insufficient credentials for that request

Ali Khalfan ali.khalfan at gmail.com
Thu Oct 4 23:22:07 CEST 2012


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

I fixed this by installing the latest release (3.1.2),  maybe openvas5
has an issue with gnutls-2.8



- -------- Original Message --------
Subject: insufficient credentials for that request
From: Ali Khalfan <ali.khalfan at gmail.com>
To: GnuTLS mailing list <help-gnutls at gnu.org>
Date: Thu Sep 27 2012 13:58:23 GMT+0300 (AST)

> I have got gnutls-serv running as such :
> 
> sudo gnutls-serv -d 15 --x509keyfile serverkey.pem --x509certfile 
> servercert.pem --x509cafile cacert.pem -p 9393
> 
> 
> 
> I am trying to run another program that connects to port 9393  and
> I get an insufficient credentials error  as shown in the debug
> message below
> 
> Can anyone shed some light on this ?
> 
> 
> 
> * Accepted connection from IPv4 127.0.0.1 port 50607 on Thu Sep 27 
> 13:49:49 2012 |<2>| ASSERT: gnutls_constate.c:695 |<4>|
> REC[0x9be18a0]: Allocating epoch #1 |<7>| READ: Got 5 bytes from
> 0x5 |<7>| READ: read 5 bytes from 0x5 |<7>| RB: Have 0 bytes into
> buffer. Adding 5 bytes. |<7>| RB: Requested 5 bytes |<4>|
> REC[0x9be18a0]: Expected Packet[0] Handshake(22) with length: 1 
> |<4>| REC[0x9be18a0]: Received Packet[0] Handshake(22) with length:
> 108 |<7>| READ: Got 108 bytes from 0x5 |<7>| READ: read 108 bytes
> from 0x5 |<7>| RB: Have 5 bytes into buffer. Adding 108 bytes. 
> |<7>| RB: Requested 113 bytes |<4>| REC[0x9be18a0]: Decrypted
> Packet[0] Handshake(22) with length: 108 |<6>| BUF[HSK]: Inserted
> 108 bytes of Data(22) |<6>| BUF[REC][HD]: Read 1 bytes of Data(22) 
> |<6>| BUF[REC][HD]: Read 3 bytes of Data(22) |<3>| HSK[0x9be18a0]:
> CLIENT HELLO was received [108 bytes] |<6>| BUF[REC][HD]: Read 104
> bytes of Data(22) |<6>| BUF[HSK]: Inserted 4 bytes of Data |<6>|
> BUF[HSK]: Inserted 104 bytes of Data |<3>| HSK[0x9be18a0]: Client's
> version: 3.3 |<2>| ASSERT: gnutls_db.c:326 |<2>| ASSERT:
> gnutls_db.c:246 |<2>| EXT[0x9be18a0]: Parsing extension 'SAFE
> RENEGOTIATION/65281' (1 bytes) |<2>| EXT[0x9be18a0]: Parsing
> extension 'SIGNATURE ALGORITHMS/13' (16 bytes) |<2>| EXT[SIGA]:
> rcvd signature algo (4.1) RSA-SHA256 |<2>| EXT[SIGA]: rcvd
> signature algo (4.2) DSA-SHA256 |<2>| EXT[SIGA]: rcvd signature
> algo (4.3) GOST R 34.10-94 |<2>| EXT[SIGA]: rcvd signature algo
> (5.1) RSA-SHA384 |<2>| EXT[SIGA]: rcvd signature algo (5.3) GOST R
> 34.10-94 |<2>| EXT[SIGA]: rcvd signature algo (6.1) RSA-SHA512 
> |<2>| EXT[SIGA]: rcvd signature algo (6.3) GOST R 34.10-94 |<2>|
> ASSERT: gnutls_handshake.c:3348 |<1>| Could not find an appropriate
> certificate: Insufficient credentials for that request.
> 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/
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=iKJO
-----END PGP SIGNATURE-----




More information about the Gnutls-help mailing list