Error in handshake - Error: Could not negotiate a supported cipher suite.

Kristian Fiskerstrand kristian.fiskerstrand at sumptuouscapital.com
Wed Aug 8 02:24:38 CEST 2012


Hi,

I'm trying to set up mod_gnutls on apache to use OpenPGP key for a TLS
session but I'm having some trouble getting gnutls set up correctly for
a handshake. If I'm not too mistaken alert(21) indicate a decryption
error - any hints for how I should debug this?

What I have so far is - using gnutls-serv and gnutls-cli - the following;

Version information:
alpha ~ # gnutls-serv -v
gnutls-serv (GnuTLS) 2.12.20

Invocation of serv:
gnutls-serv \
    -p 18000 \
    -g \
    --http \
    --priority NORMAL:+ANON-DH \
    --pgpcertfile /etc/apache2/conf/sks-keyservers.net.pub.asc \
    --pgpkeyfile /etc/apache2/conf/ss/sks-keyservers.net.sec.asc \
    --pgpsubkey 19EA3DAE12200409

Where the keyset is generated with the following properties, and the
secret key has no passphrase
---------------
pub  4096R/BD7B1BE43776D70C  created: 2012-08-08  expires: 2014-08-08
usage: CA
                             trust: ultimate      validity: ultimate
sub  4096R/19EA3DAE12200409  created: 2012-08-08  expires: 2014-08-08
usage: E
[ultimate] (1). sks-keyservers.net


And the files are exported using
gpg2 --homedir . -a --export 3776D70C
gpg2 --homedir . -a --export-secret-keys 3776D70C

and stored in ASCII armored format:
alpha ~ # head -1 /etc/apache2/conf/sks-keyservers.net.pub.asc
-----BEGIN PGP PUBLIC KEY BLOCK-----

alpha ~ # head -1 /etc/apache2/conf/ss/sks-keyservers.net.sec.asc
-----BEGIN PGP PRIVATE KEY BLOCK-----

This results in
alpha ss # gnutls-serv     -p 18000     -g     --http     --priority
NORMAL:+ANON-DH     --pgpcertfile
/etc/apache2/conf/sks-keyservers.net.pub.asc     --pgpkeyfile
/etc/apache2/conf/ss/sks-keyservers.net.sec.asc     --pgpsubkey
19EA3DAE12200409
Generating temporary RSA parameters. Please wait...
Generating Diffie-Hellman parameters [768]. Please wait...
HTTP Server listening on IPv4 0.0.0.0 port 18000...done
HTTP Server listening on IPv6 :: port 18000...bind() failed: Address
already in use

* Accepted connection from IPv4 127.0.0.1 port 35976 on Wed Aug  8
02:16:48 2012
Error in handshake
Error: Could not negotiate a supported cipher suite.
[ ... repeated for multiple attempts ...]

gnutls-cli-debug on its side reports
alpha ~ # gnutls-cli-debug -d 10 -p 18000 127.0.0.1
Resolving '127.0.0.1'...
Connecting to '127.0.0.1:18000'...
|<4>| REC[0x61d280]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x61d280]: Allocating epoch #1
|<3>| HSK[0x61d280]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x61d280]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Removing ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Removing ciphersuite: ANON_DH_ARCFOUR_MD5
|<3>| HSK[0x61d280]: Keeping ciphersuite: RSA_EXPORT_ARCFOUR_40_MD5
|<3>| HSK[0x61d280]: CLIENT HELLO was sent [57 bytes]
|<6>| BUF[HSK]: Inserted 57 bytes of Data
|<7>| HWRITE: enqueued 57. Total 57 bytes.
|<7>| HWRITE FLUSH: 57 bytes in buffer.
|<4>| REC[0x61d280]: Sending Packet[0] Handshake(22) with length: 57
|<7>| WRITE: enqueued 62 bytes for 0x4. Total 62 bytes.
|<4>| REC[0x61d280]: Sent Packet[1] Handshake(22) with length: 62
|<7>| HWRITE: wrote 57 bytes, 0 bytes left.
|<7>| WRITE FLUSH: 62 bytes in buffer.
|<7>| WRITE: wrote 62 bytes, 0 bytes left.
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x61d280]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x61d280]: Received Packet[0] Alert(21) with length: 2
|<7>| READ: Got 2 bytes from 0x4
|<7>| READ: read 2 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 2 bytes.
|<7>| RB: Requested 7 bytes
|<4>| REC[0x61d280]: Decrypted Packet[0] Alert(21) with length: 2
|<4>| REC[0x61d280]: Alert[2|40] - Handshake failed - was received
|<2>| ASSERT: gnutls_record.c:726
|<2>| ASSERT: gnutls_record.c:1122
|<2>| ASSERT: gnutls_handshake.c:2762
|<6>| BUF[HSK]: Cleared Data from buffer
Checking for SSL 3.0 support... no
|<6>| BUF[HSK]: Cleared Data from buffer
|<4>| REC[0x61d280]: Epoch #0 freed
|<4>| REC[0x61d280]: Epoch #1 freed
|<4>| REC[0x61d280]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x61d280]: Allocating epoch #1
|<3>| HSK[0x61d280]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1
|<3>| HSK[0x61d280]: Removing ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Removing ciphersuite: ANON_DH_AES_128_CBC_SHA1
|<2>| EXT[0x61d280]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x61d280]: CLIENT HELLO was sent [62 bytes]
|<6>| BUF[HSK]: Inserted 62 bytes of Data
|<7>| HWRITE: enqueued 62. Total 62 bytes.
|<7>| HWRITE FLUSH: 62 bytes in buffer.
|<4>| REC[0x61d280]: Sending Packet[0] Handshake(22) with length: 62
|<7>| WRITE: enqueued 67 bytes for 0x4. Total 67 bytes.
|<4>| REC[0x61d280]: Sent Packet[1] Handshake(22) with length: 67
|<7>| HWRITE: wrote 62 bytes, 0 bytes left.
|<7>| WRITE FLUSH: 67 bytes in buffer.
|<7>| WRITE: wrote 67 bytes, 0 bytes left.
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x61d280]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x61d280]: Received Packet[0] Alert(21) with length: 2
|<7>| READ: Got 2 bytes from 0x4
|<7>| READ: read 2 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 2 bytes.
|<7>| RB: Requested 7 bytes
|<4>| REC[0x61d280]: Decrypted Packet[0] Alert(21) with length: 2
|<4>| REC[0x61d280]: Alert[2|40] - Handshake failed - was received
|<2>| ASSERT: gnutls_record.c:726
|<2>| ASSERT: gnutls_record.c:1122
|<2>| ASSERT: gnutls_handshake.c:2762
|<6>| BUF[HSK]: Cleared Data from buffer
Checking whether %COMPAT is required... yes
|<6>| BUF[HSK]: Cleared Data from buffer
|<4>| REC[0x61d280]: Epoch #0 freed
|<4>| REC[0x61d280]: Epoch #1 freed
|<4>| REC[0x61d280]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x61d280]: Allocating epoch #1
|<3>| HSK[0x61d280]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x61d280]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x61d280]: Removing ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Removing ciphersuite: ANON_DH_ARCFOUR_MD5
|<3>| HSK[0x61d280]: Keeping ciphersuite: RSA_EXPORT_ARCFOUR_40_MD5
|<2>| EXT[0x61d280]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x61d280]: CLIENT HELLO was sent [64 bytes]
|<6>| BUF[HSK]: Inserted 64 bytes of Data
|<7>| HWRITE: enqueued 64. Total 64 bytes.
|<7>| HWRITE FLUSH: 64 bytes in buffer.
|<4>| REC[0x61d280]: Sending Packet[0] Handshake(22) with length: 64
|<7>| WRITE: enqueued 69 bytes for 0x4. Total 69 bytes.
|<4>| REC[0x61d280]: Sent Packet[1] Handshake(22) with length: 69
|<7>| HWRITE: wrote 64 bytes, 0 bytes left.
|<7>| WRITE FLUSH: 69 bytes in buffer.
|<7>| WRITE: wrote 69 bytes, 0 bytes left.
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x61d280]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x61d280]: Received Packet[0] Alert(21) with length: 2
|<7>| READ: Got 2 bytes from 0x4
|<7>| READ: read 2 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 2 bytes.
|<7>| RB: Requested 7 bytes
|<4>| REC[0x61d280]: Decrypted Packet[0] Alert(21) with length: 2
|<4>| REC[0x61d280]: Alert[2|40] - Handshake failed - was received
|<2>| ASSERT: gnutls_record.c:726
|<2>| ASSERT: gnutls_record.c:1122
|<2>| ASSERT: gnutls_handshake.c:2762
|<6>| BUF[HSK]: Cleared Data from buffer
Checking for TLS 1.0 support... no
|<6>| BUF[HSK]: Cleared Data from buffer
|<4>| REC[0x61d280]: Epoch #0 freed
|<4>| REC[0x61d280]: Epoch #1 freed
|<4>| REC[0x61d280]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x61d280]: Allocating epoch #1
|<3>| HSK[0x61d280]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x61d280]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x61d280]: Removing ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Removing ciphersuite: ANON_DH_ARCFOUR_MD5
|<2>| EXT[0x61d280]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x61d280]: CLIENT HELLO was sent [62 bytes]
|<6>| BUF[HSK]: Inserted 62 bytes of Data
|<7>| HWRITE: enqueued 62. Total 62 bytes.
|<7>| HWRITE FLUSH: 62 bytes in buffer.
|<4>| REC[0x61d280]: Sending Packet[0] Handshake(22) with length: 62
|<7>| WRITE: enqueued 67 bytes for 0x4. Total 67 bytes.
|<4>| REC[0x61d280]: Sent Packet[1] Handshake(22) with length: 67
|<7>| HWRITE: wrote 62 bytes, 0 bytes left.
|<7>| WRITE FLUSH: 67 bytes in buffer.
|<7>| WRITE: wrote 67 bytes, 0 bytes left.
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x61d280]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x61d280]: Received Packet[0] Alert(21) with length: 2
|<7>| READ: Got 2 bytes from 0x4
|<7>| READ: read 2 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 2 bytes.
|<7>| RB: Requested 7 bytes
|<4>| REC[0x61d280]: Decrypted Packet[0] Alert(21) with length: 2
|<4>| REC[0x61d280]: Alert[2|40] - Handshake failed - was received
|<2>| ASSERT: gnutls_record.c:726
|<2>| ASSERT: gnutls_record.c:1122
|<2>| ASSERT: gnutls_handshake.c:2762
|<6>| BUF[HSK]: Cleared Data from buffer
Checking for TLS 1.1 support... no
|<6>| BUF[HSK]: Cleared Data from buffer
|<4>| REC[0x61d280]: Epoch #0 freed
|<4>| REC[0x61d280]: Epoch #1 freed
|<4>| REC[0x61d280]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x61d280]: Allocating epoch #1
|<3>| HSK[0x61d280]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x61d280]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x61d280]: Removing ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Removing ciphersuite: ANON_DH_ARCFOUR_MD5
|<2>| EXT[0x61d280]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x61d280]: CLIENT HELLO was sent [62 bytes]
|<6>| BUF[HSK]: Inserted 62 bytes of Data
|<7>| HWRITE: enqueued 62. Total 62 bytes.
|<7>| HWRITE FLUSH: 62 bytes in buffer.
|<4>| REC[0x61d280]: Sending Packet[0] Handshake(22) with length: 62
|<7>| WRITE: enqueued 67 bytes for 0x4. Total 67 bytes.
|<4>| REC[0x61d280]: Sent Packet[1] Handshake(22) with length: 67
|<7>| HWRITE: wrote 62 bytes, 0 bytes left.
|<7>| WRITE FLUSH: 67 bytes in buffer.
|<7>| WRITE: wrote 67 bytes, 0 bytes left.
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x61d280]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x61d280]: Received Packet[0] Alert(21) with length: 2
|<7>| READ: Got 2 bytes from 0x4
|<7>| READ: read 2 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 2 bytes.
|<7>| RB: Requested 7 bytes
|<4>| REC[0x61d280]: Decrypted Packet[0] Alert(21) with length: 2
|<4>| REC[0x61d280]: Alert[2|40] - Handshake failed - was received
|<2>| ASSERT: gnutls_record.c:726
|<2>| ASSERT: gnutls_record.c:1122
|<2>| ASSERT: gnutls_handshake.c:2762
|<6>| BUF[HSK]: Cleared Data from buffer
Checking fallback from TLS 1.1 to... failed
|<6>| BUF[HSK]: Cleared Data from buffer
|<4>| REC[0x61d280]: Epoch #0 freed
|<4>| REC[0x61d280]: Epoch #1 freed
|<4>| REC[0x61d280]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x61d280]: Allocating epoch #1
|<3>| HSK[0x61d280]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x61d280]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x61d280]: Removing ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Removing ciphersuite: ANON_DH_ARCFOUR_MD5
|<2>| EXT[0x61d280]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x61d280]: CLIENT HELLO was sent [62 bytes]
|<6>| BUF[HSK]: Inserted 62 bytes of Data
|<7>| HWRITE: enqueued 62. Total 62 bytes.
|<7>| HWRITE FLUSH: 62 bytes in buffer.
|<4>| REC[0x61d280]: Sending Packet[0] Handshake(22) with length: 62
|<7>| WRITE: enqueued 67 bytes for 0x4. Total 67 bytes.
|<4>| REC[0x61d280]: Sent Packet[1] Handshake(22) with length: 67
|<7>| HWRITE: wrote 62 bytes, 0 bytes left.
|<7>| WRITE FLUSH: 67 bytes in buffer.
|<7>| WRITE: wrote 67 bytes, 0 bytes left.
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x61d280]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x61d280]: Received Packet[0] Alert(21) with length: 2
|<7>| READ: Got 2 bytes from 0x4
|<7>| READ: read 2 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 2 bytes.
|<7>| RB: Requested 7 bytes
|<4>| REC[0x61d280]: Decrypted Packet[0] Alert(21) with length: 2
|<4>| REC[0x61d280]: Alert[2|40] - Handshake failed - was received
|<2>| ASSERT: gnutls_record.c:726
|<2>| ASSERT: gnutls_record.c:1122
|<2>| ASSERT: gnutls_handshake.c:2762
|<6>| BUF[HSK]: Cleared Data from buffer
Checking for TLS 1.2 support... no
|<6>| BUF[HSK]: Cleared Data from buffer
|<4>| REC[0x61d280]: Epoch #0 freed
|<4>| REC[0x61d280]: Epoch #1 freed
|<4>| REC[0x61d280]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:695
|<4>| REC[0x61d280]: Allocating epoch #1
|<3>| HSK[0x61d280]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x61d280]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x61d280]: Removing ciphersuite: ANON_DH_3DES_EDE_CBC_SHA1
|<3>| HSK[0x61d280]: Removing ciphersuite: ANON_DH_ARCFOUR_MD5
|<3>| HSK[0x61d280]: Keeping ciphersuite: RSA_EXPORT_ARCFOUR_40_MD5
|<2>| EXT[0x61d280]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x61d280]: CLIENT HELLO was sent [64 bytes]
|<6>| BUF[HSK]: Inserted 64 bytes of Data
|<7>| HWRITE: enqueued 64. Total 64 bytes.
|<7>| HWRITE FLUSH: 64 bytes in buffer.
|<4>| REC[0x61d280]: Sending Packet[0] Handshake(22) with length: 64
|<7>| WRITE: enqueued 69 bytes for 0x4. Total 69 bytes.
|<4>| REC[0x61d280]: Sent Packet[1] Handshake(22) with length: 69
|<7>| HWRITE: wrote 64 bytes, 0 bytes left.
|<7>| WRITE FLUSH: 69 bytes in buffer.
|<7>| WRITE: wrote 69 bytes, 0 bytes left.
|<7>| READ: Got 5 bytes from 0x4
|<7>| READ: read 5 bytes from 0x4
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x61d280]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x61d280]: Received Packet[0] Alert(21) with length: 2
|<7>| READ: Got 2 bytes from 0x4
|<7>| READ: read 2 bytes from 0x4
|<7>| RB: Have 5 bytes into buffer. Adding 2 bytes.
|<7>| RB: Requested 7 bytes
|<4>| REC[0x61d280]: Decrypted Packet[0] Alert(21) with length: 2
|<4>| REC[0x61d280]: Alert[2|40] - Handshake failed - was received
|<2>| ASSERT: gnutls_record.c:726
|<2>| ASSERT: gnutls_record.c:1122
|<2>| ASSERT: gnutls_handshake.c:2762
|<6>| BUF[HSK]: Cleared Data from buffer
Checking whether we need to disable TLS 1.0... yes
|<6>| BUF[HSK]: Cleared Data from buffer
|<4>| REC[0x61d280]: Epoch #0 freed
|<4>| REC[0x61d280]: Epoch #1 freed

Server does not support any of SSL 3.0, TLS 1.0 and TLS 1.1

-- 
----------------------------
Kristian Fiskerstrand
http://www.sumptuouscapital.com
Twitter: @krifisk
----------------------------
Docendo discimus
We learn by teaching
----------------------------
This email was digitally signed using the OpenPGP
standard. If you want to read more about this
The book: Sending Emails - The Safe Way: An
introduction to OpenPGP security is now
available in both Amazon Kindle and Paperback
format at
http://www.amazon.com/dp/B006RSG1S4/
----------------------------
Public PGP key 0xE3EDFAE3 at http://www.sumptuouscapital.com/pgp/

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 900 bytes
Desc: OpenPGP digital signature
URL: </pipermail/attachments/20120808/6e03b4d5/attachment.pgp>


More information about the Gnutls-help mailing list