On 21/02/18 21:38, Michael Richardson wrote: > > I'm capturing from my DTLS client and server, with CoAP running on top. > I've been debugging some ruby-level I/O buffering issues. > I noticed this while capturing, and used tshark to get this print out. > (I've added columns for port numbers) > > 2 66.009171 ::2 35345 ::2 5684 DTLSv1.0 263 Client Hello > 3 66.009494 ::2 5684 ::2 35345 DTLSv1.0 122 Hello Verify Request > 4 66.009798 ::2 35345 ::2 5684 DTLSv1.0 295 Client Hello > 5 66.011771 ::2 5684 ::2 35345 DTLSv1.2 810 Server Hello, Certificate, Server Key Exchange[Malformed Packet] The Server Hello Done seems to be missing from this sequence. Perhaps dropped somewhere en-route? > > 6 67.037421 ::2 5684 ::2 35345 DTLSv1.2 148 Server Hello > 7 67.037453 ::2 5684 ::2 35345 DTLSv1.2 562 Certificate > 8 67.037468 ::2 5684 ::2 35345 DTLSv1.2 199 Server Key Exchange[Malformed Packet] The client is waiting for the Server Hello Done to arrive which seems to have been dropped. Meanwhile the server is waiting for the client's response to the flight of messages it just sent. After a timeout the server retransmits its last flight (note the sudden increment in time between the previous Server Key Exchange, and the second Server Hello). > > And then things proceed, apparently just fine. > > 9 67.037482 ::2 5684 ::2 35345 DTLSv1.2 87 Server Hello Done > This time the Server Hello Done has arrived. > 10 67.037518 ::2 35345 ::2 5684 DTLSv1.0 295 Client Hello This appears to be a retransmit on the client side. Probably the server retransmit and the client retransmit crossed. > 11 67.041860 ::2 35345 ::2 5684 DTLSv1.2 195 Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message Now the client has received the Server Hello Done it was waiting for and the handshake can proceed. Matt -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users