Re: Ubuntu Xenial + Postgresql v9.5 == SSL routines:ssl23_write:ssl handshake failure:s23_lib.c:177:

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> From: openssl-users [mailto:openssl-users-bounces@xxxxxxxxxxx] On Behalf
> Of Graham Leggett
> Sent: Thursday, November 09, 2017 08:30
> To: openssl-users@xxxxxxxxxxx
> Subject: Re:  Ubuntu Xenial + Postgresql v9.5 == SSL
> routines:ssl23_write:ssl handshake failure:s23_lib.c:177:
> 
> On 09 Nov 2017, at 2:57 PM, Michael Wojcik
> <Michael.Wojcik@xxxxxxxxxxxxxx> wrote:
> 
> > DEFAULT includes ECC suites. You should try something like
> > DEFAULT:!ECDHE:!ECDH to eliminate the ECC Kx suites.
> 
> I just tried that - no change in behaviour, apart from the negotiation of a
> different cipher before the connection fails (0x9f).

OK. 9f is TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, so it's not an ECC issue after all. At least not with this client. It's not clear to me if you've gone back to the 1.0.1f client, or if you were still using 1.0.2m here.

> Does or did openssl server have any known bugs with respect to the length
> of a ClientHello packet being in excess of 255 bytes?

Someone else will have to answer this. As far as I know, it was only the F5 TLS implementation that had this issue.

-- 
Michael Wojcik 
Distinguished Engineer, Micro Focus 



-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users



[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux