Yes, strange isn't it ?
I guess it doesn't matter for 99% of the SSL clients, but for what I'm doing
(a SSL scanner) it's kind of annoying.
Well it's probably not going to change anytime soon, but now I want to know
what's going on.

Alban


2011/6/21 Victor Duchovni <victor.ducho...@morganstanley.com>

> On Tue, Jun 21, 2011 at 05:43:57AM -0500, Michael S. Zick wrote:
>
> > > I've encountered a strange issue. It might not be related to OpenSSL
> itself,
> > > but maybe it is.
> > >
> > > When sending a Client Hello message that's larger than 270 bytes (not
> sure
> > > what the exact limit is, 255 maybe?), lots of servers on the internet
> don't
> > > send back any Server Hello, but keep the connection open, so my client
> ends
> > > up returning a timeout.
> > > It's really weird, has anyone seen that behavior ?
> > > You can get to a 275 byte client hello for example by using OpenSSL
> 1.0.0.d
> > > with a TLS1 hello, all the cipher suites explicitly enabled
> > > 'ALL:NULL:@STRENGTH', and a non empty session ID field.
> > >
> >
> > Is that session ID still valid on the server when this happens?
> > Is it a session ID that the server issued to your client?
>
> I can reproduce this problem, perhaps it is an issue with the load
> balancers that terminate TLS at many large-scale HTTPS-enabled sites.
>
> For facebook, try:
>
>    $ openssl s_client -msg -cipher 'ALL:NULL:@STRENGTH' -tls1 -reconnect
> -connect 69.171.224.40:443
>
> The above hangs on the reconnect client hello, while:
>
>    $ openssl s_client -msg -cipher 'RC4-MD5:NULL:@STRENGTH' -tls1
> -reconnect -connect 69.171.224.40:443
>
> yields:
>
> Reused, TLSv1/SSLv3, Cipher is RC4-MD5
> Secure Renegotiation IS NOT supported
> Compression: NONE
> Expansion: NONE
> SSL-Session:
>    Protocol  : TLSv1
>    Cipher    : RC4-MD5
>    Session-ID:
> 197E266EAC6CDD1CA9BAFD0AFB6EDB9CB63407EC1046131A59F33766BF3BB5E9
>    Session-ID-ctx:
>    Master-Key: ...
>    Key-Arg   : None
>    PSK identity: None
>    PSK identity hint: None
>    Start Time: 1308667111
>    Timeout   : 7200 (sec)
>    Verify return code: 20 (unable to get local issuer certificate)
>
> So session re-use works, but not when the hello is:
>
> >>> TLS 1.0 Handshake [length 0118], ClientHello
>    01 00 01 14 03 01 4e 00 ad 60 11 e7 93 d1 b3 46
>    8f be 77 1d 68 c5 dd c0 d2 94 60 f5 32 b3 e5 ee
>    68 a6 e4 c5 0a da 20 19 7e 26 6e ac 6c a4 43 a9
>    ba fd 0a fb 6e dd 9d da dd af f4 4c d9 d5 56 59
>    f3 37 66 bf 3b b4 70 00 86 c0 14 c0 0a 00 39 00
>    38 00 88 00 87 c0 19 00 3a 00 89 c0 0f c0 05 00
>    35 00 84 c0 12 c0 08 00 16 00 13 c0 17 00 1b c0
>    0d c0 03 00 0a c0 13 c0 09 00 33 00 32 00 9a 00
>    99 00 45 00 44 c0 18 00 34 00 9b 00 46 c0 0e c0
>    04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 16 00
>    18 c0 0c c0 02 00 05 00 04 00 15 00 12 00 1a 00
>    09 00 14 00 11 00 19 00 08 00 06 00 17 00 03 c0
>    10 c0 06 c0 15 c0 0b c0 01 00 02 00 01 00 ff 02
>    01 00 00 44 00 0b 00 04 03 00 01 02 00 0a 00 34
>    00 32 00 01 00 02 00 03 00 04 00 05 00 06 00 07
>    00 08 00 09 00 0a 00 0b 00 0c 00 0d 00 0e 00 0f
>    00 10 00 11 00 12 00 13 00 14 00 15 00 16 00 17
>    00 18 00 19 00 23 00 00
>
> as with 'ALL:NULL:@STRENGTH'.
>
> --
>        Viktor.
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
>

Reply via email to