George Richman wrote:
> 
> Support,
> 
> Does Crypt::SSLeay support 128 bit encrypted sites??
> 
> When I use lwp-request https://login.zeborg.com , it does not connect
> properly.  I get a:
> ...
> Then when I try it against a lower bit encrypted site (56bit), it actually
> works:
> 
> lwp-request https://laborla.zeborg.com/
> 
> I am using Solaris 2.7 and openssl .96b.
> 

My version of Crypt::SSLeay, v.31, seems to work, see below, 
note that .31 is a dev version, but nothing about connections
changed in it, only build & debugging config stuff.  .29 was 
the last release to CPAN and should work the same, so I'd
guess its openssl 0.9.6b that's the problem.  You could 
try a downgrade to 0.9.6a, and see how it goes.

--Josh

WinNT perl5.004_04 works fine, same as below
#define OPENSSL_VERSION_TEXT    "OpenSSL 0.9.6a 5 Apr 2001"

Linux perl5.005xx works fine [ see below ]
#define OPENSSL_VERSION_TEXT    "OpenSSL 0.9.6a 5 Apr 2001"

# lwp-request -ed https://login.zeborg.com
Cache-Control: no-store
Connection: Close
Pragma: no-cache
Server: WebLogic 5.1.0 Service Pack 8 12/20/2000 16:34:54 #95137
Content-Length: 3797
Content-Type: text/html
Expires: 1
Client-Date: Thu, 13 Sep 2001 07:10:35 GMT
Client-Peer: 209.10.152.150:443
Client-SSL-Cert-Issuer: /O=VeriSign Trust Network/OU=VeriSign, Inc./OU=VeriSign 
International Server CA - Class 3/OU=www.verisign.com/CPS Incorp.by
Ref. LIABILITY LTD.(c)97 VeriSign
Client-SSL-Cert-Subject: /C=US/ST=New York/L=New 
York/O=Zeborg/OU=Globix/CN=login.zeborg.com
Client-SSL-Cipher: RC4-SHA
Client-SSL-Warning: Peer certificate not verified
Set-Cookie: 
SSOTengahSession=O6BcHo7TTTFGTM6VKA2SdX568dvuw1zNuuLbwDFXDPSDteEvXWGo|6808024995186924964/-1062726649/6/3530/3530/3535/3535/3530/-1;
path=/
Title: Zeborg Login
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to