Thanks Marek. This is now working. Mistake on our part. We were using
"," when doing OR in SSL_ctx_set_options instead of "|".

-Krishna

On 7/10/06, Marek Marcola <[EMAIL PROTECTED]> wrote:
Hello,
>
> I've attached modified test client code, which without
> OP_ALL option have results as:
>       $ ./ssl2
>       crypto lib: OpenSSL 0.9.7f 22 Mar 2005
>       the cipher used by the client: DES-CBC3-SHA
>       ssl_read: 1460
>       16808:error:1408F455:SSL routines:SSL3_GET_RECORD:decryption failed or
> bad record mac:s3_pkt.c:424:
>
> and after adding OP_ALL has results as:
>       $ ./ssl2 -op_all
>       crypto lib: OpenSSL 0.9.7f 22 Mar 2005
>       the cipher used by the client: DES-CBC3-SHA
>       ssl_read: 1460
>       ssl_read: 2048
>       ssl_read: 2048
>       ssl_read: 2048
>       ssl_read: 2048
>       ssl_read: 2048
>       ssl_read: 2048
>       ssl_read: 2048
>       ssl_read: 2048
>       ssl_read: 1810
>
After more digging with ssldump:

Default configuration (without SSL_OP_ALL):
1 4  0.3324 (0.0000)  C>SV3.0(1)  ChangeCipherSpec
1 5  0.3324 (0.0000)  C>SV3.0(64)  Handshake
1 6  0.5157 (0.1833)  S>CV3.0(1)  ChangeCipherSpec
1 7  0.7305 (0.2148)  S>CV3.0(64)  Handshake
1 8  0.7310 (0.0004)  C>SV3.0(24)  application_data
1 9  0.7310 (0.0000)  C>SV3.0(352)  application_data
1 10 0.9133 (0.1823)  S>CV3.0(1488)  application_data
1 11 1.1932 (0.2798)  S>CV3.0(18216)  application_data <-- here ERROR
1    1.1932 (0.0000)  S>C  TCP FIN
1 12 1.1947 (0.0014)  C>SV3.0(24)  Alert <-- here ALERT information

configuration with SSL_OP_ALL:
1 4  0.3347 (0.0000)  C>SV3.0(1)  ChangeCipherSpec
1 5  0.3347 (0.0000)  C>SV3.0(64)  Handshake
1 6  0.5185 (0.1838)  S>CV3.0(1)  ChangeCipherSpec
1 7  0.7336 (0.2150)  S>CV3.0(64)  Handshake
1 8  0.7341 (0.0004)  C>SV3.0(24)  application_data
1 9  0.7341 (0.0000)  C>SV3.0(352)  application_data
1 10 0.9166 (0.1824)  S>CV3.0(1488)  application_data
1 11 1.1873 (0.2707)  S>CV3.0(18216)  application_data
1    1.1873 (0.0000)  S>C  TCP FIN
1    1.1891 (0.0018)  C>S  TCP FIN

As we can see server sends big packet (18216 bytes) and OpenSSL
refuse to process it (with RFC this should max 16384 bytes of data
+ header size).
With SSL_OP_ALL we switch on flag SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER
which instructs library to accept bigger packets.

Best regars,
--
Marek Marcola <[EMAIL PROTECTED]>

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to