Hi Marek,
                      I request you to please have mercy on me. I have to 
communicate to SSL v3 Server using SSL v3 Client Hello Message. The following 
is my client hello message:

<snip>

         "\x01"
         "\x03\x01"              /* SSL Version */
          "\x40\x7b\xab\xc0"      /* GMT */
         "\x32\x41\x52\xd3\x46\x63\xea\x22"
         "\x37\x22\x33\x70\x2e\xfe\x80\x08"
         "\xeb\x82\xe9\xcd\xba\x97\x84\xbd"
         "\xd4\x8a\x9d\xe2"      /* Random Value */
         "\x00\x18"              /* cipher specs length */
         "\x00\x00"              /* Session ID Length */
         "\x00\x00\x33\x00\x00\x32\x00\x00"      /* cipher specs data */
         "\x35\x01\x00\x80\x08\x00\x80\x06"
         "\x00\x40\x04\x00\x80\x02\x00\x80"
         "\x02\x01\x00"              /* Compression Method */

</snip>

I am somehow not getting GMT and random value details in ethereal. Is the above 
stuff the right SSL v3 Client Hello?

Please help me out as i have to finish my project tomorrow morning!

Thanks and Regards,
Suchindra Chandrahas

Marek Marcola <[EMAIL PROTECTED]> wrote: Hello,
>                I am using the following client hello message format for an 
> SSL V3 Server:
> 
> 
> 
> unsigned char buf[BUFSIZE] =
>                 "\x01"                  /* client hello msg */
> 
>                 "\x03\x00"              /* client version */
>                 "\x00\x18"              /* cipher specs length */
>                 "\x00\x00"              /* session id length */
>                 "\x00\x10"              /* challenge length */
> 
>                 "\x07\x00\xc0\x05\x00\x80\x03\x00"      /* cipher specs data 
> */
>                 "\x80\x01\x00\x80\x08\x00\x80\x06"
>                 "\x00\x40\x04\x00\x80\x02\x00\x80"
> 
>                 "";                                                     /* 
> session id data */
> 
> 
> 
> 
> The message i am getting at server end is:
> 
> 
> 
> error:1408A0B6:SSL routines:SSL3_GET_CLIENT_HELLO:no ciphers passed
This looks like SSL2 client_hello.
For that to work you must add SSL2 record header, in this case
two bytes {0x80, len} where len in length of handshake data.
You cannot use here SSL3/TLS1 record header.
And if you specified 16 bytes of chalenge/random data, you must add this
data to packet too.

Best regards,
-- 
Marek Marcola 

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]


       
---------------------------------
Choose the right car based on your needs.  Check out Yahoo! Autos new Car 
Finder tool.

Reply via email to