Thank you Richard for the reply. I tried "openssl s_client -connect localhost:636 -showcerts -state -ssl3 -CAfile /path/to/ca.pem" but it failed. I got this:
CONNECTED(00000003) SSL_connect:before/connect initialization SSL_connect:SSLv3 write client hello A SSL3 alert read:fatal:handshake failure SSL_connect:failed in SSLv3 read server hello A 2439:error:14094410:SSL routines:SSL3_READ_BYTES:sslv3 alert handshake failure:s3_pkt.c:1052:SSL alert number 40 2439:error:1409E0E5:SSL routines:SSL3_WRITE_BYTES:ssl handshake failure:s3_pkt.c:529: My LDAP server's debug mode displays: TLS trace: SSL3 alert write:fatal:handshake failure TLS trace: SSL_accept:error in SSLv3 read client hello C TLS trace: SSL_accept:error in SSLv3 read client hello C TLS: can't accept. TLS: error:1408A0C1:SSL routines:SSL3_GET_CLIENT_HELLO:no shared cipher s3_srvr.c:882 connection_read(8): TLS accept error error=-1 id=10, closing connection_closing: readying conn=10 sd=8 for close connection_close: conn=10 sd=8 daemon: removing 8 daemon: select: listen=6 active_threads=0 tvp=NULL daemon: select: listen=7 active_threads=0 tvp=NULL daemon: activity on 1 descriptors daemon: select: listen=6 active_threads=0 tvp=NULL daemon: select: listen=7 active_threads=0 tvp=NULL Would have any other suggestion please? --- Richard Levitte - VMS Whacker <[EMAIL PROTECTED]> wrote: > In message > <[EMAIL PROTECTED]> > on Wed, 23 Mar 2005 15:34:29 +0100 (CET), fatima > riadi <[EMAIL PROTECTED]> said: > > ftmriadi> Once checking the SSL conection (by > running the > ftmriadi> command: 'openssl s_client -connect > localhost:636 > ftmriadi> -showcerts -state -CAfile > /path/to/ca.pem'), I get the > ftmriadi> following output: > ftmriadi> > ftmriadi> CONNECTED(00000003) > ftmriadi> SSL_connect:before/connect > initialization > ftmriadi> SSL_connect:SSLv2/v3 write client hello > A > ftmriadi> SSL3 alert read:fatal:handshake failure > ftmriadi> SSL_connect:error in SSLv2/v3 read > server hello A > ftmriadi> 2338:error:14077410:SSL > ftmriadi> routines:SSL23_GET_SERVER_HELLO:sslv3 > alert handshake > ftmriadi> failure:s23_clnt.c:470: > > Your client runs with the "umbrella" mode > 'SSLv2/v3', which enables > negotiation of actual SSL/TLS version. > Unfortunately: > > ftmriadi> My server's debug output shows: > ftmriadi> > ftmriadi> TLS trace: SSL3 alert > write:fatal:handshake failure > ftmriadi> TLS trace: SSL_accept:error in SSLv3 > read client > ftmriadi> hello B > ftmriadi> TLS trace: SSL_accept:error in SSLv3 > read client > ftmriadi> hello B > ftmriadi> TLS: can't accept. > ftmriadi> TLS: error:1408A0C1:SSL > ftmriadi> routines:SSL3_GET_CLIENT_HELLO:no shared > cipher > ftmriadi> s3_srvr.c:882 > ftmriadi> connection_read(8): TLS accept error > error=-1 id=0, > ftmriadi> closing > ftmriadi> connection_closing: readying conn=0 sd=8 > for close > ftmriadi> connection_close: conn=0 sd=8 > ftmriadi> daemon: removing 8 > ftmriadi> daemon: select: listen=6 > active_threads=0 tvp=NULL > ftmriadi> daemon: select: listen=7 > active_threads=0 tvp=NULL > ftmriadi> daemon: activity on 1 descriptors > ftmriadi> daemon: select: listen=6 > active_threads=0 tvp=NULL > ftmriadi> daemon: select: listen=7 > active_threads=0 tvp=NULL > > It seems like your server runs in forced SSLv3 mode. > That mode will > not work well with someone who attempts an > 'SSLv2/v3' type of > negotiation, so either you must tell 'openssl > s_client' to use the > forced SSLv3 mode (you simply add the flag '-ssl3'), > or you need to > tell your server to run the "umbrella" mode. If you > do the latter, > there whould also be a way to tell it what SSL/TLS > versions are > acceptable. > > Start with testing if the following works: > > openssl s_client -connect localhost:636 -showcerts > -state -ssl3 \ > -CAfile /path/to/ca.pem __________________________________________________________________ Découvrez le nouveau Yahoo! Mail : 250 Mo d'espace de stockage pour vos mails ! Créez votre Yahoo! Mail sur http://fr.mail.yahoo.com/ ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]