On Fri, Jun 07, 2002 at 05:18:06PM +0200, Bodo Moeller wrote:
> On Wed, Jun 05, 2002 at 07:27:15PM -0400, Shekhar Mahadevan wrote:

>> I'm trying to connect to https://secure01.principal.com/ using OpenSSL.
>> Three other SSL toolkits (including JSSE) work OK, but OpenSSL results in
>> the server side socket closing with a premature EOF.
[...]

> This is a bug in the server, which apparently cannot handle
> length-zero SSL 3.0 fragments.  These are used in OpenSSL 0.9.6d as a
> workaround for a security problem in the SSL 3.0/TLS 1.0 protocol.  As
> a workaround, you can use RC4-based ciphers ('-cipher RC4' when using
> s_client).

Starting with the next snapshots, the '-bugs' option to s_client
should restore the previous behaviour (i.e. not prevent the security
problems found in the protocol) and thus ensure interoperability with
such broken servers.


-- 
Bodo Möller <[EMAIL PROTECTED]>
PGP http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller/0x36d2c658.html
* TU Darmstadt, Theoretische Informatik, Alexanderstr. 10, D-64283 Darmstadt
* Tel. +49-6151-16-6628, Fax +49-6151-16-6036
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to