I'm not really sure what to do or what exactly I am expecting using 
s_server but here are the results from my server.

]# openssl s_server -accept 4443 -www \
             -cert /usr/local/apache/conf/ssl.crt/www.cert.crt \
             -key /usr/local/apache/conf/ssl.key/www.cert.key \
             -state
             -debug
Using default temp DH parameters
ACCEPT

it waits for input, but no matter what I enter it just hangs.  I have 
looked through the man page but I haven't found an example of how this is 
used so I don't quite get it.  What should I look for?

 >>To date, I haven't found a machine that is afflicted with the problem 
that I can do this with :(

What's your URL?  I will look at your page and see if it works with my 
broken MSIE browser.


At 10:51 AM 1/18/02 -0700, you wrote:
>Run this command line and try to connect to it.
>openssl s_server -accept 4443 -www -cert pathtocert -key pathtokey -state
>
>1) Make sure to change "pathtocert" and "pathtokey" to the appropriate 
>values, and for additional debug info add -debug...
>2) Try to make sure you are using the same openssl that you compiled 
>apache with
>
>It simply creates a weblike version of SSL on port 4433 WITHOUT apache 
>that will print some debug info to the client.... feel free
>to "man s_server" to get info about the program
>
>At least this way, you will be able to find out if the problem is with 
>SSL, or if it with (mod_ssl+apache)
>
>PS... please let me know as I am confronted with the EXACT problem you 
>have, and have been for 3 years... even after a full Linux
>redhat upgrade to 7.2 (complete reformat, re-install)
>
>To date, I haven't found a machine that is afflicted with the problem that 
>I can do this with :(
>
>----- Original Message -----
>From: "Christopher Taranto" <[EMAIL PROTECTED]>
>To: <[EMAIL PROTECTED]>
>Sent: Thursday, January 17, 2002 11:10 PM
>Subject: RE: MSIE + "The page cannot be displayed" error
>
>
> > Hi,
> >
> > I have been trying to fix the known MSIE browser issues in my configuration
> > with some issues still occuring.
> >
> > I have read the FAQ, searched the archives, and implemented the solutions
> > that have been documented - but I am still getting the dreaded "The page
> > cannot be displayed" error when certain MSIE browsers attempt to connect to
> > my site.  I get the infamous log entry:
> >
> >    [Fri Jan 18 00:55:53 2002] [error] mod_ssl: SSL handshake interrupted by
> > system [Hint: Stop button pressed in browser?!] (System error   follows)
> >    [Fri Jan 18 00:55:53 2002] [error] System: Connection reset by peer
> > (errno: 104)
> >
> > Fortunately (for my sanity), I have one of non-working versions of the MSIE
> > browsers (5.00.2614.3500) on one of the machines in my office so I can
> > repeatedly create the errors.
> >
> > I am determined to squash this thing but I do not know where to go next.
> >
> > I have included the following information below:
> >
> >    * SYSTEM INFORMATION
> >    * CONFIGURATION INFORMATION
> >    * BROWSER VERSION INFORMATION
> >    * CERTIFICATE STATISTICS FROM THE BROWSER
> >
> > Any help or further direction would be greatly appreciated!
> >
> > Sincerely,
> >
> > Christopher Taranto
> >
> >
> > SYSTEM INFORMATION:
> > ===================
> >
> > I am running Red Hat 6.2 on a Pentinum III using:
> >
> >   * mod_ssl-2.8.5-1.3.22
> >   * openssl-0.9.6b
> >   * mm-1.1.3
> >
> >
> > CONFIGURATION INFORMATION:
> > ==========================
> >
> > <IfModule mod_ssl.c>
> >
> >          AddType application/x-x509-ca-cert .crt
> >          AddType application/x-pkcs7-crl    .crl
> >
> >          SSLPassPhraseDialog  builtin
> >
> >        # I have also tried dbm but there was no difference
> >        SSLSessionCache
> > shm:/usr/local/apache/logs/ssl_gcache_data(512000)
> >          SSLSessionCacheTimeout  300
> >
> >          SSLMutex  file:logs/ssl_mutex
> >
> >          SSLRandomSeed startup builtin
> >          SSLRandomSeed connect builtin
> >
> >          SSLLog      logs/ssl_engine_log
> >          SSLLogLevel info
> >
> > </IfModule>
> >
> > <VirtualHost>
> >
> >    <snip>
> >
> >    SSLCipherSuite ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP
> >
> >    BrowserMatch "MSIE [1-4]" nokeepalive \
> >                              ssl-unclean-shutdown \
> >                              downgrade-1.0 \
> >                              force-response-1.0
> >
> >    BrowserMatch "MSIE [5-9]" ssl-unclean-shutdown
> >
> >    BrowserMatch "Mozilla/4..*PC)" nokeepalive \
> >                                   downgrade-1.0 \
> >                                   force-response-1.0
> >
> >    </snip>
> >
> > </VirtualHost>
> >
> >
> > BROWSER VERSION INFORMATION
> > ===================================
> >
> > MSIE 5.00.2614.3500
> > Cipher Strength: 40-bit
> >
> >
> > CERTIFICATE STATS FROM THE BROWSER
> > ===================================
> >
> > My certificate was generated using 1024 bits.
> >
> > Version: V3
> > Serial Number: 5A55 3FAD EB43 6649 7F8B 39BB 1D33 6DE1
> > Signature Algorithm: md5RSA
> > Public Key: 3081 8902 8181 00BD D63A 500D 0FE0 CCA2 E7BB 804B 53DA E4CE
> > 9F51 3D54 93A3 5D2E FC0E E3E2 7046 1EFF 6826 BB30 B8DC 4903 9A32 345F E769
> > 31D7 D313 6ECD 62BD 2CBE C070 AFD5 C1C8 9920 7442 5E44 2AED 7878 A566 DD3A
> > 3445 0612 919A 0B74 2F6A E806 080F C7E7 9C68 7FAC 51D3 4EA9 0BC3 ABAF 27D2
> > 2C95 0A09 CD12 61B3 4DF2 0A88 1379 7552 5B1C D4CE 9F02 0301 0001
> > Basic Constraints:  Subject Type=End Entity
> > Path Length Constraint=None
> > Key Usage:  Digital Signature, Key Encipherment(A0)
> >
> > [1]CRL Distribution Point
> >       Distribution Point Name:
> >            Full Name:
> >                 URL=http://crl.verisign.com/RSASecureServer.crl
> >
> > [1]Certificate Policy:
> >       PolicyIdentifier=2.16.840.1.113733.1.7.1.1
> >       [1,1]Policy Qualifier Info:
> >            Policy Qualifier Id=1.3.6.1.5.5.7.2.1
> >            Qualifier=161C 6874 7470 733A 2F2F 7777 772E 7665 7269 7369 676E
> > 2E63 6F6D 2F43 5053
> >       [1,2]Policy Qualifier Info:
> >            Policy Qualifier Id=1.3.6.1.5.5.7.2.2
> >            Qualifier=3056 3015 160E 5665 7269 5369 676E 2C20 496E 632E 3003
> > 0201 011A 3D56 6572 6953 6967 6E27 7320 4350 5320 696E 636F 7270 2E20 6279
> > 2072 6566 6572 656E 6365 206C 6961 622E 206C 7464 2E20 2863 2939 3720 5665
> > 7269 5369 676E
> >
> > Server Authentication(1.3.6.1.5.5.7.3.1)
> > Client Authentication(1.3.6.1.5.5.7.3.2)
> >
> > 2.16.840.1.113733.1.6.15:
> > 16 09 39 32 36 30 32 32   ..926022
> > 34 32 37                  427
> >
> > Authority Information Access:  [1]Authority Info Access
> >       AccessMethod=On-line Certificate Status Protocol(1.3.6.1.5.5.7.48.1)
> >       Alternative Name:
> >            URL=http://ocsp.verisign.com
> >
> > Thumbprint Algorithm:  sha1
> > Thumbprint: CC1C DD7D BE05 C813 F119 813B 86E6 5717 5583 F981
> >
> >
> >
> >
> >
> >
> >
> > ______________________________________________________________________
> > Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
> > User Support Mailing List                      [EMAIL PROTECTED]
> > Automated List Manager                            [EMAIL PROTECTED]
>
>______________________________________________________________________
>Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
>User Support Mailing List                      [EMAIL PROTECTED]
>Automated List Manager                            [EMAIL PROTECTED]

______________________________________________________________________
Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
User Support Mailing List                      [EMAIL PROTECTED]
Automated List Manager                            [EMAIL PROTECTED]

Reply via email to