Replicated same behavior with s_client.


Attached is a zip with all of the relevant data

- openssl.log - log file showing cli output using s_client in both the failure 
and successful cases

- http_calist.pem (trusted ca) and ssl.pem (cert + key for client)

- tmscert.pem tmskey-nopass.pem (server key/cert)

- associated packet captures



This is with a snapshot from early 1.0.1 openssl (Nov).  I would like to run 
with a newer build, but I need to rely on the platform being updated by some 
others first.



-Steve



-----Original Message-----

From: Stephen Henson via RT [mailto:r...@openssl.org] 

Sent: Sunday, February 05, 2012 3:52 PM

To: Steve Kapinos (stkapino)

Cc: openssl-dev@openssl.org

Subject: [openssl.org #2702] TLS bad_mac_record with IIS 7 and client 
authentication 



> [stkap...@cisco.com - Sun Feb 05 17:33:28 2012]:

> 

> Hi Stephen I will try to test with the client and get back to you.

> This is in an internal lab so it is not reachable. I can provide

> packet sniff along with the certs /keys if that would be useful?

> 



Yes. Also please try it with the -no_tls1_2 option and both -no_tls1_2

and -no_tls1_1 to see if that helps. The output with -state too would be

useful on a failing connection.



Steve.

-- 

Dr Stephen N. Henson. OpenSSL project core developer.

Commercial tech support now available see: http://www.openssl.org



______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to