Hi David & OpenSSL-users,
 
We did compile against the new header files.
 
I checked this a little more on the Server side. On the Server side, I
use IIS 6.0. 
It looks like even before it hits my Server side code, Windows may be
cutting the TCP connection. 
The Server has Windows Server 2003, Enterprise Edition, Service Pack 2
v.4354 as the Operating System.
 
There is an error logged in Windows Event Viewer, with the following
description on the Server machine when the client tries to connect to
it. And the surprising part is that this Error is not logged again in
Event Viewer, for subsequent client connect requests, although from the
client side the error remains the same. This would continue until I
reboot my server, which would then again log the error in Event Viewer
for the first client connection request.
 
The Event Viewer Error is:-
 
************************************************************************
************************************************************************
*********************************
Event Type: Error
Event Source: Schannel
Event Category: None
Event ID: 36874
Date:  5/7/2009
Time:  12:03:59 AM
User:  N/A
Computer: CISCO80
Description:
An SSL connection request was received from a remote client application,
but none of the cipher suites supported by the client application are
supported by the server. The SSL connection request has failed.
 
For more information, see Help and Support Center at
http://go.microsoft.com/fwlink/events.asp
<http://go.microsoft.com/fwlink/events.asp> .
************************************************************************
************************************************************************
*********************************
 
I also found a potential problem which may be causing the issue here. 
My client side application uses the following SSL_set_cipher_list( )
function call before calling the SSL_connect( ).
 
************************************************************************
***********************************
SSL_set_cipher_list(m_ssl,"TLS_RSA_WITH_AES_128_CBC_SHA -- AES128-SHA");
SSL_set_fd(m_ssl, m_socket);
SSL_set_connect_state(m_ssl);
result = SSL_connect(m_ssl);
************************************************************************
***********************************
 
Commenting out SSL_set_cipher_list( ) on the client side, lets the
client connect successfully to the Server. Which means if the client is
allowed to make use of the default cipher suite during SSL handshake,
then there is no problem.
 
That brings me to my next question. 
Were there any specific changes made around SSL_set_cipher_list( )
function that could be causing an issue with the new OpenSSL library
0.9.8j? 
The same code has been working perfectly with 0.9.7d earlier.
 
Any thoughts on how we get around or fix this issue? Or whether I may
have missed out something during my compilation of OpenSSL?
Thanks in advance.
 
Regards,
Vivek
 
P.S. - I have already checked the Microsoft website for an update on
Schannel.dll, where there have added support for clients making use of
"TLS_RSA_WITH_AES_128_CBC_SHA -- AES128-SHA".
http://support.microsoft.com/kb/948963
 
However, with the same environment, all works fine with my client side
compiled against the old OpenSSL libs.
------------------------------------------------------------------------
------------------------------------------------------------------------
------------------------------------------------------------------------
-------------------
 
> Hi Srinivas,

> We compiled our code with the new version of lib files from
> openssl-0.9.8j version and replaced the new client dll's.
> Is any specific step has to be followed?

> Regards,
> Sweta

Did you compile against the new header files?

The client is saying the server cut the TCP connection. What does the
server
say?

DS


Reply via email to