[Modules] mod_gnutls: any chance for TLS-PSK (previous msg was wrong!)
ntbox at mardys.de
Mon Nov 15 16:51:59 EST 2010
On 15.11.2010 17:20, Nikos Mavrogiannopoulos wrote:
> On Mon, Nov 15, 2010 at 3:38 PM, Hardy Griech<ntbox at mardys.de> wrote:
>> I've set DEBUG to 1. The output doesn't help too much I think:
>> mgs_hook_authz: 865
>> mgs_hook_authz: 877
>> mgs_hook_authz: 901
>> mgs_hook_fixups: 780
>> <2> ASSERT: gnutls_srp.c:653
>> mgs_add_common_cert_vars: 942
>> <4> REC[0x2a23ada0]: Sending Packet Application Data(23) with length: 133
>> <4> REC[0x2a23ada0]: Sent Packet Application Data(23) with length: 261
>> <4> REC[0x2a23ada0]: Sending Packet Application Data(23) with length:
>> <4> REC[0x2a23ada0]: Sent Packet Application Data(23) with length: 1509
> Is this the connection that gives that error to the client?
> *** Fatal error: A TLS fatal alert has been received.
> *** Received alert : Insufficient security
> *** Handshake has failed
M at rde! Previous message was wrong.
The log above belongs to the client message
|<7>| READ: Got 0 bytes from 0x4
|<7>| READ: read 0 bytes from 0x4
|<7>| 0000 -
|<2>| ASSERT: gnutls_buffers.c:601
|<2>| ASSERT: gnutls_record.c:917
*** Fatal error: A TLS packet with unexpected length was received.
*** Server has terminated the connection abnormally.
random usage: poolsize=600 mixed=23 polls=25/110 added=577/12688
outmix=2 getlvl1=2/9 getlvl2=0/0
|<6>| BUF[HSK]: Cleared Data from buffer
PS: to summarize: the client is connecting successfully to the server,
data exchange also works. But at the end of the conversation, the
connection seems to be aborted by the server. Thus the client reads 0
bytes from 0x04.
More information about the Modules