[gnutls-help] Can't get ANON auth working per the documentation example

Lavrentiev, Anton (NIH/NLM/NCBI) [C] lavr at ncbi.nlm.nih.gov
Tue Dec 17 20:01:05 CET 2013


Hi All,

I'm new here in this list, and I have a question about GNUTLS
that I do not understand.

Per the documentation example, I'm creating a client session like this:

   gnutls_anon_client_credentials_t acred;
   gnutls_anon_allocate_client_credentials(&acred);

   gnutls_set_default_priority(session);
   gnutls_priority_set_direct(session, "PERFORMANCE:+ANON-DH", NULL);
   gnutls_credentials_set(session, GNUTLS_CRD_ANON, acred);

But I get the following error (wherever I tried to connect to, whether
real HTTP servers or gnutls-serv starter locally), from gnutls_handshake():

error=-12,A TLS fatal alert has been received

I use the following command to launch gnutls-serv:

gnutls-serv.exe -d 99 -a --http

Here's what I see on the server side, followed by what's going on at the client's.

The question is why does not it work?  What I'm doing wrong?


SERVER:

|<2>| ASSERT: /cygdrive/d/misc/src/release/gnutls-3.1.4-1/src/gnutls-3.1.4/lib/pkcs11.c:456
|<2>| ASSERT: /cygdrive/d/misc/src/release/gnutls-3.1.4-1/src/gnutls-3.1.4/lib/x509/mpi.c:246
|<2>| ASSERT: /cygdrive/d/misc/src/release/gnutls-3.1.4-1/src/gnutls-3.1.4/lib/gnutls_dh_primes.c:289
Set static Diffie-Hellman parameters, consider --dhparams.
HTTP Server listening on IPv6 :: port 5556...done
HTTP Server listening on IPv4 0.0.0.0 port 5556...done
|<4>| REC[0x800ac470]: Allocating epoch #0
|<2>| ASSERT: /cygdrive/d/misc/src/release/gnutls-3.1.4-1/src/gnutls-3.1.4/lib/ext/session_ticket.c:546

* Accepted connection from IPv4 127.0.0.1 port 52175 on Tue Dec 17 13:52:20 2013
|<2>| ASSERT: /cygdrive/d/misc/src/release/gnutls-3.1.4-1/src/gnutls-3.1.4/lib/gnutls_constate.c:715
|<4>| REC[0x800ac470]: Allocating epoch #1
|<2>| ASSERT: /cygdrive/d/misc/src/release/gnutls-3.1.4-1/src/gnutls-3.1.4/lib/gnutls_buffers.c:1018
|<7>| READ: Got 5 bytes from 0x6
|<7>| READ: read 5 bytes from 0x6
|<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
|<7>| RB: Requested 5 bytes
|<4>| REC[0x800ac470]: SSL 3.0 Handshake packet received. Epoch 0, length: 135
|<4>| REC[0x800ac470]: Expected Packet Handshake(22)
|<4>| REC[0x800ac470]: Received Packet Handshake(22) with length: 135
|<7>| READ: Got 135 bytes from 0x6
|<7>| READ: read 135 bytes from 0x6
|<7>| RB: Have 5 bytes into buffer. Adding 135 bytes.
|<7>| RB: Requested 140 bytes
|<4>| REC[0x800ac470]: Decrypted Packet[0] Handshake(22) with length: 135
|<6>| BUF[REC]: Inserted 135 bytes of Data(22)
|<3>| HSK[0x800ac470]: CLIENT HELLO (1) was received. Length 131[131], frag offset 0, frag length: 131, sequence: 0
|<3>| HSK[0x800ac470]: Client's version: 3.3
|<2>| ASSERT: /cygdrive/d/misc/src/release/gnutls-3.1.4-1/src/gnutls-3.1.4/lib/gnutls_db.c:265
|<2>| ASSERT: /cygdrive/d/misc/src/release/gnutls-3.1.4-1/src/gnutls-3.1.4/lib/gnutls_db.c:297
|<3>| EXT[0x800ac470]: Found extension 'STATUS REQUEST/5'
|<3>| EXT[0x800ac470]: Found extension 'SAFE RENEGOTIATION/65281'
|<3>| EXT[0x800ac470]: Found extension 'SESSION TICKET/35'
|<3>| EXT[0x800ac470]: Found extension 'SUPPORTED ECC/10'
|<3>| EXT[0x800ac470]: Found extension 'SUPPORTED ECC POINT FORMATS/11'
|<3>| EXT[0x800ac470]: Found extension 'SIGNATURE ALGORITHMS/13'
|<3>| EXT[0x800ac470]: Found extension 'STATUS REQUEST/5'
|<3>| EXT[0x800ac470]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes)
|<3>| EXT[0x800ac470]: Parsing extension 'SESSION TICKET/35' (0 bytes)
|<3>| EXT[0x800ac470]: Found extension 'SUPPORTED ECC/10'
|<3>| EXT[0x800ac470]: Found extension 'SUPPORTED ECC POINT FORMATS/11'
|<3>| EXT[0x800ac470]: Found extension 'SIGNATURE ALGORITHMS/13'
|<3>| EXT[0x800ac470]: Parsing extension 'STATUS REQUEST/5' (5 bytes)
|<3>| EXT[0x800ac470]: Found extension 'SAFE RENEGOTIATION/65281'
|<3>| EXT[0x800ac470]: Found extension 'SESSION TICKET/35'
|<3>| EXT[0x800ac470]: Parsing extension 'SUPPORTED ECC/10' (12 bytes)
|<3>| HSK[0x800ac470]: Selected ECC curve SECP192R1 (5)
|<3>| EXT[0x800ac470]: Parsing extension 'SUPPORTED ECC POINT FORMATS/11' (2 bytes)
|<3>| EXT[0x800ac470]: Parsing extension 'SIGNATURE ALGORITHMS/13' (28 bytes)
|<3>| EXT[0x800ac470]: rcvd signature algo (4.1) RSA-SHA256
|<3>| EXT[0x800ac470]: rcvd signature algo (4.2) DSA-SHA256
|<3>| EXT[0x800ac470]: rcvd signature algo (4.3) ECDSA-SHA256
|<3>| EXT[0x800ac470]: rcvd signature algo (5.1) RSA-SHA384
|<3>| EXT[0x800ac470]: rcvd signature algo (5.3) ECDSA-SHA384
|<3>| EXT[0x800ac470]: rcvd signature algo (6.1) RSA-SHA512
|<3>| EXT[0x800ac470]: rcvd signature algo (6.3) ECDSA-SHA512
|<3>| EXT[0x800ac470]: rcvd signature algo (3.1) RSA-SHA224
|<3>| EXT[0x800ac470]: rcvd signature algo (3.2) DSA-SHA224
|<3>| EXT[0x800ac470]: rcvd signature algo (3.3) ECDSA-SHA224
|<3>| EXT[0x800ac470]: rcvd signature algo (2.1) RSA-SHA1
|<3>| EXT[0x800ac470]: rcvd signature algo (2.2) DSA-SHA1
|<3>| EXT[0x800ac470]: rcvd signature algo (2.3) ECDSA-SHA1
|<3>| HSK[0x800ac470]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1
|<3>| HSK[0x800ac470]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA256
|<3>| HSK[0x800ac470]: Removing ciphersuite: ECDHE_ECDSA_AES_128_GCM_SHA256
|<3>| HSK[0x800ac470]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1
|<3>| HSK[0x800ac470]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA384
|<3>| HSK[0x800ac470]: Removing ciphersuite: ECDHE_ECDSA_AES_256_GCM_SHA384
|<3>| HSK[0x800ac470]: Removing ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x800ac470]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1
|<3>| HSK[0x800ac470]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256
|<3>| HSK[0x800ac470]: Removing ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256
|<3>| HSK[0x800ac470]: Removing ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1
|<3>| HSK[0x800ac470]: Removing ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384
|<3>| HSK[0x800ac470]: Removing ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x800ac470]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA1
|<3>| HSK[0x800ac470]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA256
|<3>| HSK[0x800ac470]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
|<3>| HSK[0x800ac470]: Removing ciphersuite: DHE_RSA_AES_128_GCM_SHA256
|<3>| HSK[0x800ac470]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA1
|<3>| HSK[0x800ac470]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA256
|<3>| HSK[0x800ac470]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
|<3>| HSK[0x800ac470]: Removing ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x800ac470]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA1
|<3>| HSK[0x800ac470]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA256
|<3>| HSK[0x800ac470]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
|<3>| HSK[0x800ac470]: Removing ciphersuite: DHE_DSS_AES_128_GCM_SHA256
|<3>| HSK[0x800ac470]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA1
|<3>| HSK[0x800ac470]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA256
|<3>| HSK[0x800ac470]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
|<3>| HSK[0x800ac470]: Removing ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x800ac470]: Removing ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x800ac470]: Removing ciphersuite: RSA_AES_128_CBC_SHA1
|<3>| HSK[0x800ac470]: Removing ciphersuite: RSA_AES_128_CBC_SHA256
|<3>| HSK[0x800ac470]: Removing ciphersuite: RSA_CAMELLIA_128_CBC_SHA1
|<3>| HSK[0x800ac470]: Removing ciphersuite: RSA_AES_128_GCM_SHA256
|<3>| HSK[0x800ac470]: Removing ciphersuite: RSA_AES_256_CBC_SHA1
|<3>| HSK[0x800ac470]: Removing ciphersuite: RSA_AES_256_CBC_SHA256
|<3>| HSK[0x800ac470]: Removing ciphersuite: RSA_CAMELLIA_256_CBC_SHA1
|<3>| HSK[0x800ac470]: Removing ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x800ac470]: Removing ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x800ac470]: Removing ciphersuite: RSA_ARCFOUR_MD5
|<2>| ASSERT: /cygdrive/d/misc/src/release/gnutls-3.1.4-1/src/gnutls-3.1.4/lib/gnutls_handshake.c:866
|<2>| ASSERT: /cygdrive/d/misc/src/release/gnutls-3.1.4-1/src/gnutls-3.1.4/lib/gnutls_handshake.c:586
|<2>| ASSERT: /cygdrive/d/misc/src/release/gnutls-3.1.4-1/src/gnutls-3.1.4/lib/gnutls_handshake.c:2093
|<2>| ASSERT: /cygdrive/d/misc/src/release/gnutls-3.1.4-1/src/gnutls-3.1.4/lib/gnutls_handshake.c:1317
|<2>| ASSERT: /cygdrive/d/misc/src/release/gnutls-3.1.4-1/src/gnutls-3.1.4/lib/gnutls_handshake.c:2906
Error in handshake
Error: Could not negotiate a supported cipher suite.
|<4>| REC: Sending Alert[2|40] - Handshake failed
|<4>| REC[0x800ac470]: Preparing Packet Alert(21) with length: 2
|<9>| ENC[0x800ac470]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
|<7>| WRITE: enqueued 7 bytes for 0x6. Total 7 bytes.
|<7>| WRITE FLUSH: 7 bytes in buffer.
|<7>| WRITE: wrote 7 bytes, 0 bytes left.
|<4>| REC[0x800ac470]: Sent Packet[1] Alert(21) in epoch 0 and length: 7
|<2>| ASSERT: /cygdrive/d/misc/src/release/gnutls-3.1.4-1/src/gnutls-3.1.4/lib/gnutls_record.c:240
|<4>| REC[0x800ac470]: Start of epoch cleanup
|<4>| REC[0x800ac470]: End of epoch cleanup
|<4>| REC[0x800ac470]: Epoch #0 freed
|<4>| REC[0x800ac470]: Epoch #1 freed


CLIENT:

12/17/13 13:52:20 GNUTLS V3.1.4 (Loglevel=10)
12/17/13 13:52:20 GNUTLS4: REC[0x80057958]: Allocating epoch #0
12/17/13 13:52:20 SSOCK#1000[4]@127.0.0.1:5556: Connecting @:52175
12/17/13 13:52:20 TRACE: SSOCK#1000[4]@127.0.0.1:5556: Connection established
12/17/13 13:52:20 GNUTLS4: REC[0x80057958]: Allocating epoch #1
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: RSA_ARCFOUR_SHA1
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: RSA_ARCFOUR_MD5
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: RSA_AES_128_CBC_SHA1
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: RSA_AES_128_CBC_SHA256
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: RSA_CAMELLIA_128_CBC_SHA1
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: RSA_AES_256_CBC_SHA1
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: RSA_AES_256_CBC_SHA256
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: RSA_CAMELLIA_256_CBC_SHA1
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: RSA_3DES_EDE_CBC_SHA1
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: RSA_AES_128_GCM_SHA256
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA256
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA384
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: ECDHE_ECDSA_AES_128_GCM_SHA256
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: ECDHE_ECDSA_AES_256_GCM_SHA384
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA1
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA256
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA1
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA256
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: DHE_RSA_AES_128_GCM_SHA256
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: DHE_DSS_ARCFOUR_SHA1
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA1
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA256
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA1
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA256
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Removing ciphersuite: DHE_DSS_AES_128_GCM_SHA256
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Keeping ciphersuite: DH_ANON_ARCFOUR_MD5 (00.18)
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Keeping ciphersuite: DH_ANON_AES_128_CBC_SHA1 (00.34)
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Keeping ciphersuite: DH_ANON_AES_128_CBC_SHA256 (00.6C)
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Keeping ciphersuite: DH_ANON_CAMELLIA_128_CBC_SHA1 (00.46)
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Keeping ciphersuite: DH_ANON_AES_256_CBC_SHA1 (00.3A)
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Keeping ciphersuite: DH_ANON_AES_256_CBC_SHA256 (00.6D)
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Keeping ciphersuite: DH_ANON_CAMELLIA_256_CBC_SHA1 (00.89)
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Keeping ciphersuite: DH_ANON_3DES_EDE_CBC_SHA1 (00.1B)
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: Keeping ciphersuite: DH_ANON_AES_128_GCM_SHA256 (00.A6)
12/17/13 13:52:20 GNUTLS3: EXT[0x80057958]: Sending extension STATUS REQUEST (5 bytes)
12/17/13 13:52:20 GNUTLS3: EXT[0x80057958]: Sending extension SAFE RENEGOTIATION (1 bytes)
12/17/13 13:52:20 GNUTLS3: EXT[0x80057958]: Sending extension SESSION TICKET (0 bytes)
12/17/13 13:52:20 GNUTLS3: EXT[0x80057958]: Sending extension SUPPORTED ECC (12 bytes)
12/17/13 13:52:20 GNUTLS3: EXT[0x80057958]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes)
12/17/13 13:52:20 GNUTLS3: EXT[0x80057958]: sent signature algo (4.1) RSA-SHA256
12/17/13 13:52:20 GNUTLS3: EXT[0x80057958]: sent signature algo (4.2) DSA-SHA256
12/17/13 13:52:20 GNUTLS3: EXT[0x80057958]: sent signature algo (4.3) ECDSA-SHA256
12/17/13 13:52:20 GNUTLS3: EXT[0x80057958]: sent signature algo (5.1) RSA-SHA384
12/17/13 13:52:20 GNUTLS3: EXT[0x80057958]: sent signature algo (5.3) ECDSA-SHA384
12/17/13 13:52:20 GNUTLS3: EXT[0x80057958]: sent signature algo (6.1) RSA-SHA512
12/17/13 13:52:20 GNUTLS3: EXT[0x80057958]: sent signature algo (6.3) ECDSA-SHA512
12/17/13 13:52:20 GNUTLS3: EXT[0x80057958]: sent signature algo (3.1) RSA-SHA224
12/17/13 13:52:20 GNUTLS3: EXT[0x80057958]: sent signature algo (3.2) DSA-SHA224
12/17/13 13:52:20 GNUTLS3: EXT[0x80057958]: sent signature algo (3.3) ECDSA-SHA224
12/17/13 13:52:20 GNUTLS3: EXT[0x80057958]: sent signature algo (2.1) RSA-SHA1
12/17/13 13:52:20 GNUTLS3: EXT[0x80057958]: sent signature algo (2.2) DSA-SHA1
12/17/13 13:52:20 GNUTLS3: EXT[0x80057958]: sent signature algo (2.3) ECDSA-SHA1
12/17/13 13:52:20 GNUTLS3: EXT[0x80057958]: Sending extension SIGNATURE ALGORITHMS (28 bytes)
12/17/13 13:52:20 GNUTLS3: HSK[0x80057958]: CLIENT HELLO was queued [135 bytes]
12/17/13 13:52:20 GNUTLS7: HWRITE: enqueued [CLIENT HELLO] 135. Total 135 bytes.
12/17/13 13:52:20 GNUTLS7: HWRITE FLUSH: 135 bytes in buffer.
12/17/13 13:52:20 GNUTLS4: REC[0x80057958]: Preparing Packet Handshake(22) with length: 135
12/17/13 13:52:20 GNUTLS9: ENC[0x80057958]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
12/17/13 13:52:20 GNUTLS7: WRITE: enqueued 140 bytes for 0x80015308. Total 140 bytes.
12/17/13 13:52:20 GNUTLS4: REC[0x80057958]: Sent Packet[1] Handshake(22) in epoch 0 and length: 140
12/17/13 13:52:20 GNUTLS7: HWRITE: wrote 1 bytes, 0 bytes left.
12/17/13 13:52:20 GNUTLS7: WRITE FLUSH: 140 bytes in buffer.
12/17/13 13:52:20 GNUTLS7: WRITE: wrote 140 bytes, 0 bytes left.
12/17/13 13:52:20 GNUTLS7: READ: Got 5 bytes from 0x80015308
12/17/13 13:52:20 GNUTLS7: READ: read 5 bytes from 0x80015308
12/17/13 13:52:20 GNUTLS7: RB: Have 0 bytes into buffer. Adding 5 bytes.
12/17/13 13:52:20 GNUTLS7: RB: Requested 5 bytes
12/17/13 13:52:20 GNUTLS4: REC[0x80057958]: SSL 3.3 Alert packet received. Epoch 0, length: 2
12/17/13 13:52:20 GNUTLS4: REC[0x80057958]: Expected Packet Handshake(22)
12/17/13 13:52:20 GNUTLS4: REC[0x80057958]: Received Packet Alert(21) with length: 2
12/17/13 13:52:20 GNUTLS7: READ: Got 2 bytes from 0x80015308
12/17/13 13:52:20 GNUTLS7: READ: read 2 bytes from 0x80015308
12/17/13 13:52:20 GNUTLS7: RB: Have 5 bytes into buffer. Adding 2 bytes.
12/17/13 13:52:20 GNUTLS7: RB: Requested 7 bytes
12/17/13 13:52:20 GNUTLS4: REC[0x80057958]: Decrypted Packet[0] Alert(21) with length: 2
12/17/13 13:52:20 GNUTLS4: REC[0x80057958]: Alert[2|40] - Handshake failed - was received
12/17/13 13:52:20 ERROR: Failed SSL hello: Closed {error=-12,A TLS fatal alert has been received}
12/17/13 13:52:20 GNUTLS4: REC[0x80057958]: Start of epoch cleanup
12/17/13 13:52:20 GNUTLS4: REC[0x80057958]: End of epoch cleanup
12/17/13 13:52:20 GNUTLS4: REC[0x80057958]: Epoch #0 freed
12/17/13 13:52:20 GNUTLS4: REC[0x80057958]: Epoch #1 freed


Thanks in advance for any help!

Anton Lavrentiev
Contractor NIH/NLM/NCBI




More information about the Gnutls-help mailing list