RE: TLS 1.2 handshake problem?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> -----Original Message-----
> From: Eric Covener [mailto:covener@xxxxxxxxx]
> Sent: Tuesday, June 12, 2012 12:53 PM
> To: users@xxxxxxxxxxxxxxxx
> Subject: Re:  TLS 1.2 handshake problem?
> 
> Extension: SessionTicket TLS
>                Type: SessionTicket TLS (0x0023)
>                Length: 0
>                Data (0 bytes)
> 
> I've seen this cause trouble on java-based servers, since it is the first
> extension that's 0 byte and servers can over-read and block.
> 
> In openssl s_client, you can separately disable tls session tickets..
> 
> Does your request go through a java-based proxy?

I don't believe so. However, if I force TLSv1.0 handshake the packet still contains the same SessionTicket, but connects successfully, so that can't be the problem.

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscribe@xxxxxxxxxxxxxxxx
For additional commands, e-mail: users-help@xxxxxxxxxxxxxxxx




[Index of Archives]     [Open SSH Users]     [Linux ACPI]     [Linux Kernel]     [Linux Laptop]     [Kernel Newbies]     [Security]     [Netfilter]     [Bugtraq]     [Squid]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Samba]     [Video 4 Linux]     [Device Mapper]

  Powered by Linux