[Help-gnutls] Re: Another one: A TLS packet with unexpected length was received.

Lennart Koopmann lennart at scopeport.org
Thu Sep 18 12:34:45 CEST 2008


Thank you for your help!

> Btw, which version are you using?

I am using version 2.5.2.

> Can you enable more debugging, e.g., log
> level 4711?

Here you are:

--------------- Server ---------------
READ: Got 5 bytes from 6
READ: read 5 bytes from 6
0000 - 16 03 02 00 40 
RB: Have 0 bytes into buffer. Adding 5 bytes.
RB: Requested 5 bytes
REC[9e9a880]: Expected Packet[0] Handshake(22) with length: 1
REC[9e9a880]: Received Packet[0] Handshake(22) with length: 64
READ: Got 64 bytes from 6
READ: read 64 bytes from 6
0000 - 01 00 00 3c 03 02 48 d2 2c 91 72 a1 bb bf d8 6b 
0001 - 3d df 9d 50 be a9 26 af ac 2c aa 93 48 83 db fb 
0002 - 45 26 35 55 fd be 00 00 0c 00 34 00 46 00 3a 00 
0003 - 89 00 1b 00 18 01 00 00 07 00 09 00 03 02 00 01 
0004 - 
RB: Have 5 bytes into buffer. Adding 64 bytes.
RB: Requested 69 bytes
ASSERT: gnutls_cipher.c:204
REC[9e9a880]: Decrypted Packet[0] Handshake(22) with length: 64
BUF[HSK]: Inserted 64 bytes of Data(22)
BUF[REC][HD]: Read 1 bytes of Data(22)
BUF[REC][HD]: Read 3 bytes of Data(22)
HSK[9e9a880]: CLIENT HELLO was received [64 bytes]
BUF[REC][HD]: Read 60 bytes of Data(22)
BUF[HSK]: Peeked 0 bytes of Data
BUF[HSK]: Emptied buffer
BUF[HSK]: Inserted 4 bytes of Data
BUF[HSK]: Inserted 60 bytes of Data
HSK[9e9a880]: Client's version: 3.2
ASSERT: gnutls_db.c:238
EXT[9e9a880]: Received extension 'CERT_TYPE/9'
EXT[9e9a880]: Received extension 'CERT_TYPE/9'
ASSERT: ext_cert_type.c:106
ASSERT: ext_cert_type.c:106
ASSERT: ext_cert_type.c:123
HSK[9e9a880]: Keeping ciphersuite: ANON_DH_ARCFOUR_MD5
HSK[9e9a880]: Keeping ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
HSK[9e9a880]: Keeping ciphersuite: ANON_DH_AES_128_CBC_SHA1
HSK[9e9a880]: Keeping ciphersuite: ANON_DH_AES_256_CBC_SHA1
HSK[9e9a880]: Keeping ciphersuite: ANON_DH_CAMELLIA_128_CBC_SHA1
HSK[9e9a880]: Keeping ciphersuite: ANON_DH_CAMELLIA_256_CBC_SHA1
HSK[9e9a880]: Selected cipher suite: ANON_DH_AES_128_CBC_SHA1
HSK[9e9a880]: Selected Compression Method: NULL
HSK[9e9a880]: SessionID
ce6b8f11699b491028039ed6c8cc58514ba2b62f627dafadc7e7554005f03eaf
HSK[9e9a880]: SERVER HELLO was send [74 bytes]
BUF[HSK]: Peeked 64 bytes of Data
BUF[HSK]: Emptied buffer
REC[9e9a880]: Sending Packet[0] Handshake(22) with length: 74
ASSERT: gnutls_cipher.c:204
WRITE: Will write 79 bytes to 6.
WRITE: wrote 79 bytes to 6. Left 0 bytes. Total 79 bytes.
0000 - 16 03 02 00 4a 02 00 00 46 03 02 48 d2 2c 91 05 
0001 - e5 a3 ea a3 f8 5c 23 98 c4 79 77 9c ff 75 7c 7d 
0002 - 2a 3b be 6b a0 ea 0b 7a 51 5d 43 20 ce 6b 8f 11 
0003 - 69 9b 49 10 28 03 9e d6 c8 cc 58 51 4b a2 b6 2f 
0004 - 62 7d af ad c7 e7 55 40 05 f0 3e af 00 34 00 
REC[9e9a880]: Sent Packet[1] Handshake(22) with length: 79
--------------------------------------

--------------- Client ---------------
HSK[8452430]: Keeping ciphersuite: ANON_DH_AES_128_CBC_SHA1
HSK[8452430]: Keeping ciphersuite: ANON_DH_CAMELLIA_128_CBC_SHA1
HSK[8452430]: Keeping ciphersuite: ANON_DH_AES_256_CBC_SHA1
HSK[8452430]: Keeping ciphersuite: ANON_DH_CAMELLIA_256_CBC_SHA1
HSK[8452430]: Keeping ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
HSK[8452430]: Keeping ciphersuite: ANON_DH_ARCFOUR_MD5
EXT[8452430]: Sending extension CERT_TYPE
HSK[8452430]: CLIENT HELLO was send [64 bytes]
BUF[HSK]: Peeked 0 bytes of Data
BUF[HSK]: Emptied buffer
REC[8452430]: Sending Packet[0] Handshake(22) with length: 64
ASSERT: gnutls_cipher.c:204
WRITE: Will write 69 bytes to 4.
WRITE: wrote 69 bytes to 4. Left 0 bytes. Total 69 bytes.
0000 - 16 03 02 00 40 01 00 00 3c 03 02 48 d2 2c 91 72 
0001 - a1 bb bf d8 6b 3d df 9d 50 be a9 26 af ac 2c aa 
0002 - 93 48 83 db fb 45 26 35 55 fd be 00 00 0c 00 34 
0003 - 00 46 00 3a 00 89 00 1b 00 18 01 00 00 07 00 09 
0004 - 00 03 02 00 01 
REC[8452430]: Sent Packet[1] Handshake(22) with length: 69
READ: Got 5 bytes from 4
READ: read 5 bytes from 4
0000 - 16 03 02 00 4a 
RB: Have 0 bytes into buffer. Adding 5 bytes.
RB: Requested 5 bytes
REC[8452430]: Expected Packet[0] Handshake(22) with length: 1
REC[8452430]: Received Packet[0] Handshake(22) with length: 74
READ: Got 74 bytes from 4
READ: read 74 bytes from 4
0000 - 02 00 00 46 03 02 48 d2 2c 91 05 e5 a3 ea a3 f8 
0001 - 5c 23 98 c4 79 77 9c ff 75 7c 7d 2a 3b be 6b a0 
0002 - ea 0b 7a 51 5d 43 20 ce 6b 8f 11 69 9b 49 10 28 
0003 - 03 9e d6 c8 cc 58 51 4b a2 b6 2f 62 7d af ad c7 
0004 - e7 55 40 05 f0 3e af 00 34 00 
RB: Have 5 bytes into buffer. Adding 74 bytes.
RB: Requested 79 bytes
ASSERT: gnutls_cipher.c:204
REC[8452430]: Decrypted Packet[0] Handshake(22) with length: 74
BUF[HSK]: Inserted 74 bytes of Data(22)
BUF[REC][HD]: Read 1 bytes of Data(22)
BUF[REC][HD]: Read 3 bytes of Data(22)
HSK[8452430]: SERVER HELLO was received [74 bytes]
BUF[REC][HD]: Read 70 bytes of Data(22)
BUF[HSK]: Peeked 0 bytes of Data
BUF[HSK]: Emptied buffer
BUF[HSK]: Inserted 4 bytes of Data
BUF[HSK]: Inserted 70 bytes of Data
HSK[8452430]: Server's version: 3.2
HSK[8452430]: SessionID length: 32
HSK[8452430]: SessionID
ce6b8f11699b491028039ed6c8cc58514ba2b62f627dafadc7e7554005f03eaf
HSK[8452430]: Selected cipher suite: ANON_DH_AES_128_CBC_SHA1
ASSERT: gnutls_extensions.c:125
READ: Got 0 bytes from 4
READ: read 0 bytes from 4
0000 - 
ASSERT: gnutls_buffers.c:638
ASSERT: gnutls_record.c:909
ASSERT: gnutls_buffers.c:1150
ASSERT: gnutls_handshake.c:1043
ASSERT: gnutls_kx.c:410
ASSERT: gnutls_handshake.c:2364
BUF[HSK]: Cleared Data from buffer

Handshake failed
GNUTLS ERROR: A TLS packet with unexpected length was received.
--------------------------------------






More information about the Gnutls-help mailing list