Huy-Cong VU Platform hardware member Network administrator Wandercraft 09 72 58 77 03 ----- Mail original ----- > De: "Matt Caswell" <matt@xxxxxxxxxxx> > À: "openssl-users" <openssl-users@xxxxxxxxxxx> > Envoyé: Mardi 16 Janvier 2018 16:17:47 > Objet: Re: Multiple reconnection in OpenSSL 1.1.0 > On 16/01/18 15:15, Huy Cong Vu wrote: >>> - A wireshark trace of the communication between the two endpoints might >>> be helpful to figure out what is going wrong >> >> ERR_print_errors_fp() before call of SSL_read returns nothing, which should be a >> good new... >> By browsing Wireshark, I jump into a suspect packet from client that contains a >> RST flags after 1st connection: >> 797 61.057009 192.168.1.4 192.168.1.121 TCP 54 63862 → 8042 [RST, ACK] Seq=3969 >> Ack=4619 Win=0 Len=0 >> >> Does this help? > > Please can you attach the actual trace? Or send it direct to me if it is > large. Here is any traffic transfer between my clients and server from the beginning to the 1st failed SSL_read(): https://pastebin.com/raw/Bjixearh IP src: 192.168.1.4 IP dest: 192.168.1.121 I'm not sure the version I pasted have enough informations, if you want more, please show me how to do it in Wireshark. Thanks a lot > > Thanks > > Matt > -- > openssl-users mailing list > To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users