>From: owner-openssl-us...@openssl.org On Behalf Of Baker, Darryl
>Sent: Thursday, 06 December, 2012 14:45

>I have a website I am monitoring and the tool uses the CURL library 
>which in turn uses the OpenSSL library. While all the browsers I've 
>tried accept the certificate OpenSSL does not. The results are below.
<snip>
># openssl version
>OpenSSL 1.0.1 14 Mar 2012
># openssl s_client -connect anthemnhequote.insurix.com:443
>CONNECTED(00000003)
>3077576328:error:140790E5:SSL routines:SSL23_WRITE:ssl handshake
failure:s23_lib.c:177:

>SSL handshake has read 0 bytes and written 226 bytes

The problem is not in accepting the cert, the problem is you 
received no response (serverhello) at all, much less a cert.
When I try with vanilla 1.0.1c it works, but only TLSv1.0.

There have been reports of some server software failing because the 
clienthello for 1.2 is longer than in earlier versions (this occurs 
before it has a chance to negotiate the version down). Try specifying 
-tls1 or at least -no_tls1_2 . Maybe try -cipher listspec smaller than 
the default (one cipher the server likes is enough, I got DES-CBC3-SHA).
Although the problem usually reported is at 255/256 bytes and 226 is less.

Your browsers may not be using 1.2 at all, or they may be using it more 
conservatively than OpenSSL does (by default). If you want to check,
get a network trace. I recommend www.wireshark.org on Windows or MacOSX. 
On Linux you can capture with tcpdump, but I find the display unhelpful 
and prefer to download to wireshark for display.


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to