Re: Differences in defaults between 1.0.2 and 1.1.1

2019-03-19 Thread Matt Caswell
But I'd strongly advise against it since using such a sigalgs list will impact your ability to interoperate with TLSv1.3 servers. Matt > > Graeme > > -Original Message- From: openssl-users > On Behalf Of Matt Caswell Sent: March 19, > 2019 10:23 AM To: openssl-users@

RE: Differences in defaults between 1.0.2 and 1.1.1

2019-03-19 Thread Perrow, Graeme
ge in behaviour after we upgrade OpenSSL, my understanding is that they will simply have to fix their server. Graeme -Original Message- From: openssl-users On Behalf Of Matt Caswell Sent: March 19, 2019 10:23 AM To: openssl-users@openssl.org Subject: Re: Differences in defaults between

Re: Differences in defaults between 1.0.2 and 1.1.1

2019-03-19 Thread Matt Caswell
On 19/03/2019 13:40, Perrow, Graeme wrote: > TLS: error: accept - force handshake failure: errno 11 - moznss error -12162 > > TLS: can't accept: TLS error -12162:Unsupported hash algorithm used by TLS > peer.. Just to confirm - you've not configured client authentication? Assuming not, the

Re: Differences in defaults between 1.0.2 and 1.1.1

2019-03-19 Thread Hubert Kario
On Tuesday, 19 March 2019 14:40:19 CET Perrow, Graeme wrote: > I have an LDAP server that accepts TLS connections, and I can make a > connection to it using "openssl s_client -showcerts -host : > -debug". The output shows this is a TLSv1.2 connection using > ECDHE-RSA-AES128-SHA. This is using Open