Do you call SSL_CTX_set_options() with bit flags (SSL_OP_ALL,
SSL_OP_NO_SSLv3, etc.) to indicate the protocols you are willing to accept?

 

BTW, openssl-users (not -dev) is the proper forum for this sort of
questions.

 

Charles

From: owner-openssl-us...@openssl.org
[mailto:owner-openssl-us...@openssl.org] On Behalf Of Bhat, Jayalakshmi
Manjunath
Sent: Monday, October 29, 2012 5:27 AM
To: openssl-...@openssl.org; openssl-users@openssl.org
Subject: Need inputs/suggestions on SSL/TLS protocol version fallback
mechanism.

 

Hi All,

 

I have a client application that uses SSL23_client_method(). When the client
is getting connected to server that supports TLS 1.0 there are no issues.
When the client is getting connected to server that supports only SSLv3.0,
connection is getting aborted with protocol number error.

 

I have couple of question around this issue.

 

1.       If I like to support the fallback mechanism,  I need to implement
the same in the client application. SSL client state machine in OpenSSL does
not implement any fallback. 

2.       I did not see any recommendation in SSL/TLS RFC to implement the
fallback mechanism. I wanted to know are there any side effects in OpenSSL
library if fallback mechanism is implemented.

 

Any help on this points are appreciated.

 

Regards

Jayalakshmi

 

 

 

                                

Reply via email to