Re: no suitable signature algorithm during handshake failure

2021-01-08 Thread Quanah Gibson-Mount
--On Friday, January 8, 2021 4:44 PM -0500 Viktor Dukhovni wrote: Hi Viktor, On Fri, Jan 08, 2021 at 12:05:26PM -0800, Quanah Gibson-Mount wrote: > https://www.spinics.net/lists/openssl-users/msg05623.html Thanks Viktor. Mainly, I wasn't sure what specific information would be nec

Re: no suitable signature algorithm during handshake failure

2021-01-08 Thread Viktor Dukhovni
On Fri, Jan 08, 2021 at 12:05:26PM -0800, Quanah Gibson-Mount wrote: > > https://www.spinics.net/lists/openssl-users/msg05623.html > > Thanks Viktor. Mainly, I wasn't sure what specific information would be > necessary. Here's what wireshark shows (IP addresses obfuscated): It would be re

Re: no suitable signature algorithm during handshake failure

2021-01-08 Thread Quanah Gibson-Mount
--On Thursday, January 7, 2021 8:56 PM -0500 Viktor Dukhovni wrote: You're leaving out too much detail. Post the full client hello decoded by "tshark": https://www.spinics.net/lists/openssl-users/msg05623.html Thanks Viktor. Mainly, I wasn't sure what specific information would be

Re: no suitable signature algorithm during handshake failure

2021-01-07 Thread Viktor Dukhovni
On Thu, Jan 07, 2021 at 05:10:29PM -0800, Quanah Gibson-Mount wrote: > Using wireshark, we can see the following signature algorithms are offered > from the client side (which uses TLSv1.2) for both the working and failing > servers: > > 0x0403 ECDSA-SHA256 > 0x0503 ECDSA-SHA384 > 0x0603 ECDSA-