I forgot to mention, I am using openssl 1.0.0d
The server ecc key spec is prime256v1.


On Wed, Oct 12, 2011 at 4:33 PM, Erwin Himawan <ehima...@gmail.com> wrote:

> Hi,
>
> Does anybody know whether openssl s_client and s_server support the use of
> -dtls1 option while the server uses ECC key?
> The issuing CA and root CA use ECC keypair.
>
> These are my openssl s_server and s_client options:
> openssl s_server -accept 12000 -cert server.pem -certform pem -key
> server_key.pem -keyform pem -CApath . -CAfile CAECCRoot.pem -dtls1 -cipher
> ALL -debug -msg -state
> openssl s_client -connect:10.8.122.106:12000 -CApath . -CAfile
> CAECCRoot.pem -dtls1 -cipher ALL -debug -msg -state
>
> When I attempted to do this, the s_client gives error:
>
> SSL3 alert write:fatal:decrypt error
> SSL_connect:error in SSLv3 read server key exchange B
> 5551756:error:1408D07B:SSL routines:SSL3_GET_KEY_EXCHANGE:bad
> signature:s3_clnt.c:1610
>
> further down, I notice that the Verify return code: 0 (ok).
>
> I also use openssl verify to verify the server certificate using
> the issuing CA and root CA. The result agrees with the result shown by the
> s_client debug message.
>
> On the second note, I also try the s_server with RSA keypair, issued by the
> same issuing CA; the server certificate has RSA public key with signature
> algorithm is ecdsa-with-SHA256.
> In this scenario, the s_client was able to establish tls connection with
> the s-server.
>
> Does this mean that the openssl s_client and s_server does not support ECC
> keypair?
>
> Any pointer or idea how further troubleshoot this?
>
> Thanks,
> Erwin
>

Reply via email to