Discussion:
SSL3_GET_RECORD:wrong version number
chris busbey
2006-12-11 02:48:50 UTC
Permalink
Hello,

I'm working on a client/server app using ACE+SSL. The OpenSSL lib i'm
working with on the server side is 0.9.8d (deployed on a linux box).

I am having problems connecting to the server using the client app in
development, or s_client. Using s_client, I am able to complete a
handshake and send a msg to the server application. In this same
session, I then send a msg to the s_client instance from the server.

The output on the s_client side is as follows;


SSL3 alert write:fatal:handshake failure
6389:error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version
number:s3_pkt.c:288:


I am using the -ssl3 flag on the s_client side. The SSL_Context on
the client side is configured as follows;

ACE_SSL_Context * ssl_ctx = ACE_SSL_Context::instance();
ssl_ctx->set_mode(ACE_SSL_Context::SSLv3);

I have tried setting the context mode to SSLv23, TSLv1 (as well as
*_server) and found the same results. Interestingly enough, I can set
the context and s_client to SSLv2, and this appears to work. However,
the client app I am developing (.net 2.0) chokes on receiving messages
with a System32 exception- "The message or signature supplied for
verification has been altered". TSL or SSL3 would be preferred.

It almost seems like the server is accepted SSL3 msgs, but sending out
another protocol type. Any suggestions?

Much Thanks,
Chris.
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users-MCmKBN63+***@public.gmane.org
Automated List Manager majordomo-MCmKBN63+***@public.gmane.org
Marek Marcola
2006-12-11 09:45:36 UTC
Permalink
Hello,
Post by chris busbey
The output on the s_client side is as follows;
SSL3 alert write:fatal:handshake failure
6389:error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version
This means that client don't want to support received from
server SSL version.
Post by chris busbey
I am using the -ssl3 flag on the s_client side. The SSL_Context on
the client side is configured as follows;
And this means that client want to support ONLY SSL3
which means that client sends to server SSL3 proposition
and server should accept this version and send back
ServerHello handshake packet with SSL3 version accepted.
Post by chris busbey
I have tried setting the context mode to SSLv23, TSLv1 (as well as
*_server) and found the same results.
When client context is set for SSLv23 then client sends SSL2
ClientHello packet with SSL3 (or even TLS1) proposition.
If server understands SSL3/TLS1 then this protocol is selected,
if not SSL2 may be selected (or not).
Post by chris busbey
Interestingly enough, I can set
the context and s_client to SSLv2, and this appears to work. However,
the client app I am developing (.net 2.0) chokes on receiving messages
with a System32 exception- "The message or signature supplied for
verification has been altered". TSL or SSL3 would be preferred.
It almost seems like the server is accepted SSL3 msgs, but sending out
another protocol type. Any suggestions?
If you using Linux, can you send ssldump or wireshark dump
of this session.

Best regards,
--
Marek Marcola <Marek.Marcola-O6hvhuWbBu5mR6Xm/***@public.gmane.org>

______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users-MCmKBN63+***@public.gmane.org
Automated List Manager majordomo-MCmKBN63+***@public.gmane.org
chris busbey
2006-12-11 16:48:34 UTC
Permalink
Post by Marek Marcola
Post by chris busbey
It almost seems like the server is accepted SSL3 msgs, but sending out
another protocol type. Any suggestions?
If you using Linux, can you send ssldump or wireshark dump
of this session.
Here is an ssldump of s_client connecting to my server. I am getting
a "Length mismatch" error following the client key exchange. In this
run, the server ctx is set to receive SSLv23, the ssl on s_client was
not specified. Would the Length Mismatch indicate a bad key?

Thanks,
Chris.


New TCP connection #5: localhost.localdomain(41722) <->
localhost.localdomain(5758)
5 1 0.0025 (0.0025) C>SV3.0(84) Handshake
ClientHello
Version 3.0
random[32]=
45 7d 8b 12 f3 38 eb 69 fe 5c 7d 3e eb b8 02 0d
32 0a ef 70 d8 30 b2 ab 41 e3 47 5a fd 0b 61 80
cipher suites
Unknown value 0x39
Unknown value 0x38
Unknown value 0x35
SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
SSL_RSA_WITH_3DES_EDE_CBC_SHA
Unknown value 0x33
Unknown value 0x32
Unknown value 0x2f
SSL_RSA_WITH_IDEA_CBC_SHA
SSL_RSA_WITH_RC4_128_SHA
SSL_RSA_WITH_RC4_128_MD5
SSL_DHE_RSA_WITH_DES_CBC_SHA
SSL_DHE_DSS_WITH_DES_CBC_SHA
SSL_RSA_WITH_DES_CBC_SHA
SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5
SSL_RSA_EXPORT_WITH_RC4_40_MD5
compression methods
unknown value
NULL
5 2 0.0050 (0.0024) S>CV3.0(74) Handshake
ServerHello
Version 3.0
random[32]=
45 7d 8b 12 f4 42 79 fe bd e5 34 59 e7 02 aa 8e
c9 d6 b3 9d c5 23 cd 1e a3 76 de 5d 3f 69 0b a6
session_id[32]=
20 3e 42 dc 97 0b f5 73 ac a0 b5 50 01 e5 1c a9
0f 74 71 06 55 87 9f 55 3d a9 e5 1c d2 a1 13 9a
cipherSuite Unknown value 0x35
compressionMethod unknown value
5 3 0.0050 (0.0000) S>CV3.0(889) Handshake
Certificate
5 4 0.0050 (0.0000) S>CV3.0(4) Handshake
ServerHelloDone
5 5 0.0198 (0.0148) C>SV3.0(132) Handshake
ClientKeyExchange
ERROR: Length mismatch
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users-MCmKBN63+***@public.gmane.org
Automated List Manager majordomo-MCmKBN63+***@public.gmane.org
chris busbey
2006-12-11 17:01:22 UTC
Permalink
Post by chris busbey
Post by Marek Marcola
Post by chris busbey
It almost seems like the server is accepted SSL3 msgs, but sending out
another protocol type. Any suggestions?
If you using Linux, can you send ssldump or wireshark dump
of this session.
Here is an ssldump of s_client connecting to my server. I am getting
a "Length mismatch" error following the client key exchange. In this
run, the server ctx is set to receive SSLv23, the ssl on s_client was
not specified. Would the Length Mismatch indicate a bad key?
Another trial forcing tls1 on both sides of the connection did not
result in the above "Length Mismatch" error. Here is the output of
that trial's ssl dump. Any thoughts?

New TCP connection #67: localhost.localdomain(42489) <->
localhost.localdomain(5758)
67 1 0.0032 (0.0032) C>SV3.1(95) Handshake
ClientHello
Version 3.1
random[32]=
45 7d 8d 96 89 31 b1 d3 cf 44 80 ae 06 eb 1d ac
48 d0 8e bd 96 b5 b8 da c9 cc c0 0c e5 6a ec d7
cipher suites
Unknown value 0x39
Unknown value 0x38
Unknown value 0x35
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
Unknown value 0x33
Unknown value 0x32
Unknown value 0x2f
TLS_DHE_DSS_WITH_RC4_128_SHA
TLS_RSA_WITH_RC4_128_SHA
TLS_RSA_WITH_RC4_128_MD5
TLS_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA
TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA
TLS_RSA_EXPORT1024_WITH_RC2_CBC_56_MD5
TLS_DHE_RSA_WITH_DES_CBC_SHA
TLS_DHE_DSS_WITH_DES_CBC_SHA
TLS_RSA_WITH_DES_CBC_SHA
TLS_DHE_DSS_WITH_RC2_56_CBC_SHA
TLS_RSA_EXPORT1024_WITH_RC4_56_SHA
TLS_RSA_EXPORT1024_WITH_RC4_56_MD5
TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5
TLS_RSA_EXPORT_WITH_RC4_40_MD5
compression methods
NULL
67 2 0.0083 (0.0050) S>CV3.1(74) Handshake
ServerHello
Version 3.1
random[32]=
45 7d 8d 96 f6 1e ca 93 7f 6d f7 31 69 33 c9 e2
6e 9e bf 5c d3 e8 fd e3 66 0f 5e 81 8d f9 ab f3
session_id[32]=
36 22 f7 71 b0 84 9e 23 03 0c 1e ac 88 dd 36 67
24 75 08 ea b3 9d de 70 87 56 40 dc 45 fc 33 28
cipherSuite Unknown value 0x35
compressionMethod NULL
67 3 0.0083 (0.0000) S>CV3.1(889) Handshake
Certificate
67 4 0.0083 (0.0000) S>CV3.1(4) Handshake
ServerHelloDone
67 5 0.0244 (0.0160) C>SV3.1(134) Handshake
ClientKeyExchange
67 6 0.0657 (0.0413) C>SV3.1(1) ChangeCipherSpec
67 7 0.0657 (0.0000) C>SV3.1(48) Handshake
67 8 0.0666 (0.0008) S>CV3.1(1) ChangeCipherSpec
67 9 0.0666 (0.0000) S>CV3.1(48) Handshake
67 10 14.4262 (14.3595) C>SV3.1(32) application_data
Unknown SSL content type 0
67 11 14.4282 (0.0020) C>SV44.0(32) Alert
67 14.4285 (0.0003) C>S TCP RST
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users-MCmKBN63+***@public.gmane.org
Automated List Manager majordomo-MCmKBN63+***@public.gmane.org
Victor Duchovni
2006-12-11 17:05:27 UTC
Permalink
Post by chris busbey
Post by chris busbey
Post by Marek Marcola
Post by chris busbey
It almost seems like the server is accepted SSL3 msgs, but sending out
another protocol type. Any suggestions?
If you using Linux, can you send ssldump or wireshark dump
of this session.
Here is an ssldump of s_client connecting to my server. I am getting
a "Length mismatch" error following the client key exchange. In this
run, the server ctx is set to receive SSLv23, the ssl on s_client was
not specified. Would the Length Mismatch indicate a bad key?
Another trial forcing tls1 on both sides of the connection did not
result in the above "Length Mismatch" error. Here is the output of
that trial's ssl dump. Any thoughts?
New TCP connection #67: localhost.localdomain(42489) <->
localhost.localdomain(5758)
67 1 0.0032 (0.0032) C>SV3.1(95) Handshake
ClientHello
Version 3.1
random[32]=
45 7d 8d 96 89 31 b1 d3 cf 44 80 ae 06 eb 1d ac
48 d0 8e bd 96 b5 b8 da c9 cc c0 0c e5 6a ec d7
cipher suites
Unknown value 0x39
Unknown value 0x38
Unknown value 0x35
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
Unknown value 0x33
Unknown value 0x32
Unknown value 0x2f
TLS_DHE_DSS_WITH_RC4_128_SHA
TLS_RSA_WITH_RC4_128_SHA
TLS_RSA_WITH_RC4_128_MD5
TLS_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA
TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA
TLS_RSA_EXPORT1024_WITH_RC2_CBC_56_MD5
TLS_DHE_RSA_WITH_DES_CBC_SHA
TLS_DHE_DSS_WITH_DES_CBC_SHA
TLS_RSA_WITH_DES_CBC_SHA
TLS_DHE_DSS_WITH_RC2_56_CBC_SHA
TLS_RSA_EXPORT1024_WITH_RC4_56_SHA
TLS_RSA_EXPORT1024_WITH_RC4_56_MD5
TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5
TLS_RSA_EXPORT_WITH_RC4_40_MD5
compression methods
NULL
This one did not offer the extra "unknown" (presumably "zlib")
compression.
--
Viktor.
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users-MCmKBN63+***@public.gmane.org
Automated List Manager majordomo-MCmKBN63+***@public.gmane.org
chris busbey
2006-12-11 17:58:59 UTC
Permalink
Post by Victor Duchovni
Post by chris busbey
Another trial forcing tls1 on both sides of the connection did not
result in the above "Length Mismatch" error. Here is the output of
that trial's ssl dump. Any thoughts?
New TCP connection #67: localhost.localdomain(42489) <->
localhost.localdomain(5758)
67 1 0.0032 (0.0032) C>SV3.1(95) Handshake
ClientHello
Version 3.1
random[32]=
45 7d 8d 96 89 31 b1 d3 cf 44 80 ae 06 eb 1d ac
48 d0 8e bd 96 b5 b8 da c9 cc c0 0c e5 6a ec d7
cipher suites
Unknown value 0x39
Unknown value 0x38
Unknown value 0x35
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
Unknown value 0x33
Unknown value 0x32
Unknown value 0x2f
TLS_DHE_DSS_WITH_RC4_128_SHA
TLS_RSA_WITH_RC4_128_SHA
TLS_RSA_WITH_RC4_128_MD5
TLS_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA
TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA
TLS_RSA_EXPORT1024_WITH_RC2_CBC_56_MD5
TLS_DHE_RSA_WITH_DES_CBC_SHA
TLS_DHE_DSS_WITH_DES_CBC_SHA
TLS_RSA_WITH_DES_CBC_SHA
TLS_DHE_DSS_WITH_RC2_56_CBC_SHA
TLS_RSA_EXPORT1024_WITH_RC4_56_SHA
TLS_RSA_EXPORT1024_WITH_RC4_56_MD5
TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5
TLS_RSA_EXPORT_WITH_RC4_40_MD5
compression methods
NULL
This one did not offer the extra "unknown" (presumably "zlib")
compression.
Ah, yes. It seems that I was using the s_client 0.9.7a in the last
trial regardless, the same "wrong version number" error was produced
when using s_client 0.9.8d. Here is the trial using 0.9.8d. Still
getting the unknown SSL content type, followed by alert.

New TCP connection #1333: localhost.localdomain(46983) <->
localhost.localdomain(5758)
1333 1 0.0024 (0.0024) C>SV3.1(84) Handshake
ClientHello
Version 3.1
random[32]=
45 7d 9b e3 b9 fb bb 4d 4b d0 1c d8 51 0b 1c 3e
50 5c 3a cc f9 8b e9 96 b9 0a 7e 6a 22 43 32 b3
cipher suites
Unknown value 0x39
Unknown value 0x38
Unknown value 0x35
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
Unknown value 0x33
Unknown value 0x32
Unknown value 0x2f
TLS_RSA_WITH_IDEA_CBC_SHA
TLS_RSA_WITH_RC4_128_SHA
TLS_RSA_WITH_RC4_128_MD5
TLS_DHE_RSA_WITH_DES_CBC_SHA
TLS_DHE_DSS_WITH_DES_CBC_SHA
TLS_RSA_WITH_DES_CBC_SHA
TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5
TLS_RSA_EXPORT_WITH_RC4_40_MD5
compression methods
unknown value
NULL
1333 2 0.0073 (0.0048) S>CV3.1(74) Handshake
ServerHello
Version 3.1
random[32]=
45 7d 9b e3 24 39 a3 fd e2 24 33 9a 47 31 72 82
ad 34 e0 53 b2 a1 97 4f 45 51 a5 43 66 8e 43 81
session_id[32]=
33 7f 47 05 02 24 a8 10 20 df 51 69 0b 0f 05 3d
06 73 37 0e 77 1a 06 bc 40 65 f8 f7 06 f8 8d d6
cipherSuite Unknown value 0x35
compressionMethod unknown value
1333 3 0.0073 (0.0000) S>CV3.1(889) Handshake
Certificate
1333 4 0.0073 (0.0000) S>CV3.1(4) Handshake
ServerHelloDone
1333 5 0.0140 (0.0066) C>SV3.1(134) Handshake
ClientKeyExchange
1333 6 0.0539 (0.0399) C>SV3.1(1) ChangeCipherSpec
1333 7 0.0539 (0.0000) C>SV3.1(48) Handshake
1333 8 0.0561 (0.0022) S>CV3.1(1) ChangeCipherSpec
1333 9 0.0561 (0.0000) S>CV3.1(48) Handshake
1333 10 3.1262 (3.0700) C>SV3.1(32) application_data
Unknown SSL content type 0
1333 11 3.1289 (0.0027) C>SV44.0(32) Alert
1333 3.1294 (0.0005) C>S TCP RST
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users-MCmKBN63+***@public.gmane.org
Automated List Manager majordomo-MCmKBN63+***@public.gmane.org
Marek Marcola
2006-12-11 18:07:28 UTC
Permalink
Hello,

Can you send ssldump with -aAdN options ?

Best regards,
--
Marek Marcola <Marek.Marcola-O6hvhuWbBu5mR6Xm/***@public.gmane.org>

______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users-MCmKBN63+***@public.gmane.org
Automated List Manager majordomo-MCmKBN63+***@public.gmane.org
chris busbey
2006-12-11 18:36:00 UTC
Permalink
Post by Marek Marcola
Can you send ssldump with -aAdN options ?
Certainly. (Certificate details have been obfuscated)

New TCP connection #8: localhost.localdomain(48429) <->
localhost.localdomain(5758)
8 1 0.0028 (0.0028) C>S SSLv2 compatible client hello
Version 3.1
cipher suites
Unknown value 0x39
Unknown value 0x38
Unknown value 0x35
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
SSL2_CK_3DES
Unknown value 0x33
Unknown value 0x32
Unknown value 0x2f
TLS_RSA_WITH_IDEA_CBC_SHA
SSL2_CK_IDEA
SSL2_CK_RC2
TLS_RSA_WITH_RC4_128_SHA
TLS_RSA_WITH_RC4_128_MD5
SSL2_CK_RC4
TLS_DHE_RSA_WITH_DES_CBC_SHA
TLS_DHE_DSS_WITH_DES_CBC_SHA
TLS_RSA_WITH_DES_CBC_SHA
SSL2_CK_DES
TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5
SSL2_CK_RC2_EXPORT40
TLS_RSA_EXPORT_WITH_RC4_40_MD5
SSL2_CK_RC4_EXPORT40
8 2 0.0053 (0.0025) S>CV3.1(74) Handshake
ServerHello
Version 3.1
random[32]=
45 7d a0 8b 4b e8 ae 91 c7 13 a2 53 cd 21 70 02
e6 61 f7 ef 52 12 14 c5 ab 0f 1c b7 59 b3 46 28
session_id[32]=
c8 c6 12 12 89 c2 01 42 63 24 db e6 83 5f 98 ac
23 f6 80 92 ec d0 5d d4 23 6a 47 e7 dc b9 21 4b
cipherSuite Unknown value 0x35
compressionMethod NULL
8 3 0.0053 (0.0000) S>CV3.1(889) Handshake
Certificate
Subject
C=US
ST=Illinois
L=Chicago
O=Blah
CN=BLAH-SRV-BLAH
emailAddress=blah-***@public.gmane.org
Issuer
C=US
ST=Illinois
L=Chicago
O=Blah
CN=BLAH-SRV-BLAH
emailAddress=blah-***@public.gmane.org
Serial 00
Extensions
Extension: X509v3 Subject Key Identifier
Extension: X509v3 Authority Key Identifier
Extension: X509v3 Basic Constraints
8 4 0.0053 (0.0000) S>CV3.1(4) Handshake
ServerHelloDone
8 5 0.0217 (0.0163) C>SV3.1(134) Handshake
ClientKeyExchange
8 6 0.0611 (0.0393) C>SV3.1(1) ChangeCipherSpec
8 7 0.0611 (0.0000) C>SV3.1(48) Handshake
8 8 0.0615 (0.0004) S>CV3.1(1) ChangeCipherSpec
8 9 0.0615 (0.0000) S>CV3.1(48) Handshake
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users-MCmKBN63+***@public.gmane.org
Automated List Manager majordomo-MCmKBN63+***@public.gmane.org
Marek Marcola
2006-12-11 19:09:40 UTC
Permalink
Hello,
Post by chris busbey
Post by Marek Marcola
Can you send ssldump with -aAdN options ?
Certainly. (Certificate details have been obfuscated)
New TCP connection #8: localhost.localdomain(48429) <->
localhost.localdomain(5758)
8 1 0.0028 (0.0028) C>S SSLv2 compatible client hello
Version 3.1
cipher suites
Unknown value 0x39
Unknown value 0x38
Unknown value 0x35
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
SSL2_CK_3DES
Unknown value 0x33
Unknown value 0x32
Unknown value 0x2f
TLS_RSA_WITH_IDEA_CBC_SHA
SSL2_CK_IDEA
SSL2_CK_RC2
TLS_RSA_WITH_RC4_128_SHA
TLS_RSA_WITH_RC4_128_MD5
SSL2_CK_RC4
TLS_DHE_RSA_WITH_DES_CBC_SHA
TLS_DHE_DSS_WITH_DES_CBC_SHA
TLS_RSA_WITH_DES_CBC_SHA
SSL2_CK_DES
TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5
SSL2_CK_RC2_EXPORT40
TLS_RSA_EXPORT_WITH_RC4_40_MD5
SSL2_CK_RC4_EXPORT40
8 2 0.0053 (0.0025) S>CV3.1(74) Handshake
ServerHello
Version 3.1
random[32]=
45 7d a0 8b 4b e8 ae 91 c7 13 a2 53 cd 21 70 02
e6 61 f7 ef 52 12 14 c5 ab 0f 1c b7 59 b3 46 28
session_id[32]=
c8 c6 12 12 89 c2 01 42 63 24 db e6 83 5f 98 ac
23 f6 80 92 ec d0 5d d4 23 6a 47 e7 dc b9 21 4b
cipherSuite Unknown value 0x35
compressionMethod NULL
8 3 0.0053 (0.0000) S>CV3.1(889) Handshake
Certificate
Subject
C=US
ST=Illinois
L=Chicago
O=Blah
CN=BLAH-SRV-BLAH
Issuer
C=US
ST=Illinois
L=Chicago
O=Blah
CN=BLAH-SRV-BLAH
Serial 00
Extensions
Extension: X509v3 Subject Key Identifier
Extension: X509v3 Authority Key Identifier
Extension: X509v3 Basic Constraints
8 4 0.0053 (0.0000) S>CV3.1(4) Handshake
ServerHelloDone
8 5 0.0217 (0.0163) C>SV3.1(134) Handshake
ClientKeyExchange
8 6 0.0611 (0.0393) C>SV3.1(1) ChangeCipherSpec
8 7 0.0611 (0.0000) C>SV3.1(48) Handshake
8 8 0.0615 (0.0004) S>CV3.1(1) ChangeCipherSpec
8 9 0.0615 (0.0000) S>CV3.1(48) Handshake
This TLS1 looks good, but sorry I've forget xX options,
so output from "ssldump -aAdNxX" should give more information
(SSL packet dump) with ending error.

Best regards,
--
Marek Marcola <Marek.Marcola-O6hvhuWbBu5mR6Xm/***@public.gmane.org>

______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users-MCmKBN63+***@public.gmane.org
Automated List Manager majordomo-MCmKBN63+***@public.gmane.org
chris busbey
2006-12-11 19:32:39 UTC
Permalink
Post by Marek Marcola
This TLS1 looks good, but sorry I've forget xX options,
so output from "ssldump -aAdNxX" should give more information
(SSL packet dump) with ending error.
Hrm... ssldump fails during the handshake with a 'Length Mismatch"
error with the xX options. Here is the output;

New TCP connection #5: localhost.localdomain(53503) <->
localhost.localdomain(5758)
5 1 0.0024 (0.0024) C>S SSLv2 compatible client hello
Version 3.1
cipher suites
Unknown value 0x39
Unknown value 0x38
Unknown value 0x35
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
SSL2_CK_3DES
Unknown value 0x33
Unknown value 0x32
Unknown value 0x2f
TLS_RSA_WITH_IDEA_CBC_SHA
SSL2_CK_IDEA
SSL2_CK_RC2
TLS_RSA_WITH_RC4_128_SHA
TLS_RSA_WITH_RC4_128_MD5
SSL2_CK_RC4
TLS_DHE_RSA_WITH_DES_CBC_SHA
TLS_DHE_DSS_WITH_DES_CBC_SHA
TLS_RSA_WITH_DES_CBC_SHA
SSL2_CK_DES
TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5
SSL2_CK_RC2_EXPORT40
TLS_RSA_EXPORT_WITH_RC4_40_MD5
SSL2_CK_RC4_EXPORT40
Packet data[108]=
80 6a 01 03 01 00 51 00 00 00 10 00 00 39 00 00
38 00 00 35 00 00 16 00 00 13 00 00 0a 07 00 c0
00 00 33 00 00 32 00 00 2f 00 00 07 05 00 80 03
00 80 00 00 05 00 00 04 01 00 80 00 00 15 00 00
12 00 00 09 06 00 40 00 00 14 00 00 11 00 00 08
00 00 06 04 00 80 00 00 03 02 00 80 91 55 24 ce
72 4d 72 01 68 d9 56 6c 86 9c 59 f6

5 2 0.0053 (0.0029) S>CV3.1(74) Handshake
ServerHello
Version 3.1
random[32]=
45 7d b0 b3 87 26 d8 05 b8 27 68 85 01 f5 5e 59
8a 67 d1 ac 3d 94 bc d6 45 c4 f0 42 7a a1 60 ec
session_id[32]=
2e ab ad 61 fe 1e 47 6a f2 a2 0f 06 c9 61 23 13
d1 4f 24 e4 5f f3 89 ea 25 8c 90 2d ea b7 fa aa
cipherSuite Unknown value 0x35
compressionMethod NULL
Packet data[79]=
16 03 01 00 4a 02 00 00 46 03 01 45 7d b0 b3 87
26 d8 05 b8 27 68 85 01 f5 5e 59 8a 67 d1 ac 3d
94 bc d6 45 c4 f0 42 7a a1 60 ec 20 2e ab ad 61
fe 1e 47 6a f2 a2 0f 06 c9 61 23 13 d1 4f 24 e4
5f f3 89 ea 25 8c 90 2d ea b7 fa aa 00 35 00


5 3 0.0053 (0.0000) S>CV3.1(889) Handshake
Certificate
Subject
C=US
ST=Illinois
L=Chicago
O=Blah
CN=BLAH-SRV-BLAH
emailAddress=blah-***@public.gmane.org
Issuer
C=US
ST=Illinois
L=Chicago
O=Blah
CN=BLAH-SRV-BLAH
emailAddress=blah-***@public.gmane.org
Serial 00
Extensions
Extension: X509v3 Subject Key Identifier
Extension: X509v3 Authority Key Identifier
Extension: X509v3 Basic Constraints
Packet data[894]=
16 03 01 03 79 0b 00 03 75 00 03 72 00 03 6f 30
82 03 6b 30 82 02 d4 a0 03 02 01 02 02 01 00 30
0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81
86 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 11
30 0f 06 03 55 04 08 13 08 49 6c 6c 69 6e 6f 69
73 31 10 30 0e 06 03 55 04 07 13 07 43 68 69 63
61 67 6f 31 12 30 10 06 03 55 04 0a 13 09 43 6f
6e 6e 61 6d 61 72 61 31 18 30 16 06 03 55 04 03
13 0f 43 48 49 2d 53 52 56 2d 4f 50 50 44 45 56
31 31 24 30 22 06 09 2a 86 48 86 f7 0d 01 09 01
16 15 63 62 75 73 62 65 79 40 63 6f 6e 6e 61 6d
61 72 61 2e 63 6f 6d 30 1e 17 0d 30 36 31 32 30
34 32 33 30 32 35 33 5a 17 0d 30 39 30 38 33 30
32 33 30 32 35 33 5a 30 81 86 31 0b 30 09 06 03
55 04 06 13 02 55 53 31 11 30 0f 06 03 55 04 08
13 08 49 6c 6c 69 6e 6f 69 73 31 10 30 0e 06 03
55 04 07 13 07 43 68 69 63 61 67 6f 31 12 30 10
06 03 55 04 0a 13 09 43 6f 6e 6e 61 6d 61 72 61
31 18 30 16 06 03 55 04 03 13 0f 43 48 49 2d 53
52 56 2d 4f 50 50 44 45 56 31 31 24 30 22 06 09
2a 86 48 86 f7 0d 01 09 01 16 15 63 62 75 73 62
65 79 40 63 6f 6e 6e 61 6d 61 72 61 2e 63 6f 6d
30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01
05 00 03 81 8d 00 30 81 89 02 81 81 00 a1 17 50
53 10 ef 67 24 62 b5 6a 76 9d dd c5 32 61 9d 9d
b4 59 43 a2 a8 9a 72 11 7d c0 36 4d 9f 1e ae 25
30 01 97 3d 90 54 bd b1 1a 3e 65 ec 3f 56 1b 79
39 03 57 08 74 29 6f 0b 19 e1 ca 5d 3b 8e 25 de
54 28 15 d0 f0 8c c2 0f 41 5a db ba e8 67 8a e1
af 93 0f f9 11 d4 8f e7 6c 6a 2a d9 8d 1f 9a df
46 0b 61 3b 17 75 00 08 fd 5d f5 b8 57 00 90 4d
83 25 bf 47 22 ab b2 d7 0e 83 9a 28 c3 02 03 01
00 01 a3 81 e6 30 81 e3 30 1d 06 03 55 1d 0e 04
16 04 14 23 cf 32 38 42 52 75 4f 8f 4d ae d5 05
b5 68 76 30 a0 18 01 30 81 b3 06 03 55 1d 23 04
81 ab 30 81 a8 80 14 23 cf 32 38 42 52 75 4f 8f
4d ae d5 05 b5 68 76 30 a0 18 01 a1 81 8c a4 81
89 30 81 86 31 0b 30 09 06 03 55 04 06 13 02 55
53 31 11 30 0f 06 03 55 04 08 13 08 49 6c 6c 69
6e 6f 69 73 31 10 30 0e 06 03 55 04 07 13 07 43
68 69 63 61 67 6f 31 12 30 10 06 03 55 04 0a 13
09 43 6f 6e 6e 61 6d 61 72 61 31 18 30 16 06 03
55 04 03 13 0f 43 48 49 2d 53 52 56 2d 4f 50 50
44 45 56 31 31 24 30 22 06 09 2a 86 48 86 f7 0d
01 09 01 16 15 63 62 75 73 62 65 79 40 63 6f 6e
6e 61 6d 61 72 61 2e 63 6f 6d 82 01 00 30 0c 06
03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a
86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 28 d7
ca 7f 50 fe 55 70 24 20 57 3d 2e f4 30 8b ff 0f
d6 16 3b 18 d3 84 ba 17 54 b2 a6 6e 45 1e 3f b5
cf 6e d1 90 4e a7 bf d8 2b a8 7d ae 7c 69 f6 e4
72 33 cc 73 12 db 71 f5 56 00 69 e5 5a 47 92 6c
9c 34 a1 0e 7c 02 b3 aa e8 e0 98 e6 dc 68 77 81
78 42 78 61 b6 3b 02 15 71 cc 09 8d 19 81 62 8c
8e b5 fa 9d cc 61 21 06 57 1d a9 c5 d1 70 81 14
1e 12 cb e7 ae d2 d2 df 7a a5 70 1a 50 5d


5 4 0.0053 (0.0000) S>CV3.1(4) Handshake
ServerHelloDone
Packet data[9]=
16 03 01 00 04 0e 00 00 00


5 5 0.0256 (0.0203) C>SV3.1(134) Handshake
ClientKeyExchange
Packet data[139]=
16 03 01 00 86 10 00 00 82 00 80 2a 13 72 b1 21
cf db 06 bd 58 d9 de 6a 2f 71 60 79 dc 19 ce e6
96 1a 17 d8 2c d3 0e 9f c1 74 aa 29 29 49 34 d7
f4 a4 33 a9 ad b4 7b de 7e 4f e0 73 01 99 c7 a9
1d 97 79 49 4f 22 5c cd 07 b3 5e 3b 7b 39 2f 43
ad 84 76 5b 12 0f f8 80 96 c7 53 de d2 b8 ef dc
89 ce df 44 64 a9 c5 7b 6a e7 26 41 24 f6 e7 51
d3 d3 cd 9f 01 5e d6 8e 1a c3 a5 17 e6 53 46 06
e8 ee 80 9d 9c 54 07 ba 63 87 3d


ERROR: Length mismatch
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users-MCmKBN63+***@public.gmane.org
Automated List Manager majordomo-MCmKBN63+***@public.gmane.org
Marek Marcola
2006-12-11 20:09:35 UTC
Permalink
Hello,
Post by chris busbey
Hrm... ssldump fails during the handshake with a 'Length Mismatch"
error with the xX options. Here is the output;
New TCP connection #5: localhost.localdomain(53503) <->
localhost.localdomain(5758)
5 1 0.0024 (0.0024) C>S SSLv2 compatible client hello
Version 3.1
cipher suites
Unknown value 0x39
Unknown value 0x38
Unknown value 0x35
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
SSL2_CK_3DES
Unknown value 0x33
Unknown value 0x32
Unknown value 0x2f
TLS_RSA_WITH_IDEA_CBC_SHA
SSL2_CK_IDEA
SSL2_CK_RC2
TLS_RSA_WITH_RC4_128_SHA
TLS_RSA_WITH_RC4_128_MD5
SSL2_CK_RC4
TLS_DHE_RSA_WITH_DES_CBC_SHA
TLS_DHE_DSS_WITH_DES_CBC_SHA
TLS_RSA_WITH_DES_CBC_SHA
SSL2_CK_DES
TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5
SSL2_CK_RC2_EXPORT40
TLS_RSA_EXPORT_WITH_RC4_40_MD5
SSL2_CK_RC4_EXPORT40
Packet data[108]=
80 6a 01 03 01 00 51 00 00 00 10 00 00 39 00 00
38 00 00 35 00 00 16 00 00 13 00 00 0a 07 00 c0
00 00 33 00 00 32 00 00 2f 00 00 07 05 00 80 03
00 80 00 00 05 00 00 04 01 00 80 00 00 15 00 00
12 00 00 09 06 00 40 00 00 14 00 00 11 00 00 08
00 00 06 04 00 80 00 00 03 02 00 80 91 55 24 ce
72 4d 72 01 68 d9 56 6c 86 9c 59 f6
5 2 0.0053 (0.0029) S>CV3.1(74) Handshake
ServerHello
Version 3.1
random[32]=
45 7d b0 b3 87 26 d8 05 b8 27 68 85 01 f5 5e 59
8a 67 d1 ac 3d 94 bc d6 45 c4 f0 42 7a a1 60 ec
session_id[32]=
2e ab ad 61 fe 1e 47 6a f2 a2 0f 06 c9 61 23 13
d1 4f 24 e4 5f f3 89 ea 25 8c 90 2d ea b7 fa aa
cipherSuite Unknown value 0x35
compressionMethod NULL
Packet data[79]=
16 03 01 00 4a 02 00 00 46 03 01 45 7d b0 b3 87
26 d8 05 b8 27 68 85 01 f5 5e 59 8a 67 d1 ac 3d
94 bc d6 45 c4 f0 42 7a a1 60 ec 20 2e ab ad 61
fe 1e 47 6a f2 a2 0f 06 c9 61 23 13 d1 4f 24 e4
5f f3 89 ea 25 8c 90 2d ea b7 fa aa 00 35 00
5 3 0.0053 (0.0000) S>CV3.1(889) Handshake
Certificate
Subject
C=US
ST=Illinois
L=Chicago
O=Blah
CN=BLAH-SRV-BLAH
Issuer
C=US
ST=Illinois
L=Chicago
O=Blah
CN=BLAH-SRV-BLAH
Serial 00
Extensions
Extension: X509v3 Subject Key Identifier
Extension: X509v3 Authority Key Identifier
Extension: X509v3 Basic Constraints
Packet data[894]=
16 03 01 03 79 0b 00 03 75 00 03 72 00 03 6f 30
82 03 6b 30 82 02 d4 a0 03 02 01 02 02 01 00 30
0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81
86 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 11
30 0f 06 03 55 04 08 13 08 49 6c 6c 69 6e 6f 69
73 31 10 30 0e 06 03 55 04 07 13 07 43 68 69 63
61 67 6f 31 12 30 10 06 03 55 04 0a 13 09 43 6f
6e 6e 61 6d 61 72 61 31 18 30 16 06 03 55 04 03
13 0f 43 48 49 2d 53 52 56 2d 4f 50 50 44 45 56
31 31 24 30 22 06 09 2a 86 48 86 f7 0d 01 09 01
16 15 63 62 75 73 62 65 79 40 63 6f 6e 6e 61 6d
61 72 61 2e 63 6f 6d 30 1e 17 0d 30 36 31 32 30
34 32 33 30 32 35 33 5a 17 0d 30 39 30 38 33 30
32 33 30 32 35 33 5a 30 81 86 31 0b 30 09 06 03
55 04 06 13 02 55 53 31 11 30 0f 06 03 55 04 08
13 08 49 6c 6c 69 6e 6f 69 73 31 10 30 0e 06 03
55 04 07 13 07 43 68 69 63 61 67 6f 31 12 30 10
06 03 55 04 0a 13 09 43 6f 6e 6e 61 6d 61 72 61
31 18 30 16 06 03 55 04 03 13 0f 43 48 49 2d 53
52 56 2d 4f 50 50 44 45 56 31 31 24 30 22 06 09
2a 86 48 86 f7 0d 01 09 01 16 15 63 62 75 73 62
65 79 40 63 6f 6e 6e 61 6d 61 72 61 2e 63 6f 6d
30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01
05 00 03 81 8d 00 30 81 89 02 81 81 00 a1 17 50
53 10 ef 67 24 62 b5 6a 76 9d dd c5 32 61 9d 9d
b4 59 43 a2 a8 9a 72 11 7d c0 36 4d 9f 1e ae 25
30 01 97 3d 90 54 bd b1 1a 3e 65 ec 3f 56 1b 79
39 03 57 08 74 29 6f 0b 19 e1 ca 5d 3b 8e 25 de
54 28 15 d0 f0 8c c2 0f 41 5a db ba e8 67 8a e1
af 93 0f f9 11 d4 8f e7 6c 6a 2a d9 8d 1f 9a df
46 0b 61 3b 17 75 00 08 fd 5d f5 b8 57 00 90 4d
83 25 bf 47 22 ab b2 d7 0e 83 9a 28 c3 02 03 01
00 01 a3 81 e6 30 81 e3 30 1d 06 03 55 1d 0e 04
16 04 14 23 cf 32 38 42 52 75 4f 8f 4d ae d5 05
b5 68 76 30 a0 18 01 30 81 b3 06 03 55 1d 23 04
81 ab 30 81 a8 80 14 23 cf 32 38 42 52 75 4f 8f
4d ae d5 05 b5 68 76 30 a0 18 01 a1 81 8c a4 81
89 30 81 86 31 0b 30 09 06 03 55 04 06 13 02 55
53 31 11 30 0f 06 03 55 04 08 13 08 49 6c 6c 69
6e 6f 69 73 31 10 30 0e 06 03 55 04 07 13 07 43
68 69 63 61 67 6f 31 12 30 10 06 03 55 04 0a 13
09 43 6f 6e 6e 61 6d 61 72 61 31 18 30 16 06 03
55 04 03 13 0f 43 48 49 2d 53 52 56 2d 4f 50 50
44 45 56 31 31 24 30 22 06 09 2a 86 48 86 f7 0d
01 09 01 16 15 63 62 75 73 62 65 79 40 63 6f 6e
6e 61 6d 61 72 61 2e 63 6f 6d 82 01 00 30 0c 06
03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a
86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 28 d7
ca 7f 50 fe 55 70 24 20 57 3d 2e f4 30 8b ff 0f
d6 16 3b 18 d3 84 ba 17 54 b2 a6 6e 45 1e 3f b5
cf 6e d1 90 4e a7 bf d8 2b a8 7d ae 7c 69 f6 e4
72 33 cc 73 12 db 71 f5 56 00 69 e5 5a 47 92 6c
9c 34 a1 0e 7c 02 b3 aa e8 e0 98 e6 dc 68 77 81
78 42 78 61 b6 3b 02 15 71 cc 09 8d 19 81 62 8c
8e b5 fa 9d cc 61 21 06 57 1d a9 c5 d1 70 81 14
1e 12 cb e7 ae d2 d2 df 7a a5 70 1a 50 5d
5 4 0.0053 (0.0000) S>CV3.1(4) Handshake
ServerHelloDone
Packet data[9]=
16 03 01 00 04 0e 00 00 00
5 5 0.0256 (0.0203) C>SV3.1(134) Handshake
ClientKeyExchange
Packet data[139]=
16 03 01 00 86 10 00 00 82 00 80 2a 13 72 b1 21
cf db 06 bd 58 d9 de 6a 2f 71 60 79 dc 19 ce e6
96 1a 17 d8 2c d3 0e 9f c1 74 aa 29 29 49 34 d7
f4 a4 33 a9 ad b4 7b de 7e 4f e0 73 01 99 c7 a9
1d 97 79 49 4f 22 5c cd 07 b3 5e 3b 7b 39 2f 43
ad 84 76 5b 12 0f f8 80 96 c7 53 de d2 b8 ef dc
89 ce df 44 64 a9 c5 7b 6a e7 26 41 24 f6 e7 51
d3 d3 cd 9f 01 5e d6 8e 1a c3 a5 17 e6 53 46 06
e8 ee 80 9d 9c 54 07 ba 63 87 3d
This packet looks good:
- 5 bytes of protocol header (16 03 01 00 86)
indicating 134 (86) bytes of data
- 4 bytes of handshake header (10 00 00 82)
indicating 130 (82) bytes of data and
client_key_exchange packet (10)
- 2 bytes indicating length of encrypted data
(only for TLS1) 00 80 (128), so 1024 bit
RSA key is used (128*8)
- and next encrypted data
Post by chris busbey
ERROR: Length mismatch
This error is from reading next packet and indicate
some errors when capturing packet. Some network errors ?
Some IDS devices ?

My proposition is to check SSL communication with
s_client/s_server.

Best regards,
--
Marek Marcola <Marek.Marcola-O6hvhuWbBu5mR6Xm/***@public.gmane.org>

______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users-MCmKBN63+***@public.gmane.org
Automated List Manager majordomo-MCmKBN63+***@public.gmane.org
chris busbey
2006-12-12 17:26:21 UTC
Permalink
A quick update on this issue. After digging through some untouched
code, I discovered that the server was writing data directly to the
port instead of the SSL_SOCK_Stream. Problem solved. Thanks for all
of your help.
Post by chris busbey
Hello,
Post by chris busbey
Hrm... ssldump fails during the handshake with a 'Length Mismatch"
error with the xX options. Here is the output;
New TCP connection #5: localhost.localdomain(53503) <->
localhost.localdomain(5758)
5 1 0.0024 (0.0024) C>S SSLv2 compatible client hello
Version 3.1
cipher suites
Unknown value 0x39
Unknown value 0x38
Unknown value 0x35
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
SSL2_CK_3DES
Unknown value 0x33
Unknown value 0x32
Unknown value 0x2f
TLS_RSA_WITH_IDEA_CBC_SHA
SSL2_CK_IDEA
SSL2_CK_RC2
TLS_RSA_WITH_RC4_128_SHA
TLS_RSA_WITH_RC4_128_MD5
SSL2_CK_RC4
TLS_DHE_RSA_WITH_DES_CBC_SHA
TLS_DHE_DSS_WITH_DES_CBC_SHA
TLS_RSA_WITH_DES_CBC_SHA
SSL2_CK_DES
TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5
SSL2_CK_RC2_EXPORT40
TLS_RSA_EXPORT_WITH_RC4_40_MD5
SSL2_CK_RC4_EXPORT40
Packet data[108]=
80 6a 01 03 01 00 51 00 00 00 10 00 00 39 00 00
38 00 00 35 00 00 16 00 00 13 00 00 0a 07 00 c0
00 00 33 00 00 32 00 00 2f 00 00 07 05 00 80 03
00 80 00 00 05 00 00 04 01 00 80 00 00 15 00 00
12 00 00 09 06 00 40 00 00 14 00 00 11 00 00 08
00 00 06 04 00 80 00 00 03 02 00 80 91 55 24 ce
72 4d 72 01 68 d9 56 6c 86 9c 59 f6
5 2 0.0053 (0.0029) S>CV3.1(74) Handshake
ServerHello
Version 3.1
random[32]=
45 7d b0 b3 87 26 d8 05 b8 27 68 85 01 f5 5e 59
8a 67 d1 ac 3d 94 bc d6 45 c4 f0 42 7a a1 60 ec
session_id[32]=
2e ab ad 61 fe 1e 47 6a f2 a2 0f 06 c9 61 23 13
d1 4f 24 e4 5f f3 89 ea 25 8c 90 2d ea b7 fa aa
cipherSuite Unknown value 0x35
compressionMethod NULL
Packet data[79]=
16 03 01 00 4a 02 00 00 46 03 01 45 7d b0 b3 87
26 d8 05 b8 27 68 85 01 f5 5e 59 8a 67 d1 ac 3d
94 bc d6 45 c4 f0 42 7a a1 60 ec 20 2e ab ad 61
fe 1e 47 6a f2 a2 0f 06 c9 61 23 13 d1 4f 24 e4
5f f3 89 ea 25 8c 90 2d ea b7 fa aa 00 35 00
5 3 0.0053 (0.0000) S>CV3.1(889) Handshake
Certificate
Subject
C=US
ST=Illinois
L=Chicago
O=Blah
CN=BLAH-SRV-BLAH
Issuer
C=US
ST=Illinois
L=Chicago
O=Blah
CN=BLAH-SRV-BLAH
Serial 00
Extensions
Extension: X509v3 Subject Key Identifier
Extension: X509v3 Authority Key Identifier
Extension: X509v3 Basic Constraints
Packet data[894]=
16 03 01 03 79 0b 00 03 75 00 03 72 00 03 6f 30
82 03 6b 30 82 02 d4 a0 03 02 01 02 02 01 00 30
0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81
86 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 11
30 0f 06 03 55 04 08 13 08 49 6c 6c 69 6e 6f 69
73 31 10 30 0e 06 03 55 04 07 13 07 43 68 69 63
61 67 6f 31 12 30 10 06 03 55 04 0a 13 09 43 6f
6e 6e 61 6d 61 72 61 31 18 30 16 06 03 55 04 03
13 0f 43 48 49 2d 53 52 56 2d 4f 50 50 44 45 56
31 31 24 30 22 06 09 2a 86 48 86 f7 0d 01 09 01
16 15 63 62 75 73 62 65 79 40 63 6f 6e 6e 61 6d
61 72 61 2e 63 6f 6d 30 1e 17 0d 30 36 31 32 30
34 32 33 30 32 35 33 5a 17 0d 30 39 30 38 33 30
32 33 30 32 35 33 5a 30 81 86 31 0b 30 09 06 03
55 04 06 13 02 55 53 31 11 30 0f 06 03 55 04 08
13 08 49 6c 6c 69 6e 6f 69 73 31 10 30 0e 06 03
55 04 07 13 07 43 68 69 63 61 67 6f 31 12 30 10
06 03 55 04 0a 13 09 43 6f 6e 6e 61 6d 61 72 61
31 18 30 16 06 03 55 04 03 13 0f 43 48 49 2d 53
52 56 2d 4f 50 50 44 45 56 31 31 24 30 22 06 09
2a 86 48 86 f7 0d 01 09 01 16 15 63 62 75 73 62
65 79 40 63 6f 6e 6e 61 6d 61 72 61 2e 63 6f 6d
30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01
05 00 03 81 8d 00 30 81 89 02 81 81 00 a1 17 50
53 10 ef 67 24 62 b5 6a 76 9d dd c5 32 61 9d 9d
b4 59 43 a2 a8 9a 72 11 7d c0 36 4d 9f 1e ae 25
30 01 97 3d 90 54 bd b1 1a 3e 65 ec 3f 56 1b 79
39 03 57 08 74 29 6f 0b 19 e1 ca 5d 3b 8e 25 de
54 28 15 d0 f0 8c c2 0f 41 5a db ba e8 67 8a e1
af 93 0f f9 11 d4 8f e7 6c 6a 2a d9 8d 1f 9a df
46 0b 61 3b 17 75 00 08 fd 5d f5 b8 57 00 90 4d
83 25 bf 47 22 ab b2 d7 0e 83 9a 28 c3 02 03 01
00 01 a3 81 e6 30 81 e3 30 1d 06 03 55 1d 0e 04
16 04 14 23 cf 32 38 42 52 75 4f 8f 4d ae d5 05
b5 68 76 30 a0 18 01 30 81 b3 06 03 55 1d 23 04
81 ab 30 81 a8 80 14 23 cf 32 38 42 52 75 4f 8f
4d ae d5 05 b5 68 76 30 a0 18 01 a1 81 8c a4 81
89 30 81 86 31 0b 30 09 06 03 55 04 06 13 02 55
53 31 11 30 0f 06 03 55 04 08 13 08 49 6c 6c 69
6e 6f 69 73 31 10 30 0e 06 03 55 04 07 13 07 43
68 69 63 61 67 6f 31 12 30 10 06 03 55 04 0a 13
09 43 6f 6e 6e 61 6d 61 72 61 31 18 30 16 06 03
55 04 03 13 0f 43 48 49 2d 53 52 56 2d 4f 50 50
44 45 56 31 31 24 30 22 06 09 2a 86 48 86 f7 0d
01 09 01 16 15 63 62 75 73 62 65 79 40 63 6f 6e
6e 61 6d 61 72 61 2e 63 6f 6d 82 01 00 30 0c 06
03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a
86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 28 d7
ca 7f 50 fe 55 70 24 20 57 3d 2e f4 30 8b ff 0f
d6 16 3b 18 d3 84 ba 17 54 b2 a6 6e 45 1e 3f b5
cf 6e d1 90 4e a7 bf d8 2b a8 7d ae 7c 69 f6 e4
72 33 cc 73 12 db 71 f5 56 00 69 e5 5a 47 92 6c
9c 34 a1 0e 7c 02 b3 aa e8 e0 98 e6 dc 68 77 81
78 42 78 61 b6 3b 02 15 71 cc 09 8d 19 81 62 8c
8e b5 fa 9d cc 61 21 06 57 1d a9 c5 d1 70 81 14
1e 12 cb e7 ae d2 d2 df 7a a5 70 1a 50 5d
5 4 0.0053 (0.0000) S>CV3.1(4) Handshake
ServerHelloDone
Packet data[9]=
16 03 01 00 04 0e 00 00 00
5 5 0.0256 (0.0203) C>SV3.1(134) Handshake
ClientKeyExchange
Packet data[139]=
16 03 01 00 86 10 00 00 82 00 80 2a 13 72 b1 21
cf db 06 bd 58 d9 de 6a 2f 71 60 79 dc 19 ce e6
96 1a 17 d8 2c d3 0e 9f c1 74 aa 29 29 49 34 d7
f4 a4 33 a9 ad b4 7b de 7e 4f e0 73 01 99 c7 a9
1d 97 79 49 4f 22 5c cd 07 b3 5e 3b 7b 39 2f 43
ad 84 76 5b 12 0f f8 80 96 c7 53 de d2 b8 ef dc
89 ce df 44 64 a9 c5 7b 6a e7 26 41 24 f6 e7 51
d3 d3 cd 9f 01 5e d6 8e 1a c3 a5 17 e6 53 46 06
e8 ee 80 9d 9c 54 07 ba 63 87 3d
- 5 bytes of protocol header (16 03 01 00 86)
indicating 134 (86) bytes of data
- 4 bytes of handshake header (10 00 00 82)
indicating 130 (82) bytes of data and
client_key_exchange packet (10)
- 2 bytes indicating length of encrypted data
(only for TLS1) 00 80 (128), so 1024 bit
RSA key is used (128*8)
- and next encrypted data
Post by chris busbey
ERROR: Length mismatch
This error is from reading next packet and indicate
some errors when capturing packet. Some network errors ?
Some IDS devices ?
My proposition is to check SSL communication with
s_client/s_server.
Best regards,
--
______________________________________________________________________
OpenSSL Project http://www.openssl.org
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users-MCmKBN63+***@public.gmane.org
Automated List Manager majordomo-MCmKBN63+***@public.gmane.org
Victor Duchovni
2006-12-11 17:04:27 UTC
Permalink
Post by chris busbey
Post by Marek Marcola
Post by chris busbey
It almost seems like the server is accepted SSL3 msgs, but sending out
another protocol type. Any suggestions?
If you using Linux, can you send ssldump or wireshark dump
of this session.
Here is an ssldump of s_client connecting to my server. I am getting
a "Length mismatch" error following the client key exchange. In this
run, the server ctx is set to receive SSLv23, the ssl on s_client was
not specified. Would the Length Mismatch indicate a bad key?
Is either the server or the client using OpenSSL 0.9.8a or 0.9.8b, if
compiled with zlib support, and all bug work-arounds are enabled via
SSL_OP_ALL, you will run into problems, this is fixed in 0.9.8c and
later.
Post by chris busbey
New TCP connection #5: localhost.localdomain(41722) <->
localhost.localdomain(5758)
5 1 0.0025 (0.0025) C>SV3.0(84) Handshake
ClientHello
Version 3.0
random[32]=
45 7d 8b 12 f3 38 eb 69 fe 5c 7d 3e eb b8 02 0d
32 0a ef 70 d8 30 b2 ab 41 e3 47 5a fd 0b 61 80
cipher suites
Unknown value 0x39
Unknown value 0x38
Unknown value 0x35
SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
SSL_RSA_WITH_3DES_EDE_CBC_SHA
Unknown value 0x33
Unknown value 0x32
Unknown value 0x2f
SSL_RSA_WITH_IDEA_CBC_SHA
SSL_RSA_WITH_RC4_128_SHA
SSL_RSA_WITH_RC4_128_MD5
SSL_DHE_RSA_WITH_DES_CBC_SHA
SSL_DHE_DSS_WITH_DES_CBC_SHA
SSL_RSA_WITH_DES_CBC_SHA
SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5
SSL_RSA_EXPORT_WITH_RC4_40_MD5
compression methods
unknown value
NULL
5 2 0.0050 (0.0024) S>CV3.0(74) Handshake
ServerHello
Version 3.0
random[32]=
45 7d 8b 12 f4 42 79 fe bd e5 34 59 e7 02 aa 8e
c9 d6 b3 9d c5 23 cd 1e a3 76 de 5d 3f 69 0b a6
session_id[32]=
20 3e 42 dc 97 0b f5 73 ac a0 b5 50 01 e5 1c a9
0f 74 71 06 55 87 9f 55 3d a9 e5 1c d2 a1 13 9a
cipherSuite Unknown value 0x35
compressionMethod unknown value
5 3 0.0050 (0.0000) S>CV3.0(889) Handshake
Certificate
5 4 0.0050 (0.0000) S>CV3.0(4) Handshake
ServerHelloDone
5 5 0.0198 (0.0148) C>SV3.0(132) Handshake
ClientKeyExchange
ERROR: Length mismatch
--
Viktor.
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users-MCmKBN63+***@public.gmane.org
Automated List Manager majordomo-MCmKBN63+***@public.gmane.org
Marek Marcola
2006-12-11 18:04:36 UTC
Permalink
Hello,
Post by Victor Duchovni
Post by chris busbey
Post by Marek Marcola
Post by chris busbey
It almost seems like the server is accepted SSL3 msgs, but sending out
another protocol type. Any suggestions?
If you using Linux, can you send ssldump or wireshark dump
of this session.
Here is an ssldump of s_client connecting to my server. I am getting
a "Length mismatch" error following the client key exchange. In this
run, the server ctx is set to receive SSLv23, the ssl on s_client was
not specified. Would the Length Mismatch indicate a bad key?
Is either the server or the client using OpenSSL 0.9.8a or 0.9.8b, if
compiled with zlib support, and all bug work-arounds are enabled via
SSL_OP_ALL, you will run into problems, this is fixed in 0.9.8c and
later.
This bug was for TLS1 and here we have SSL3 established.

Best regards,
--
Marek Marcola <Marek.Marcola-O6hvhuWbBu5mR6Xm/***@public.gmane.org>

______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users-MCmKBN63+***@public.gmane.org
Automated List Manager majordomo-MCmKBN63+***@public.gmane.org
Loading...