Re: Why can't I force a specific cipher with the openssl app with TLS 1.3?

2019-11-15 Thread Viktor Dukhovni
> On Nov 15, 2019, at 4:25 AM, Matt Caswell wrote: > > It might be nice if we added a new option "-pskmd" or similar which > enabled you to specify the md from the command line without having to > have a session file first. However that isn't currently possible. With a saved session there may

Re: Why can't I force a specific cipher with the openssl app with TLS 1.3?

2019-11-15 Thread Matt Caswell
On 14/11/2019 22:30, Phil Neumiller wrote: > Hi Matt, > > That works fine for 256 as you mentioned. I trying to speak to a piece of > hardware that has one supported cipher, i.e. TLS_AES_256_GCM_SHA384. I > tried the naive approach of > > PSK=63ef2024b1 > openssl s_server -accept 4433

Re: Why can't I force a specific cipher with the openssl app with TLS 1.3?

2019-11-14 Thread Phil Neumiller
Hi Matt, That works fine for 256 as you mentioned. I trying to speak to a piece of hardware that has one supported cipher, i.e. TLS_AES_256_GCM_SHA384. I tried the naive approach of PSK=63ef2024b1 openssl s_server -accept 4433 -tls1_3 -nocert -psk $PSK -sigalgs RSA+SHA384 -ciphersuites

Re: Why can't I force a specific cipher with the openssl app with TLS 1.3?

2019-11-14 Thread Matt Caswell
On 14/11/2019 17:46, Phil Neumiller wrote: > Here is my server script is: > > PSK=63ef2024b1 > openssl s_server -accept 4433 -tls1_3 -nocert -psk $PSK -ciphersuites > TLS_AES_256_GCM_SHA384 > > Here is the client: > > PSK=63ef2024b1 > openssl s_client -tls1_3 -psk $PSK -connect :4433

Why can't I force a specific cipher with the openssl app with TLS 1.3?

2019-11-14 Thread Phil Neumiller
Here is my server script is: PSK=63ef2024b1 openssl s_server -accept 4433 -tls1_3 -nocert -psk $PSK -ciphersuites TLS_AES_256_GCM_SHA384 Here is the client: PSK=63ef2024b1 openssl s_client -tls1_3 -psk $PSK -connect :4433 -ciphersuites TLS_AES_256_GCM_SHA384 And here is the error: Using