Your message dated Tue, 26 Jul 2016 21:20:31 +0200
with message-id <[email protected]>
and subject line Re: [Pkg-openssl-devel] Bug#706423: Bug#706423: Bug#706423: 
openssl: error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version 
number:s3_pkt.c:337:
has caused the Debian Bug report #706423,
regarding openssl: error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version 
number:s3_pkt.c:337:
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
706423: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=706423
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: openssl
Version: 1.0.1e-2
Severity: normal

With version 1.0.e-2, EHLO handshake fails and connections are deferred:

Apr 29 22:41:56 mx3210 postfix/smtp[29733]: Trusted TLS connection established 
to smtphm.sympatico.ca[65.55.172.251]:25: TLSv1 with cipher DES-CBC3-SHA 
(168/168 bits)
Apr 29 22:41:56 mx3210 postfix/smtp[29733]: warning: TLS library problem: 
29733:error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version 
number:s3_pkt.c:337:
Apr 29 22:41:56 mx3210 postfix/smtp[29733]: 0003A5F7F6: 
to=<[email protected]>, orig_to=<root>, 
relay=smtphm.sympatico.ca[65.55.172.251]:25, delay=13914, del
ays=13898/0.38/15/0, dsn=4.4.2, status=deferred (lost connection with 
smtphm.sympatico.ca[65.55.172.251] while performing the EHLO handshake)

Version 1.0.0g-1 works:
Apr 29 23:26:55 mx3210 postfix/smtp[11360]: Trusted TLS connection established 
to smtphm.sympatico.ca[65.55.172.251]:25: TLSv1 with cipher RC4-MD5 (128/128 
bits)
Apr 29 23:26:58 mx3210 postfix/smtp[11360]: 5B1EF5F806: 
to=<[email protected]>, relay=smtphm.sympatico.ca[65.55.172.251]:25, 
delay=623, delays=605/0.26/16/1.4, dsn=2.6.0, status=sent (250 2.6.0  
<[email protected]> Queued mail for delivery)


-- System Information:
Debian Release: 7.0
  APT prefers unreleased
  APT policy: (500, 'unreleased'), (500, 'unstable')
Architecture: hppa (parisc64)

Kernel: Linux 3.9.0-rc8+ (SMP w/4 CPU cores)
Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages openssl depends on:
ii  libc6        2.13-38
ii  libssl1.0.0  1.0.0g-1
ii  zlib1g       1:1.2.7.dfsg-13

openssl recommends no packages.

Versions of packages openssl suggests:
ii  ca-certificates  20130119

-- no debconf information

--- End Message ---
--- Begin Message ---
On 2013-11-10 00:28:37 [+0100], Kurt Roeckx wrote:
> So I just found this:
> http://www.ietf.org/mail-archive/web/tls/current/msg10471.html

closing because this is MSFT TLS shortcoming and not an openssl bug.

> Kurt

Sebastian

--- End Message ---

Reply via email to