Hello,
I am developing a server and I need to disable client initiated renegotiations.

I thought that settings the SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION flag 
into SSL_CTX_set_options was the way to go but apparently I was wrong (as you 
can see from a simple test):

openssl s_client -connect www.myhost.com:443
CONNECTED(00000003)
…
---
$ R
RENEGOTIATING
139750207096480:error:1409E0E5:SSL routines:SSL3_WRITE_BYTES:ssl handshake 
failure:s3_pkt.c:596:
 
If I try this with the DB-Server it tries to renegotiate:
$ openssl s_client -connect dev.myhost.com:443
CONNECTED(00000003)
…
---
$ R
RENEGOTIATING
depth=0 C = CH, ST = Italy, O = SQLabs = cubeSQL, CN = dev.myhost.com, 
emailAddress = host...@myhost.com
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 C = CH, ST = Italy, O = SQLabs = cubeSQL, CN = dev.myhost.com, 
emailAddress = host...@myhost.com
verify error:num=27:certificate not trusted
verify return:1
depth=0 C = CH, ST = Italy, O = SQLabs = cubeSQL, CN = dev.myhost.com, 
emailAddress = host...@myhost.com
verify error:num=21:unable to verify the first certificate
verify return:1


So, how I can completely disable client renegotiations?
Thanks a lot.
--
Marco Bambini
http://www.sqlabs.com
http://twitter.com/sqlabs
http://instagram.com/sqlabs



______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to