Le 11/10/2013 19:57, nehakochar a écrit :
Erwann ABALEA wrote
The server and client are both compliant.
With the first command, you tell the client to use TLS1.0 only. No more,
no less. The server is ok with it, and both negociate TLS1.0.
With the second command, you tell the client to use TLS1
On Fri, Oct 11, 2013, nehakochar wrote:
>
> In my case, SSL client is using OpenSSL 1.0.1e. I do not which version is
> the server using, but must be an older version. When the client is sending
> ClientHello with version 0x0303 (TLS1.2), the server does not respond at
> all. In which versions of
Erwann ABALEA wrote
> Bonjour,
>
>> Hi,
>> I ran into the same problem and then came across this thread. According
>> to
>> http://tools.ietf.org/html/rfc5246#appendix-E:
>>"A TLS 1.2 client who wishes to negotiate with such older servers will
>> send a normal TLS 1.2 ClientHello, containi
> From: owner-openssl-users On Behalf Of Erwann Abalea
> Sent: Friday, October 11, 2013 08:49
> Le 11/10/2013 03:35, nehakochar a écrit :
> > Rajesh Malepati wrote
> >> On Wed, Jul 24, 2013 at 9:30 PM, kirpit wrote:
> >> The server doesn't seem to care to respond to clients supporting TL
Bonjour,
Le 11/10/2013 03:35, nehakochar a écrit :
Rajesh Malepati wrote
On Wed, Jul 24, 2013 at 9:30 PM, kirpit <
kirpit@
> wrote:
The server doesn't seem to care to respond to clients supporting TLS 1.2
ok:
openssl s_client -tls1 -connect emea.webservices.travelport.com:443
no reply:
ope