> Dave Thompson said:
> 
> The problem is not in accepting the cert, the problem is you received no 
> response (serverhello) at all, much less a cert.
> When I try with vanilla 1.0.1c it works, but only TLSv1.0.
>
> There have been reports of some server software failing because the 
> clienthello for 1.2 is longer than in earlier versions 
> (this occurs before it has a chance to negotiate the version down). Try 
> specifying
> -tls1 or at least -no_tls1_2 . Maybe try -cipher listspec smaller than the 
> default (one cipher the server likes is enough, I got DES-CBC3-SHA).
> Although the problem usually reported is at 255/256 bytes and 226 is less.
>
> Your browsers may not be using 1.2 at all, or they may be using it more 
> conservatively than OpenSSL does (by default). If 
> you want to check, get a network trace. I recommend www.wireshark.org on 
> Windows or MacOSX. 
> On Linux you can capture with tcpdump, but I find the display unhelpful and 
> prefer to download to wireshark for display.

I have not yet tried looking at the packets yet but the options for openssl you 
suggested both -no_tls1_2 and -tls1 return the similar results as before though 
-tls1 does generate a slightly different error. 

-no_tls1_2:     3077863048:error:140790E5:SSL routines:SSL23_WRITE:ssl 
handshake failure:s23_lib.c:177:
-tls1:          3078067848:error:1409E0E5:SSL routines:SSL3_WRITE_BYTES:ssl 
handshake failure:s3_pkt.c:592:
Neither:        3078428296:error:140790E5:SSL routines:SSL23_WRITE:ssl 
handshake failure:s23_lib.c:177:

Darryl Baker
Sr Application Support Engineer
 Connecture Inc

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to