> From: owner-openssl-us...@openssl.org On Behalf Of Nouefel
> Sent: Monday, 28 February, 2011 19:10

> Openssl version - OpenSSL 0.9.8l 5 Nov 2009
> 
> Now regarding the commands and their results :
> 
> openssl s_client -connect HOSTNAME:443 -cipher LOW:EXP
> connect: Connection timed out
> connect:errno=110
> 
Okay, so this is almost certainly Linux 
and that error means you didn't connect at all.
You have NO information what the server supports.

However, if ALL clients are like you unable to connect on 443 
(see below) then it shouldn't matter if the server software 
contains support for weak ciphers (or other problems like 
SQL or script injection, crossdomain forgery, etc.) since 
no one can send the data that would exploit these problems.

> openssl s_client -connect HOSTNAME:8000 -cipher LOW:EXP
> CONNECTED(00000003)
> write:errno=104
> 
That's a bit odd; you connected and then got reset.
It's especially odd to get it on write, unless maybe 
your random-gen for KeyExchange is extra slow or something.
Depending on the server (particularly OS), this MAY 
indicate that the server is failing (e.g. crashing).

Normally I would first suggest checking the server logs, 
but if you're trying to probe basic crypto from outside 
I'm guessing you don't have access to the logs.

As I said, try with -msg (or -debug) to get details of 
the handshake process. That MAY get far enough to have 
some information about the crypto support of the server.
> 
> So on 8000 it says connected but there is also an err. Where 
> as first one
> times out as 443 port is not enabled.
> 
What exactly do you mean by "port is not enabled"?
If there is simply no software listening on port N on 
a reachable host, connect normally fails with reset.
The host might have rules or features to just discard 
connects (SYNs) on some port(s) e.g. 443 for any reason 
it likes, possibly to avoid scans or probes like yours.
Or, there might be a firewall or similar device 
between you and the host which decides to discard 443, 
but let through 8000 -- maybe even to let through 
the SYNs for 8000 but then subsequently break the 
connection with RST, although that's rather rude.

Are you even sure HOSTNAME:443 and HOSTNAME:8000 are 
the same host? First, one name can translate in DNS 
to different addresses at different times, although it 
is unlikely it would consistently translate to different 
values for your :443 attempts versus your :8000 ones.
Second, a single address could be "on" a NAT-type box 
that routes different ports to different hosts; 
this is fairly common in today's network world.

If this host belongs to your organization, or a business 
partner or something, they should be able to tell you 
how the network setup works, and quite possibly how 
the crypto is set up if that is your actual question.
Admittedly in some (large) organizations, it can be 
a chore to find the correct person with such answers.
If this host belongs to someone else, they may want you 
NOT to know this setup, which they may want to change 
without warning and without you knowing or noticing.



______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to