nOOb Error : No certificates found!

gonzagueddr gonzagueddr at yahoo.fr
Wed Apr 14 09:15:14 CEST 2010


Hi, the server (gnutls 2.8.6) is running on a debian sid distrib 
(domain.org ), in my home, and the client (2.4.2 ) is on a debian lenny 
in my office, both commands were ran over ssh. I also tried to run serv 
and cli on the same machine, for the same result ...
I used certtool to make the .pem :

certtool --generate-privkey > cakey.pem
certtool --generate-self-signed --load-privkey cakey.pem --template 
ca.info --outfile cacert.pem
certtool --generate-privkey > serverkey.pem
certtool --generate-certificate --load-privkey serverkey.pem 
--load-ca-certificate cacert.pem --load-ca-privkey cakey.pem --template 
server.info --outfile servercert.pem

Here is my ca.info :

cn = domain.org
ca
cert_signing_key

and the server.info :

organization = domain.org
cn = domain.org
tls_www_server
encryption_key
signing_key

Looking the log whith the "-d 9" option, i notice a packet's length 
trouble, but don't know what it's mean.

Here is the full log for the server :

Processed 1 CA certificate(s).
Echo Server listening on 0.0.0.0 port 22222 family 2...done
Echo Server listening on :: port 22222 family 10...done
|<4>| REC[0x9369438]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x9369438]: Received Packet[0] Handshake(22) with length: 134
|<2>| ASSERT: gnutls_cipher.c:204
|<4>| REC[0x9369438]: Decrypted Packet[0] Handshake(22) with length: 134
|<3>| HSK[0x9369438]: CLIENT HELLO was received [134 bytes]
|<3>| HSK[0x9369438]: Client's version: 3.2
|<2>| ASSERT: gnutls_db.c:326
|<2>| ASSERT: gnutls_db.c:246
|<2>| EXT[0x9369438]: Received extension 'CERT_TYPE/9'
|<2>| EXT[0x9369438]: Received extension 'SERVER_NAME/0'
|<2>| EXT[0x9369438]: Received extension 'CERT_TYPE/9'
|<2>| EXT[0x9369438]: Received extension 'SERVER_NAME/0'
|<2>| ASSERT: gnutls_x509.c:948
|<2>| ASSERT: gnutls_x509.c:948
|<2>| ASSERT: gnutls_x509.c:948
|<3>| HSK[0x9369438]: Removing ciphersuite: PSK_SHA_ARCFOUR_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: PSK_SHA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: PSK_SHA_AES_128_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: PSK_SHA_AES_256_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_PSK_SHA_ARCFOUR_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_PSK_SHA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_PSK_SHA_AES_128_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_PSK_SHA_AES_256_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: SRP_SHA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: SRP_SHA_AES_128_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: SRP_SHA_AES_256_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: SRP_SHA_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: SRP_SHA_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: SRP_SHA_DSS_AES_128_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: SRP_SHA_RSA_AES_128_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: SRP_SHA_DSS_AES_256_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: SRP_SHA_RSA_AES_256_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
|<3>| HSK[0x9369438]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x9369438]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x9369438]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x9369438]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1
|<3>| HSK[0x9369438]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1
|<3>| HSK[0x9369438]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1
|<3>| HSK[0x9369438]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1
|<3>| HSK[0x9369438]: Selected cipher suite: RSA_AES_128_CBC_SHA1
|<3>| HSK[0x9369438]: Selected Compression Method: NULL
|<3>| HSK[0x9369438]: SessionID: 
224e3445cff4013fe0549f2154eacb8489f7ccc2210c634c6358e61868d1b594
|<3>| HSK[0x9369438]: SERVER HELLO was send [74 bytes]
|<4>| REC[0x9369438]: Sending Packet[0] Handshake(22) with length: 74
|<2>| ASSERT: gnutls_cipher.c:204
|<4>| REC[0x9369438]: Sent Packet[1] Handshake(22) with length: 79
|<3>| HSK[0x9369438]: CERTIFICATE was send [859 bytes]
|<4>| REC[0x9369438]: Sending Packet[1] Handshake(22) with length: 859
|<2>| ASSERT: gnutls_cipher.c:204
|<4>| REC[0x9369438]: Sent Packet[2] Handshake(22) with length: 864
|<3>| HSK[0x9369438]: CERTIFICATE REQUEST was send [45 bytes]
|<4>| REC[0x9369438]: Sending Packet[2] Handshake(22) with length: 45
|<2>| ASSERT: gnutls_cipher.c:204
|<4>| REC[0x9369438]: Sent Packet[3] Handshake(22) with length: 50
|<3>| HSK[0x9369438]: SERVER HELLO DONE was send [4 bytes]
|<4>| REC[0x9369438]: Sending Packet[3] Handshake(22) with length: 4
|<2>| ASSERT: gnutls_cipher.c:204
|<4>| REC[0x9369438]: Sent Packet[4] Handshake(22) with length: 9
|<2>| ASSERT: gnutls_buffers.c:322
|<2>| ASSERT: gnutls_buffers.c:1032
|<2>| ASSERT: gnutls_handshake.c:1045
|<4>| REC[0x9369438]: Expected Packet[1] Handshake(22) with length: 1
|<4>| REC[0x9369438]: Received Packet[1] Handshake(22) with length: 7
|<2>| ASSERT: gnutls_cipher.c:204
|<4>| REC[0x9369438]: Decrypted Packet[1] Handshake(22) with length: 7
|<3>| HSK[0x9369438]: CERTIFICATE was received [7 bytes]
|<2>| ASSERT: auth_cert.c:965
|<2>| ASSERT: gnutls_buffers.c:322
|<2>| ASSERT: gnutls_buffers.c:1032
|<2>| ASSERT: gnutls_handshake.c:1045
|<4>| REC[0x9369438]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[0x9369438]: Received Packet[2] Handshake(22) with length: 262
|<2>| ASSERT: gnutls_cipher.c:204
|<4>| REC[0x9369438]: Decrypted Packet[2] Handshake(22) with length: 262
|<3>| HSK[0x9369438]: CLIENT KEY EXCHANGE was received [262 bytes]
|<4>| REC[0x9369438]: Expected Packet[3] Change Cipher Spec(20) with 
length: 1
|<4>| REC[0x9369438]: Received Packet[3] Change Cipher Spec(20) with 
length: 1
|<2>| ASSERT: gnutls_cipher.c:204
|<4>| REC[0x9369438]: ChangeCipherSpec Packet was received
|<9>| INT: PREMASTER SECRET[48]: 
03020cec5416555698ddbc9d1c55b56e14bf071a99a17bdf554667d3b29073fc8d2906579db9c576f6fca3d4162e1724 

|<9>| INT: CLIENT RANDOM[32]: 
4bc55be32cd9c4da765c8ab4eddfc32249f0653a1a6166b0da65b45a104c8c55
|<9>| INT: SERVER RANDOM[32]: 
4bc561a58e7da6b709e08d01fba0bb072897a19560083b65db8d7b6a26be3fe8
|<9>| INT: MASTER SECRET: 
0ba4d5e3a7f793db36218a273f07731bbd9dd13616d53492e6219c5be07d84cf4b7cc6e48d31b88bf1610d8160a53265 

|<9>| INT: KEY BLOCK[104]: 
bf90261ed2912882a4aa9af453bb9fe60ad65814338a22071e8f6cf67d652740
|<9>| INT: CLIENT WRITE KEY [16]: e60ce295037d521507710b409a90ab2f
|<9>| INT: SERVER WRITE KEY [16]: a2d6d70f11df6e0fcd5c534f906b5bbf
|<3>| HSK[0x9369438]: Cipher Suite: RSA_AES_128_CBC_SHA1
|<3>| HSK[0x9369438]: Initializing internal [read] cipher sessions
|<4>| REC[0x9369438]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x9369438]: Received Packet[0] Handshake(22) with length: 176
|<4>| REC[0x9369438]: Decrypted Packet[0] Handshake(22) with length: 16
|<3>| HSK[0x9369438]: FINISHED was received [16 bytes]
|<3>| REC[0x9369438]: Sent ChangeCipherSpec
|<4>| REC[0x9369438]: Sending Packet[4] Change Cipher Spec(20) with 
length: 1
|<2>| ASSERT: gnutls_cipher.c:204
|<4>| REC[0x9369438]: Sent Packet[5] Change Cipher Spec(20) with length: 6
|<3>| HSK[0x9369438]: Cipher Suite: RSA_AES_128_CBC_SHA1
|<3>| HSK[0x9369438]: Initializing internal [write] cipher sessions
|<3>| HSK[0x9369438]: FINISHED was send [16 bytes]
|<4>| REC[0x9369438]: Sending Packet[0] Handshake(22) with length: 16
|<4>| REC[0x9369438]: Sent Packet[1] Handshake(22) with length: 149

* connection from xxx.xx.xxx.xx, port 38662
- Given server name[1]: domain.org
- Certificate type: X.509
No certificates found!
- Could not verify certificate (err: The peer did not send any 
certificate.)
- Version: TLS1.1
- Key Exchange: RSA
- Cipher: AES-128-CBC
- MAC: SHA1
- Compression: NULL
|<2>| ASSERT: gnutls_buffers.c:322



And the full log of the client :

Processed 1 CA certificate(s).
Resolving 'domain.org'...
Connecting to 'xx.xxx.xxx.xx:22222'...
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_PSK_SHA_AES_128_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_PSK_SHA_AES_256_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_PSK_SHA_3DES_EDE_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_PSK_SHA_ARCFOUR_SHA1
|<3>| HSK[80752d8]: Removing ciphersuite: SRP_SHA_RSA_AES_128_CBC_SHA1
|<3>| HSK[80752d8]: Removing ciphersuite: SRP_SHA_RSA_AES_256_CBC_SHA1
|<3>| HSK[80752d8]: Removing ciphersuite: SRP_SHA_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[80752d8]: Removing ciphersuite: SRP_SHA_DSS_AES_128_CBC_SHA1
|<3>| HSK[80752d8]: Removing ciphersuite: SRP_SHA_DSS_AES_256_CBC_SHA1
|<3>| HSK[80752d8]: Removing ciphersuite: SRP_SHA_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[80752d8]: Keeping ciphersuite: PSK_SHA_AES_128_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: PSK_SHA_AES_256_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: PSK_SHA_3DES_EDE_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: PSK_SHA_ARCFOUR_SHA1
|<3>| HSK[80752d8]: Removing ciphersuite: SRP_SHA_AES_128_CBC_SHA1
|<3>| HSK[80752d8]: Removing ciphersuite: SRP_SHA_AES_256_CBC_SHA1
|<3>| HSK[80752d8]: Removing ciphersuite: SRP_SHA_3DES_EDE_CBC_SHA1
|<2>| EXT[80752d8]: Sending extension CERT_TYPE
|<2>| EXT[80752d8]: Sending extension SERVER_NAME
|<3>| HSK[80752d8]: CLIENT HELLO was send [134 bytes]
|<4>| REC[80752d8]: Sending Packet[0] Handshake(22) with length: 134
|<2>| ASSERT: gnutls_cipher.c:205
|<4>| REC[80752d8]: Sent Packet[1] Handshake(22) with length: 139
|<4>| REC[80752d8]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[80752d8]: Received Packet[0] Handshake(22) with length: 74
|<2>| ASSERT: gnutls_cipher.c:205
|<4>| REC[80752d8]: Decrypted Packet[0] Handshake(22) with length: 74
|<3>| HSK[80752d8]: SERVER HELLO was received [74 bytes]
|<3>| HSK[80752d8]: Server's version: 3.2
|<3>| HSK[80752d8]: SessionID length: 32
|<3>| HSK[80752d8]: SessionID: 
224e3445cff4013fe0549f2154eacb8489f7ccc2210c634c6358e61868d1b594
|<3>| HSK[80752d8]: Selected cipher suite: RSA_AES_128_CBC_SHA1
|<2>| ASSERT: gnutls_extensions.c:165
|<4>| REC[80752d8]: Expected Packet[1] Handshake(22) with length: 1
|<4>| REC[80752d8]: Received Packet[1] Handshake(22) with length: 859
|<2>| ASSERT: gnutls_cipher.c:205
|<4>| REC[80752d8]: Decrypted Packet[1] Handshake(22) with length: 859
|<3>| HSK[80752d8]: CERTIFICATE was received [859 bytes]
|<4>| REC[80752d8]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[80752d8]: Received Packet[2] Handshake(22) with length: 45
|<2>| ASSERT: gnutls_cipher.c:205
|<4>| REC[80752d8]: Decrypted Packet[2] Handshake(22) with length: 45
|<3>| HSK[80752d8]: CERTIFICATE REQUEST was received [45 bytes]
- Successfully sent 0 certificate(s) to server.
|<4>| REC[80752d8]: Expected Packet[3] Handshake(22) with length: 1
|<4>| REC[80752d8]: Received Packet[3] Handshake(22) with length: 4
|<2>| ASSERT: gnutls_cipher.c:205
|<4>| REC[80752d8]: Decrypted Packet[3] Handshake(22) with length: 4
|<3>| HSK[80752d8]: SERVER HELLO DONE was received [4 bytes]
|<3>| HSK[80752d8]: CERTIFICATE was send [7 bytes]
|<4>| REC[80752d8]: Sending Packet[1] Handshake(22) with length: 7
|<2>| ASSERT: gnutls_cipher.c:205
|<4>| REC[80752d8]: Sent Packet[2] Handshake(22) with length: 12
|<3>| HSK[80752d8]: CLIENT KEY EXCHANGE was send [262 bytes]
|<4>| REC[80752d8]: Sending Packet[2] Handshake(22) with length: 262
|<2>| ASSERT: gnutls_cipher.c:205
|<4>| REC[80752d8]: Sent Packet[3] Handshake(22) with length: 267
|<3>| REC[80752d8]: Sent ChangeCipherSpec
|<4>| REC[80752d8]: Sending Packet[3] Change Cipher Spec(20) with length: 1
|<2>| ASSERT: gnutls_cipher.c:205
|<4>| REC[80752d8]: Sent Packet[4] Change Cipher Spec(20) with length: 6
|<9>| INT: PREMASTER SECRET[48]: 
03020cec5416555698ddbc9d1c55b56e14bf071a99a17bdf554667d3b29073fc8d2906579db9c576f6fca3d4162e1724 

|<9>| INT: CLIENT RANDOM[32]: 
4bc55be32cd9c4da765c8ab4eddfc32249f0653a1a6166b0da65b45a104c8c55
|<9>| INT: SERVER RANDOM[32]: 
4bc561a58e7da6b709e08d01fba0bb072897a19560083b65db8d7b6a26be3fe8
|<9>| INT: MASTER SECRET: 
0ba4d5e3a7f793db36218a273f07731bbd9dd13616d53492e6219c5be07d84cf4b7cc6e48d31b88bf1610d8160a53265 

|<9>| INT: KEY BLOCK[104]: 
bf90261ed2912882a4aa9af453bb9fe60ad65814338a22071e8f6cf67d652740
|<9>| INT: CLIENT WRITE KEY [16]: e60ce295037d521507710b409a90ab2f
|<9>| INT: SERVER WRITE KEY [16]: a2d6d70f11df6e0fcd5c534f906b5bbf
|<3>| HSK[80752d8]: Cipher Suite: RSA_AES_128_CBC_SHA1
|<3>| HSK[80752d8]: Initializing internal [write] cipher sessions
|<3>| HSK[80752d8]: FINISHED was send [16 bytes]
|<4>| REC[80752d8]: Sending Packet[0] Handshake(22) with length: 16
|<4>| REC[80752d8]: Sent Packet[1] Handshake(22) with length: 181
|<4>| REC[80752d8]: Expected Packet[4] Change Cipher Spec(20) with 
length: 1
|<4>| REC[80752d8]: Received Packet[4] Change Cipher Spec(20) with 
length: 1
|<2>| ASSERT: gnutls_cipher.c:205
|<4>| REC[80752d8]: ChangeCipherSpec Packet was received
|<3>| HSK[80752d8]: Cipher Suite: RSA_AES_128_CBC_SHA1
|<3>| HSK[80752d8]: Initializing internal [read] cipher sessions
|<4>| REC[80752d8]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[80752d8]: Received Packet[0] Handshake(22) with length: 144
|<4>| REC[80752d8]: Decrypted Packet[0] Handshake(22) with length: 16
|<3>| HSK[80752d8]: FINISHED was received [16 bytes]
|<2>| ASSERT: ext_server_name.c:257
- Certificate type: X.509
- Got a certificate list of 1 certificates.

- Certificate[0] info:
# The hostname in the certificate matches 'domain.org'.
# valid since: Wed Apr  7 18:39:46 CEST 2010
# expires at: Thu Apr  7 18:39:46 CEST 2011
# fingerprint: 37:12:84:F2:E2:0C:A6:DC:4C:93:B1:18:57:8E:8A:0C
# Subject's DN: O=domain.org,CN=domain.org
# Issuer's DN: CN=domain.org

|<2>| ASSERT: mpi.c:587
|<2>| ASSERT: dn.c:1212

- Peer's certificate is trusted
- Version: TLS1.1
- Key Exchange: RSA
- Cipher: AES-128-CBC
- MAC: SHA1
- Compression: NULL
|<2>| ASSERT: mpi.c:587
|<2>| ASSERT: dn.c:1212
- Handshake was completed

- Simple Client Mode:


Sorry to hide the name and ip, but i don't want this server to be known, 
of course if you need it, i'll give it.
Moreover, i'm not sure if the full logs was what you mean by "more 
precise" ...

Thanks,
Gonzague



Nikos Mavrogiannopoulos a écrit :
> gonzagueddr wrote:
>
>  
>> Hi all, and first excuse me to be totaly noob about gnutls.
>> It's one week i'm trying to stream an mp3 over https using vlc, and i
>> get the error "TLS handshake error: The peer did not send any 
>> certificate".
>> So after a week on the vlc forum, i thing you're my only hope now (they
>> say it's a gnutls' bug, but i can't believe that).
>>     
>
> Please be more precise. What is your scenario, who is the tls server and
> who is the client.
>
> [...]
>  
>> * connection from xx.xx.xx.xxx, port 50091
>> - Given server name[1]: domain.org
>> - Certificate type: X.509
>> No certificates found!
>> - Could not verify certificate (err: The peer did not send any
>> certificate.)
>> - Version: TLS1.1
>> - Key Exchange: RSA
>> - Cipher: AES-128-CBC
>> - MAC: SHA1
>> - Compression: NULL
>>
>> I can not find help about this on the web, i mean something that i can
>> understand ...
>> If someone know what can i do for this, it would be very apreciate.
>>     
>
> The peer did not send any certificate is normal. A TLS client is not
> obliged to send a certificate and in your case didn't. That's why
> the server cannot verify it. If you want the client to send a
> certificate you have to specify a certificate and a key, that are
> suitable for signing.
>
>
> regards,
> Nikos









More information about the Gnutls-help mailing list