*Guys, good afternoon!*
*1) SO' informations* *Server* ------ CentOS release 5.2 OpenSSL 0.9.8k 25 Mar 2009 Apache 2.2 JBoss-4.2.2 *Client* ------ CentOS release 5.2 OpenSSL 0.9.8b 04 May 2006 (Library: OpenSSL 0.9.8h 28 May 2008) Both have certificate files. *2) Problem and tests* I have the system based in comunication between client and server, in this system is possible send commands from the server to the client, for example, send log files - And the files from the cliente are sending to the server. But, I have had some problems with the OpenSSL. I think that the problem is the OpenSSL, because before some errors, I tried to communicate the server with the client only with OpenSSL (the command below) : * openssl s_client -debug -msg -ssl3 -connect 192.168.13.57:60002* --------------------------------------------------------------- CONNECTED(00000003) write to 0x8738c20 [0x87518a0] (94 bytes => 94 (0x5E)) 0000 - 16 03 00 00 59 01 00 00-55 03 00 4a ce 18 7c 78 ....Y...U..J..|x 0010 - 4f a4 1e f0 17 58 7a a8-8d ec a7 d0 0f 86 b8 68 O....Xz........h 0020 - 2e 86 1f d6 c5 6c ca 4f-51 15 64 00 00 28 00 39 .....l.OQ.d..(.9 0030 - 00 38 00 35 00 16 00 13-00 0a 00 33 00 32 00 2f .8.5.......3.2./ 0040 - 00 07 00 05 00 04 00 15-00 12 00 09 00 14 00 11 ................ 0050 - 00 08 00 06 00 03 01 00-00 04 00 23 ...........# 005e - <SPACES/NULS> >>> SSL 3.0 Handshake [length 0059], ClientHello 01 00 00 55 03 00 4a ce 18 7c 78 4f a4 1e f0 17 58 7a a8 8d ec a7 d0 0f 86 b8 68 2e 86 1f d6 c5 6c ca 4f 51 15 64 00 00 28 00 39 00 38 00 35 00 16 00 13 00 0a 00 33 00 32 00 2f 00 07 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 01 00 00 04 00 23 00 00 read from 0x8738c20 [0x874d090] (5 bytes => -1 (0xFFFFFFFF)) write:errno=104 *openssl s_client -debug -msg -ssl2 -connect 192.168.13.57:60002* --------------------------------------------------------------- CONNECTED(00000003) write to 0x8945d90 [0x895c729] (48 bytes => 48 (0x30)) 0000 - 80 2e 01 00 02 00 15 00-00 00 10 07 00 c0 05 00 ................ 0010 - 80 03 00 80 01 00 80 06-00 40 04 00 80 02 00 80 .........@...... 0020 - 06 c8 b3 16 3f fb a8 85-75 8c aa 90 9a a1 db 8c ....?...u....... >>> SSL 2.0 [length 002e], CLIENT-HELLO 01 00 02 00 15 00 00 00 10 07 00 c0 05 00 80 03 00 80 01 00 80 06 00 40 04 00 80 02 00 80 06 c8 b3 16 3f fb a8 85 75 8c aa 90 9a a1 db 8c read from 0x8945d90 [0x8954720] (2 bytes => -1 (0xFFFFFFFF)) write:errno=104 * openssl s_client -debug -msg -ssl3 -connect 192.168.13.57:443* ------------------------------------------------------------- connect: Connection refused connect:errno=29 * openssl s_client -debug -msg -ssl2 -connect 192.168.13.57:443* ------------------------------------------------------------- connect: Connection refused connect:errno=29 * Error : Apache* -------------- [Thu Oct 08 17:12:39 2009] [debug] ssl_engine_kernel.c(1770): OpenSSL: Write: SSL negotiation finished successfully [Thu Oct 08 17:12:39 2009] [info] [client 192.168.13.57] SSL library error 1 reading data [Thu Oct 08 17:12:39 2009] [info]* SSL Library Error: 336130329 error:1408F119:SSL routines:SSL3_GET_RECORD:decryption failed or bad record mac* [Thu Oct 08 17:12:39 2009] [debug] ssl_engine_kernel.c(1770): OpenSSL: Write: SSL negotiation finished successfully [Thu Oct 08 17:12:39 2009] [info] [client 192.168.13.57] Connection closed to child 0 with standard shutdown (server sslejmtransfer.hst.br:443) There are a diference between the OpenSSL Client and Server, version and ciphers : - I tried changing the version of the OpenSSL on the server, but even changing it, the error didn't change. - My keys are 1024, and I saw that there are a diference between the ciphers on the server and client. Below, we can see that there are 5 ciphers disabled on the server (include/openssl/tls1.h), don't appear on the list (openssl ciphers -v). *Server* ------ DHE-RSA-AES256-SHA DHE-DSS-AES256-SHA AES256-SHA EDH-RSA-DES-CBC3-SHA EDH-DSS-DES-CBC3-SHA DES-CBC3-SHA DES-CBC3-MD5 DHE-RSA-AES128-SHA DHE-DSS-AES128-SHA AES128-SHA IDEA-CBC-SHA IDEA-CBC-MD5 RC2-CBC-MD5 RC4-SHA RC4-MD5 RC4-MD5 EDH-RSA-DES-CBC-SHA EDH-DSS-DES-CBC-SHA DES-CBC-SHA DES-CBC-MD5 EXP-EDH-RSA-DES-CBC-SHA EXP-EDH-DSS-DES-CBC-SHA EXP-DES-CBC-SHA EXP-RC2-CBC-MD5 EXP-RC2-CBC-MD5 EXP-RC4-MD5 EXP-RC4-MD5 *Client* ------ TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA TLS_RSA_EXPORT1024_WITH_RC4_56_SHA TLS_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA TLS_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA TLS_DHE_DSS_WITH_RC4_128_SHA *tls1.h* ------ tls1.h:#define TLS1_CK_RSA_EXPORT1024_WITH_RC4_56_MD5 0x03000060 tls1.h:#define TLS1_CK_RSA_EXPORT1024_WITH_RC2_CBC_56_MD5 0x03000061 tls1.h:#define TLS1_CK_RSA_EXPORT1024_WITH_DES_CBC_SHA 0x03000062 tls1.h:#define TLS1_CK_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA 0x03000063 tls1.h:#define TLS1_CK_RSA_EXPORT1024_WITH_RC4_56_SHA 0x03000064 tls1.h:#define TLS1_CK_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA 0x03000065 tls1.h:#define TLS1_TXT_RSA_EXPORT1024_WITH_RC4_56_MD5 "EXP1024-RC4-MD5" tls1.h:#define TLS1_TXT_RSA_EXPORT1024_WITH_RC2_CBC_56_MD5 "EXP1024-RC2-CBC-MD5" tls1.h:#define TLS1_TXT_RSA_EXPORT1024_WITH_DES_CBC_SHA "EXP1024-DES-CBC-SHA" tls1.h:#define TLS1_TXT_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA "EXP1024-DHE-DSS-DES-CBC-SHA" tls1.h:#define TLS1_TXT_RSA_EXPORT1024_WITH_RC4_56_SHA "EXP1024-RC4-SHA" tls1.h:#define TLS1_TXT_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA "EXP1024-DHE-DSS-RC4-SHA" I want to do the test with these ciphers. So, *I NEED TO KNOW HOW I CAN ENABLE THESE CIPHERS?* Somone can help me??? Thanks for your attetion and help. * Best regards, Mariana Hoffart Dias *