>From: owner-openssl-us...@openssl.org On Behalf Of Ztatik Light
>Sent: Friday, 16 August, 2013 03:31

>From stackoverflow: 

>"These hash values will comes from the Subject DN of each 
>CA certificate (since the aim is to look for a CA certificate 
>with the subject matching the issuer of the certificate to verify). 
>You can either usec_rehash as documented, or get the Subject DN's 
>hash using openssl x509 -subject_hash -noout -in cacert.pem 
>and rename the file/link accordingly."

That most likely explains the "unable to get local issuer cert"
because 1.0.0 and later changed the subject hashing from 0.9.8,
so either the existing (0.9.8) certs dir needs to be rehashed, 
or you need to create a separate -CApath using 1.0.0 hash,
or just put the CA cert(s) you want in a -CAfile instead.

But it doesn't explain cipher NONE, which should only occur if 
the handshake fails, and it's pretty odd for that to occur 
after (receiving and) validating the server cert.

>On Thu, Aug 15, 2013 at 12:01 PM, Andrew H 
><andrew_ya...@hotmail.com> wrote:
        
>       I have two version of OpenSSL on my OSX file system, 
>the default 0.9.8r and 1.0.1e. 
>       For the later I'm having trouble getting the syntax 
>of the command correct, I think.

>       When I used this (in 1.0.1e's directory, /opt/localbin):
>       ./openssl s_client -connect foo.foo.foo.foo:443 ( replace the foo's
).
>       I get responses that included the Cipher is NONE and 
>'unable to get local issuer certificate' messages.

>       Without the ./, using the default openssl, this works fine, 
>the cipher is populated and no local issuer messages.

>       I tried variations of the CApath argument with no success:
>       -CApath /System/Library/OpenSSL/certs/ 
>       That's the system path from 'openssl version -d'
>       I messed around with similar values in the verify argument.  

You can't use "similar" values, -verify takes a number (indicating 
depth) and isn't really implemented anyway (the callback ignores 
it entirely unless there's already another verification error, 
and then it sets a variable that isn't used!)

>       There's obviously a fundamental misunderstanding on my part 
>regarding the proper usage of these arguments.

These arguments for s_client haven't changed, although some 
other options were added. 1.0.1 newly implements TLSv1.1 and 
1.2 and defaults to the highest available. 1.2 in particular 
has been known to cause problems with some (lame) servers. If 
you still can't connect after fixing CApath as above, try adding 
-no_tls1_2 or more restrictively -tls1 or -ssl3 . If that makes 
the difference and you want to understand what the exact problem 
is, show us *all* the output for a 1.2 attempt. 


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to