Re: Multiple reconnection in OpenSSL 1.1.0

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




Huy-Cong VU
Platform hardware member
Network administrator
Wandercraft
09 72 58 77 03

----- Mail original -----
> De: "Matt Caswell" <matt@xxxxxxxxxxx>
> À: "openssl-users" <openssl-users@xxxxxxxxxxx>
> Envoyé: Mardi 16 Janvier 2018 16:17:47
> Objet: Re:  Multiple reconnection in OpenSSL 1.1.0

> On 16/01/18 15:15, Huy Cong Vu wrote:
>>> - A wireshark trace of the communication between the two endpoints might
>>> be helpful to figure out what is going wrong
>> 
>> ERR_print_errors_fp() before call of SSL_read returns nothing, which should be a
>> good new...
>> By browsing Wireshark, I jump into a suspect packet from client that contains a
>> RST flags after 1st connection:
>> 797	61.057009	192.168.1.4	192.168.1.121	TCP	54	63862 → 8042 [RST, ACK] Seq=3969
>> Ack=4619 Win=0 Len=0
>> 
>> Does this help?
> 
> Please can you attach the actual trace? Or send it direct to me if it is
> large.

Here is any traffic transfer between my clients and server from the beginning to the 1st failed SSL_read():
https://pastebin.com/raw/Bjixearh

IP src: 192.168.1.4
IP dest: 192.168.1.121

I'm not sure the version I pasted have enough informations, if you want more, please show me how to do it in Wireshark.

Thanks a lot 

> 
> Thanks
> 
> Matt
> --
> openssl-users mailing list
> To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux