TLSEXT_TYPE_application_layer_protocol_negotiation was defined in
RFC7301 for which the IANA assigned #16
A non-IANA definition of TLSEXT_TYPE_next_proto_neg = 13172 is used.
The openssl tls code for #ifndef OPENSSL_NO_NEXTPROTONEG all used the
non-iana definition.
This patch corrects openssl to
sorry this should of been part of #2888.
I've rechecked tls1, tls1_1 and tls1_2 on cvs HEAD (today) and they all work
after verifing the order of messages.
apps/openssl s_client -connect nginxtest.openquery.com:4433 -sess_out
/tmp/ss.test -msg -tls1_2; sleep 15; apps/openssl s_client -connect
yep that works.
- Original Message -
From: "Stephen Henson via RT"
To: "daniel black"
Cc: openssl-dev@openssl.org
Sent: Tuesday, 11 December, 2012 3:49:10 AM
Subject: [openssl.org #2888] rfc5077 violation client side causing client
issued tls alert fatal unexpe
looks like this has been implemented and can be closed
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
correct. the current implementation does exactly this.
this ticket can be closed.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
the correct fix is to use EHLO which is what the current implementation does.
can close this.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@
h 0002], warning close_notify
01 00
with tls1.0 I get the following
>>> TLS 1.0 Alert [length 0002], fatal unexpected_message
02 0a
139777944635232:error:1408E0F4:SSL routines:SSL3_GET_MESSAGE:unexpected
message:s3_both.c:460:
--
Daniel Black
_
The last bit of documentation I wrote was really bad. Sorry.
Attached is an improvement now that I've actually used it correctly
(trac.nginx.org/nginx/ticket/120)
Hope this is satisfactory.
--
Daniel Black
SSL_CTX_set_tlsext_ticket_key_cb.pod
Description: Binary data
> RFC5077 3.4 paragraph two
correction rfc5077 3.3 paragraph 2
I've also setup a server for testing:
https://nginxtest.openquery.com/
--
Daniel Black
__
OpenSSL Project http://www.ope
CE883 aes_key 35ED38E8593C0B5EE55E4C76DC8550B2
hmac_key 6188D8DAD889ED43AC1820E9D9897E35
2012/09/30 12:28:20 [debug] 14977#0: *20 SSL handshake handler: 0
2012/09/30 12:28:20 [info] 14977#0: *20 SSL_do_handshake() failed (SSL:
error:1408E0F4:SSL
This adds a few message output bits based on IANA TLS registries.
diff --git a/apps/s_cb.c b/apps/s_cb.c
index 2cd7337..833588a 100644
--- a/apps/s_cb.c
+++ b/apps/s_cb.c
@@ -439,6 +439,9 @@ void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *
version == DTLS1_V
hin in the declaration for clarity.
--
Daniel Black, Engineer @ Open Query (http://openquery.com)
Remote expertise & maintenance for MySQL/MariaDB server environments.
SSL_CTX_set_tlsext_ticket_key_cb.pod
Description: Binary data
The check for SSL_OP_NO_TICKET is performed as the first line of code in the
function tls1_process_ticket so there's no need to check it later in the same
function. Attached patch removes the second check.
Index: ./ssl/t1_lib.c
===
R
-crl_check / -crl_check_all don't do anything.
Other status options added to help
verify_return_error needs something better but I can't quite explain it. Some
documentation for it is in the CHANGELOG
Cheers,
Daniel
Index: apps/s_server.c
=
The cert passed to the ocsp app contains ocsp_uri so we can use that if not
specified.
We also can use the CApath to look up a issuer certificate if not specified.
hence a simple line works:
$ openssl ocsp -no_cert_verify -nonce -CApath /etc/ssl/certs/ -cert cert.pem
Response verify OK
cert.p
When I try to get the OCSP url out of a certificate I am presented with the
ironical response:
$ openssl x509 -in cert.pem -ocspurl -nout
unknown option -ocspurl
usage: x509 args
the irony:
$ openssl x509 -in cert.pem -ocspurl -nout
unknown option -ocspurl
usage: x509 args
...
-ocspurl- print OCSP Responder URL(s)
The working bit:
$ openssl x50
On Sat, 31 May 2008 07:13:32 pm Hanno Böck wrote:
> This patch adds some dependencies to the Makefile targets to allow parallel
> make to succeed. Please apply.
>
> (Patch is taken from Gentoo Linux)
as attached?
--
Daniel Black
--
Proudly a Gentoo Linux User.
Gnu-PG/PGP signed a
On Sat, 31 May 2008 07:13:32 pm Hanno Böck wrote:
> This patch adds some dependencies to the Makefile targets to allow parallel
> make to succeed. Please apply.
>
> (Patch is taken from Gentoo Linux)
as attached?
--
Daniel Black
--
Proudly a Gentoo Linux User.
Gnu-PG/PGP signed a
ood side there are no documented un implemented features
fgrep 'BIO_printf(bio_err," -' s_server.c | cut -f 2 -d ' ' |
xargs -n1 -t -I{} fgrep -- {}\" s_server.c
s_client is missing doco for:
-crl_check
-crl_check_all
-verify_return_error
-prexit
-timeout
-no_comp
ot
}
appoligies for the dup on openssl-dev@ - only just found the rt.
--
Daniel Black
--
Proudly a Gentoo Linux User.
Gnu-PG/PGP signed and encrypted email preferred
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x76677097
GPG Signature D934 5397 A84A 6366 9687 9EB2 861A 4ABA
vflags |= X509_V_FLAG_CRL_CHECK;
}
else if (strcmp(*argv,"-crl_check") == 0)
{
vflags |= X509_V_FLAG_CRL_CHECK|
X509_V_FLAG_CRL_CHECK_ALL;
}
--
Daniel Black
--
Proudly
22 matches
Mail list logo