[prev in list] [next in list] [prev in thread] [next in thread] 

List:       openssl-users
Subject:    b-etch: =?koi8-r?b?18/T0NLPydrXxcTFzsnFINDSz8LMxc3Z?= (fwd)
From:       Dmitry Belyavsky <beldmit () cryptocom ! ru>
Date:       2005-11-29 14:32:45
Message-ID: Pine.LNX.4.62.0511291723260.23108 () manul ! lan ! cryptocom ! ru
[Download RAW message or body]

Greetings!

We use openssl 0.9.8a, apache 1.3.34 with mod_ssl 2.8.25 (Debian etch).
The URL we request requires client certificate.

The command is:

zsh% openssl s_client -cipher DHE-DSS-AES256-SHA -cert U_x_dsa_dsaparams.pem/cert.pem \
-key U_x_dsa_dsaparams.pem/seckey.pem -CAfile ca_dsa.pem -connect \
b-etch.vm.cryptocom.ru:444 -ign_eof

The result is:

CONNECTED(00000003)
depth=1 /C=RU/L=Moscow/CN=DSA Test CA/O=Cryptocom/OU=OpenSSL \
CA/emailAddress=vitus@cryptocom.ru verify return:1
depth=0 /C=RU/O=Cryptocom/OU=OpenSSL \
team/CN=b-etch.vm.cryptocom.ru/emailAddress=vitus@cryptocom.ru verify return:1
---
Certificate chain
 0 s:/C=RU/O=Cryptocom/OU=OpenSSL \
team/CN=b-etch.vm.cryptocom.ru/emailAddress=vitus@cryptocom.ru  \
i:/C=RU/L=Moscow/CN=DSA Test CA/O=Cryptocom/OU=OpenSSL \
CA/emailAddress=vitus@cryptocom.ru  1 s:/C=RU/L=Moscow/CN=DSA Test \
CA/O=Cryptocom/OU=OpenSSL CA/emailAddress=vitus@cryptocom.ru  i:/C=RU/L=Moscow/CN=DSA \
                Test CA/O=Cryptocom/OU=OpenSSL CA/emailAddress=vitus@cryptocom.ru
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/C=RU/O=Cryptocom/OU=OpenSSL \
team/CN=b-etch.vm.cryptocom.ru/emailAddress=vitus@cryptocom.ru \
issuer=/C=RU/L=Moscow/CN=DSA Test CA/O=Cryptocom/OU=OpenSSL \
                CA/emailAddress=vitus@cryptocom.ru
---
No client certificate CA names sent
---
SSL handshake has read 2126 bytes and written 247 bytes
---
New, TLSv1/SSLv3, Cipher is DHE-DSS-AES256-SHA
Server public key is 1024 bit
Compression: NONE
Expansion: NONE
SSL-Session:
    Protocol  : TLSv1
    Cipher    : DHE-DSS-AES256-SHA
    Session-ID: E3EAF6401AF1F8157A2653118728FE9A15322C97FDCC8AFCB084326CE1C9C227
    Session-ID-ctx:
    Master-Key: DABB6DC00DA8A621316F9711263F13D9ED8DE59CC6A5F33800A4D7DCE0135132FF8D30148363A33CDF1C978CD4B974E2
  Key-Arg   : None
    Start Time: 1133270656
    Timeout   : 300 (sec)
    Verify return code: 0 (ok)
---
GET /ssl_auth_test.html
depth=1 /C=RU/L=Moscow/CN=DSA Test CA/O=Cryptocom/OU=OpenSSL \
CA/emailAddress=vitus@cryptocom.ru verify return:1
depth=0 /C=RU/O=Cryptocom/OU=OpenSSL \
team/CN=b-etch.vm.cryptocom.ru/emailAddress=vitus@cryptocom.ru verify return:1
4119:error:1408F455:SSL routines:SSL3_GET_RECORD:decryption failed or bad record \
mac:s3_pkt.c:426:

The bug is reproduced about 4 times from 5.

When I add -ssl3 key to command line, I successfully get the page I
request.

openssl-0.9.7 s_client doesn't get an error anyway.

What's wrong?

Thank you!

--
SY, Dmitry Belyavsky (ICQ UIN 11116575)


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majordomo@openssl.org


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic