Francis GASCHET
2014-09-17 17:34:44 UTC
Hello,
We use openSSL in OFTP2 implementation. The OFTP2 working group decided
to strongly recommend to use preferably the cipher suites including PFS
(ephemeral Diffie Hellman).
So in our iplementation (linked against openssl 1.0.1g) I limited the
list of offered ciphers (client) and prefered ciphers (server) to :
"DHE-RSA-AES256-SHA:EDH-RSA-DES-CBC3-SHA:DHE-RSA-AES128-SHA:ECDHE-RSA-AES256-SHA:ECDHE-RSA-DES-CBC3-SHA:ECDHE-RSA-AES128-SHA:"
using SSL_CTX_set_cipher_list.
On this "restricted" binary it looks fine : only these ciphers are
presented in the client hello:
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
But on the legacy software side (linked against openSSL V0.9.8c), the
server rejects the connection with the "No shared cipher" error.
On this site, the command "openssl ciphers" says that DHE-RSA-AES128-SHA
and EDH-RSA-DES-CBC3-SHA are supported(among others).
So 2 ciphersuites are shared...
BTW: In this version of the software, the default list is in use
(SSL_CTX_set_cipher_list is not called).
It is the same when I reverse the roles : the legacy binary becomes the
client.In that case, wireshark shows TLS_DHE_RSA_WITH_AES_256_CBC_SHA
and TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHAin the offered list of cipher
suites (among others).
But the "restricted" binary rejects the connection with the same error.
On this side, the same list of ciphers (listed above) are specified
before accepting the connection (server)than before calling out (client).
So I'm lost !
Thank you in advance for help.
We use openSSL in OFTP2 implementation. The OFTP2 working group decided
to strongly recommend to use preferably the cipher suites including PFS
(ephemeral Diffie Hellman).
So in our iplementation (linked against openssl 1.0.1g) I limited the
list of offered ciphers (client) and prefered ciphers (server) to :
"DHE-RSA-AES256-SHA:EDH-RSA-DES-CBC3-SHA:DHE-RSA-AES128-SHA:ECDHE-RSA-AES256-SHA:ECDHE-RSA-DES-CBC3-SHA:ECDHE-RSA-AES128-SHA:"
using SSL_CTX_set_cipher_list.
On this "restricted" binary it looks fine : only these ciphers are
presented in the client hello:
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
But on the legacy software side (linked against openSSL V0.9.8c), the
server rejects the connection with the "No shared cipher" error.
On this site, the command "openssl ciphers" says that DHE-RSA-AES128-SHA
and EDH-RSA-DES-CBC3-SHA are supported(among others).
So 2 ciphersuites are shared...
BTW: In this version of the software, the default list is in use
(SSL_CTX_set_cipher_list is not called).
It is the same when I reverse the roles : the legacy binary becomes the
client.In that case, wireshark shows TLS_DHE_RSA_WITH_AES_256_CBC_SHA
and TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHAin the offered list of cipher
suites (among others).
But the "restricted" binary rejects the connection with the same error.
On this side, the same list of ciphers (listed above) are specified
before accepting the connection (server)than before calling out (client).
So I'm lost !
Thank you in advance for help.
--
Francis
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users-MCmKBN63+***@public.gmane.org
Automated List Manager majordomo-MCmKBN63+***@public.gmane.org
Francis
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users-MCmKBN63+***@public.gmane.org
Automated List Manager majordomo-MCmKBN63+***@public.gmane.org