On Sat, Mar 21, 2015 at 08:00:55PM -0400, Wietse Venema wrote:
>
> /usr/local/bin/openssl s_client -no_ssl2 -cipher aNULL -connect localhost:25
> -starttls smtp
> WARNING: can't open config file: /usr/local/openssl/openssl.cnf
> CONNECTED(00000003)
> 34381555576:error:140790E5:SSL routines:SSL23_WRITE:ssl handshake
> failure:s23_lib.c:184:
Actually, I think you *are* reproducing the problem. See the line
above! The server aborts late in the handshake which does not
complete, but the client outputs the detail below.
> New, TLSv1/SSLv3, Cipher is AECDH-AES256-SHA
> Secure Renegotiation IS supported
> Compression: zlib compression
> Expansion: NONE
> SSL-Session:
> Protocol : TLSv1.2
> Cipher : AECDH-AES256-SHA
> Session-ID:
> Session-ID-ctx:
> Master-Key:
> 7AFFF449AB83D64206D1F5855CAD2FA21A2F96CFFE485C2B0F61351676D1FF7B9AF061D0FBC4D4241BEBDE39EB505EA0
> Key-Arg : None
> PSK identity: None
> PSK identity hint: None
> SRP username: None
> Compression: 1 (zlib compression)
> Start Time: 1426982287
> Timeout : 300 (sec)
> Verify return code: 0 (ok)
> ---
If you got your prompt back after this, the connection broke (which
is what I get below). In particular:
34381530680:error:140790E5:SSL routines:SSL23_WRITE:ssl handshake
failure:s23_lib.c:177:
You should likely see segfaults from the server in the logs...
--
Viktor.
# /usr/local/bin/openssl s_client -starttls smtp -no_ssl2 -cipher aNULL -msg
-tlsextdebug -connect 127.0.0.1:2525
WARNING: can't open config file: /usr/local/openssl/openssl.cnf
CONNECTED(00000003)
>>> TLS 1.2 Handshake [length 00c3], ClientHello
<<< TLS 1.2 Handshake [length 0056], ServerHello
TLS server extension "renegotiation info" (id=65281), len=1
TLS server extension "heartbeat" (id=15), len=1
<<< TLS 1.2 Handshake [length 010b], ServerKeyExchange
<<< TLS 1.2 Handshake [length 0004], ServerHelloDone
>>> TLS 1.2 Handshake [length 0086], ClientKeyExchange
>>> TLS 1.2 ChangeCipherSpec [length 0001]
>>> TLS 1.2 Handshake [length 0010], Finished
34381530680:error:140790E5:SSL routines:SSL23_WRITE:ssl handshake
failure:s23_lib.c:177:
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 587 bytes and written 199 bytes
---
New, TLSv1/SSLv3, Cipher is ADH-AES256-GCM-SHA384
Secure Renegotiation IS supported
Compression: zlib compression
Expansion: NONE
SSL-Session:
Protocol : TLSv1.2
Cipher : ADH-AES256-GCM-SHA384
Session-ID: 84D7CFE809814B40CA7AE25F94D3EDC1C2E3EB32805A69C8A128E0D0CA7A7055
Session-ID-ctx:
Master-Key:
EC89F8BDA7208972AD7D71D144EDBA9F365E207DA1DEFB829EC8EBCF29448D44F7A20B94AC73D74B1418E0075B2BC19D
Key-Arg : None
PSK identity: None
PSK identity hint: None
SRP username: None
Compression: 1 (zlib compression)
Start Time: 1426983439
Timeout : 300 (sec)
Verify return code: 0 (ok)
---