First off, both server names appear to point to the same IP address,
meaning it's a case of a single dodgy server.

I'm pretty sure this is a case of the server ignoring the minor protocol
version number sent by the openssl client (3.1 = TLSv1), and simply
responding as if the client had requested straight SSLv3 (3.0), which
results in the "bad mac" error on the client side.

Disabling TLSv1 on the client "works", but this is quite a drastic
solution as:

a) it's the server that's broken, and
b) TLSv1 should always be your preferred protocol anyway.

Might I recommend having your application code catch this error and then
attempt a second connection without TLS? I think this is the way MSIE
does it, even though they still apparently ship with TLSv1 disabled.

//oscar

Fabrice Mougin wrote:
> 
>  Hello,
> 
>  I noticed some  trouble connecting some  domains with  the v23 method
>  (meth=SSLv23_client_method()).   When   I use the   v3   or v2 method
>  directly, it works fine.
> 
>  I use the openssl-0.9.6b version. The concerned domains are :
> 
>  www.cofinoga.fr
>  souscription.mediatis.fr
> 
>  Thanks,
> 
>  Fabrice.
> 
> --
>           Fabrice Mougin - Witbe.net The Net screener
>                  Work  email:  [EMAIL PROTECTED]
>                    Phone: +331 42 91 5000
>                      When  there is  no
>                       solution,   there
>                         is no pbs ...
> 
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> Development Mailing List                       [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to