> Did you try the sample application?

I took a quick look at the code to figure out SslHandshakeRespMsg.

> It shows how to restrict which SSL/TLS versions are used, and how errors
> are
> reported.  There were a lot of SSL changes over the last six months to
> support the
> latest protocols.

When I connect to my own server, it works with this:
SSL Connected OK with TLSv1.2, cipher DHE-RSA-AES256-GCM-SHA384, key exchange
DH, encryption AESGCM(256), message authentication AEAD

So I would assume it's using TLSv1.2, so why won't it connect with that for
https://developer.mozilla.org/en-US/docs/Web/HTML/Element/address? Perhaps I
need to disable SSLv3 for that site? I am not "SSL" expert but I wonder why it
can't connect using TLSv1.2 even if SSLv3 is also enabled.

I'm curious... perhaps I should now disable SSLv3 by default?

I'll have a look at the sample app and hope it will answer some of my
questions.

Just found this:
http://www.theregister.co.uk/2015/06/26/that_shot_you_heard_sslv3_is_now_dead/

It says: "Pragmatically, clients MUST NOT send a ClientHello with
ClientHello.client_version set to {03,00}. Similarly, servers MUST NOT send a
ServerHello with ServerHello.server_version set to {03,00}. Any party
receiving a Hello message with the protocol version set to {03,00} MUST
respond with a "protocol_version" alert message and close the connection."

So maybe that server is set to dump/close my request.

Thanks!
Albert 

-- 
To unsubscribe or change your settings for TWSocket mailing list
please goto http://lists.elists.org/cgi-bin/mailman/listinfo/twsocket
Visit our website at http://www.overbyte.be

Reply via email to