> -----Original Message----- > From: Eric Covener [mailto:covener@xxxxxxxxx] > Sent: Tuesday, June 12, 2012 12:53 PM > To: users@xxxxxxxxxxxxxxxx > Subject: Re: TLS 1.2 handshake problem? > > Extension: SessionTicket TLS > Type: SessionTicket TLS (0x0023) > Length: 0 > Data (0 bytes) > > I've seen this cause trouble on java-based servers, since it is the first > extension that's 0 byte and servers can over-read and block. > > In openssl s_client, you can separately disable tls session tickets.. > > Does your request go through a java-based proxy? I don't believe so. However, if I force TLSv1.0 handshake the packet still contains the same SessionTicket, but connects successfully, so that can't be the problem. --------------------------------------------------------------------- To unsubscribe, e-mail: users-unsubscribe@xxxxxxxxxxxxxxxx For additional commands, e-mail: users-help@xxxxxxxxxxxxxxxx