-
-
Notifications
You must be signed in to change notification settings - Fork 11k
Closed
Milestone
Description
As the title says, 1.1.0 s_server is not working with secp384r1 and secp521r1, but at 1.0.2a it is ok.
I tried OpenSSL 1.1.0 and OpenSSL 1.0.2a with curves from ecparam -list_curves and these 2 curves differs.
OpenSSL 1.0.2a s_client and s_server - both curves are ok
OpenSSL 1.1.0 s_server:
error:1417A0C1:SSL routines:tls_post_process_client_hello:no shared
cipher:ssl/statem/statem_srvr.c:1422
then OpenSSL 1.1.0 s_client:
error:14094410:SSL routines:ssl3_read_bytes:sslv3 alert handshake
failure:ssl/record/rec_layer_s3.c:1382:SSL alert number 40
Keys and certs generated by:
openssl ecparam -genkey -name prime256v1 -out ca.key
openssl req -x509 -batch -new -key ca.key -out ca.cert -subj '/CN=ca'
for t in server client; do
openssl ecparam -genkey -name prime256v1 -out $t.key
openssl req -batch -new -key $t.key -out $t.csr -subj "/CN=$t"
openssl x509 -req -CAkey ca.key -CA ca.cert -CAcreateserial
-in $t.csr -out $t.cert
rm -f $t.csr
done
s_server command:
openssl s_server -key server.key -cert server.cert -CAfile ca.cert
-sigalgs ECDSA+SHA384:ECDSA+SHA256 -Verify 1 -named_curve secp384r1
s_client command:
openssl s_client -connect localhost:4433 -cert client.cert -key
client.key -CAfile ca.cert -tls1_2 -sigalgs ECDSA+SHA384:ECDSA+SHA256
tomato42, triska, theilgaard, hardware, ovr and 1 more
Metadata
Metadata
Assignees
Labels
No labels