Closed bararchy closed 9 years ago
Also OpenSSL s_client shows this:
openssl s_client -host 127.0.0.1 -port 55555
CONNECTED(00000003)
140014019843728:error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert handshake failure:s23_clnt.c:769:
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 7 bytes and written 348 bytes
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
---
according to error messages, the server couldn't negotiate a cipher algorithm. Is any particular reason why you need to explicitly disable RSA (!kRSA)? My guess is that RSA is used as a signature algorithm in your certificate.
Anyway, I think this is more of a openssl related question, nothing to do with the binding per se.
@datanoise my bad... this is what happens when you overkill with hardening
Working with "!ADH:!RC4:!aNULL:!MD5:!EXPORT:!SSLv2:HIGH"
Sorry. Closing issue.
I'm using the following code:
Using your lib, latest version (I have a key.pem and cert.pem which I know works with ruby And I try scanning my socket using
1) https://github.com/bararchy/ruby-SSLscanner 2) https://github.com/rbsec/sslscan
Both show that the server dosn't support any cipher, and from the server I get those errors: