> From: owner-openssl-us...@openssl.org On Behalf Of Baker, Darryl
> Sent: Friday, 07 December, 2012 11:30

> > Dave Thompson said:
> > 
> > The problem is not in accepting the cert, the problem is 
> you received no response (serverhello) at all, much less a cert.
> > When I try with vanilla 1.0.1c it works, but only TLSv1.0.
> >
> > There have been reports of some server software failing 
> because the clienthello for 1.2 is longer than in earlier versions 
<snip>
> I have not yet tried looking at the packets yet but the 
> options for openssl you suggested both -no_tls1_2 and -tls1 
> return the similar results as before though -tls1 does 
> generate a slightly different error. 
> 
> -no_tls1_2:   3077863048:error:140790E5:SSL 
> routines:SSL23_WRITE:ssl handshake failure:s23_lib.c:177:
> -tls1:                3078067848:error:1409E0E5:SSL 
> routines:SSL3_WRITE_BYTES:ssl handshake failure:s3_pkt.c:592:
> Neither:      3078428296:error:140790E5:SSL 
> routines:SSL23_WRITE:ssl handshake failure:s23_lib.c:177:
> 
And "handshake has read 0 bytes and written <N> bytes" in all cases?
If so, then it doesn't look like the ClientHello-too-long issue.

I don't recall if you said, but some browser(s?) and 1.0.0 
work okay *from the same client machine* where 1.0. fails? 
If not, it might be something about your machine the server 
doesn't like (probably not too likely) -- or something else 
in the network doesn't like (more and more common nowadays).


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to