> From: owner-openssl-us...@openssl.org On Behalf Of Mr.Rout
> Sent: Friday, 11 May, 2012 03:50

> Please help me out in debugging this cipher negotiation issue.
> 
> My client supports OpensslV1.0 and my server supports 
> Openssl0.9.7. I used
> self-signed RSA type certificate on both server & client. But 
> my Handshake is failing.

> A Snippet from SSLdump:
> 3 1  0.0100 (0.0100)  C>SV3.1(101)  Handshake
>       ClientHello
>         Version 3.1
>         random[32]=
>           4f ac c2 65 e1 fc 67 9b c3 06 9b 2a 74 34 4d a8
>           5b a0 2b 85 8a bd d8 06 99 c8 48 31 37 46 9b d4
>         resume [32]=
>           96 a6 be fa ec ac 21 f4 c9 ec 9b 5c c5 e9 5c bf
>           38 71 1c ef 87 ce f3 b6 b0 6d 11 f2 72 71 11 d7
>         cipher suites
>         TLS_RSA_WITH_RC4_128_MD5
>         TLS_RSA_WITH_RC4_128_SHA
>         Unknown value 0x2f
>         Unknown value 0x35
>         Unknown value 0x34
>         Unknown value 0x3a
>         Unknown value 0x33
>         Unknown value 0x39
>         TLS_RSA_WITH_3DES_EDE_CBC_SHA
>         Unknown value 0xff
>         compression methods
>                   NULL
> 3 2  0.0106 (0.0006)  S>CV3.1(2)  Alert
>     level           fatal
>     value           handshake_failure
> 3    0.0107 (0.0001)  S>C  TCP FIN
> 
> 
> 
> The question are:
> 1) Why TLS handshake is failing on both client & server support the
> cipher=DHE-RSA-AES128-SHA

All we can see on the wire is the server doesn't like something.
Does the server have any log, or debug options, you can look at?

0.9.7a is very old. I think it did implement extensions, but 
not all, although it can/should negotiate away unknown ones.
I don't recall what other features it doesn't have, and it 
definitely doesn't have a lot of recent fixes. 

> 2) Why i am seeing unknown as my ciphers in client hello 
> message ( on ssldump) ?

Your ssldump is apparently also very old. It doesn't know the 
AES suites, or the fake suite (SCSV) for secure-renegotiation.
It isn't showing any ClientHello extensions, but for 1.0.0 
client there should be some.

I don't know if ssldump is being maintained; if so get a current 
version. Or get www.wireshark.org (on Windows or MacX) instead; 
it functionally replaces ssldump and is definitely up to date.

I'm also concerned it shows data in 'resume', which from the 
position I believe means sess-id for resumption. If this 
client hasn't been able to complete a handshake with this 
server, it shouldn't have a sess-id to resume; if it has, 
why did the previous one work and this one fail?

> 3) Is it has anything to do with RSA self-signed-certificate ?
> 
Almost certainly not. That might cause your client to refuse 
to trust the server, depending on your client's configuration 
(and code), but it wouldn't cause the server to give an error.


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to