Re: [users@httpd] TLS 1.2 handshake problem?

2012-06-13 Thread aparna Puram
[mailto:cove...@gmail.com] Sent: Tuesday, June 12, 2012 12:53 PM To: users@httpd.apache.org Subject: Re: [users@httpd] TLS 1.2 handshake problem? Extension: SessionTicket TLS Type: SessionTicket TLS (0x0023) Length: 0 Data (0 bytes) I've

[users@httpd] TLS 1.2 handshake problem?

2012-06-12 Thread Garrison, Jim (ETW)
I am trying unsuccessfully to get Subversion to connect over HTTPS to an Apache server that is configured with SSLProtocol -ALL +SSLv3 +TLSv1 SSLCipherSuite ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM The behavior I'm seeing is that the client sends the initial CLIENT HELLO, and

Re: [users@httpd] TLS 1.2 handshake problem?

2012-06-12 Thread aparna Puram
Hi, Sometimes from the huge list of supported cipher suites, It will be hard for us to select the exact cipher. If you are working on solaris, You can use the following command to check the exact cipher and protocol being used by the client. /opt/csw/bin/openssl s_client -connect

RE: [users@httpd] TLS 1.2 handshake problem?

2012-06-12 Thread Garrison, Jim (ETW)
The problem appears to be the TLSv1.2 handshake. Here are the cases: * openssl s_client -connect gbit:443 This sends a TLSv1.2 handshake inside a TLSv1.0 CLIENT HELLO, and Apache fails to respond. * openssl s_client -connect gbit:443 -tls1 This sends a TLSV1.0 handshake inside a TLSV1.0

Re: [users@httpd] TLS 1.2 handshake problem?

2012-06-12 Thread aparna Puram
What is the version of openssl being used? On Wed, Jun 13, 2012 at 12:29 AM, Garrison, Jim (ETW) jim.garri...@nike.com wrote: The problem appears to be the TLSv1.2 handshake. Here are the cases: * openssl s_client -connect gbit:443 This sends a TLSv1.2 handshake inside a TLSv1.0 CLIENT

Re: [users@httpd] TLS 1.2 handshake problem?

2012-06-12 Thread Eric Covener
Extension: SessionTicket TLS Type: SessionTicket TLS (0x0023) Length: 0 Data (0 bytes) I've seen this cause trouble on java-based servers, since it is the first extension that's 0 byte and servers can over-read and block. In openssl s_client, you can