning: Peer certificate not verified
Set-Cookie:
SSOTengahSession=O6BcHo7TTTFGTM6VKA2SdX568dvuw1zNuuLbwDFXDPSDteEvXWGo|680802
4995186924964/-1062726649/6/3530/3530/3535/3535/3530/-1;
path=/
Title: Zeborg Login

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to