On Mon, May 22, 2006 at 01:55:48PM +0200, Marek Marcola wrote:

> >     May 21 22:56:34 hqvsbh1 postfix-edmz/smtpd[923]:
> >         warning: TLS library problem: 923:error:0407006A:
> >         rsa routines:RSA_padding_check_PKCS1_type_1:
> >         block type is not 01:rsa_pk1.c:100:
> >     May 21 22:56:34 hqvsbh1 postfix-edmz/smtpd[923]:
> >         warning: TLS library problem: 923:error:04067072:
> >         rsa routines:RSA_EAY_PUBLIC_DECRYPT:padding check 
> > failed:rsa_eay.c:639:
> >     May 21 22:56:34 hqvsbh1 postfix-edmz/smtpd[923]:
> >         warning: TLS library problem: 923:error:0D089006:
> >         asn1 encoding routines:ASN1_verify:EVP lib:a_verify.c:168:
>
> On server side this may happen when server tries to decrypt
> CertificateVerify packet which is encrypted with client private key.
> Client should use for this operation PKCS1 padding type 1 (for private
> key operation). This type of padding sets first byte to 0
> and second to 1. Your server after decrypting CertificateVerify
> packet can not find this values and report error.
> Some server may try to use other padding type, for example 
> suggested for new application PKCS1 OAEP with is not recognized
> (for now) with CertificateVerify.

Would this also happen when the client's private key does not match
the certificate? Why does the handshake fail at this point? Client
certificates are not mandatory in my application, so if OpenSSL
skipped past the error and acted as though no client credentials
were sent, I would prefer that. Is that possible?

> Maybe you can trace this with ssldump and send decrypted
> CertificateVerify packet ? 

Will ssldump help with kEDH? Does the client cert handshake take place
before the traffic becomes encrypted?

-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to