jida...@jidanni.org writes:

> PS> Or your system's memory has a glitch, or whatever.
> PS> If it obviously a Wwwoffle bug, why have you only now discovered it? And
> PS> only you?
> I just tested it with Linux 2.6 vs. 3.0, same bug, on both of my
> computers. I suppose an upgrade to a dependency revealed the bug.
> PS> $ wwwoffle https://bugzilla.mozilla.org/
> PS> Requesting: https://bugzilla.mozilla.org/
> PS> $ wwwoffle -offline
> PS> WWWOFFLE Incorrect Password
> PS> $ sudo wwwoffle -offline
> PS> WWWOFFLE Now Offline
> PS> (I don't do poff as I don't have dialup, shouldn't matter anyway after
> PS> putting wwwoffle offline)
> Parts of lynx will still access the net.
> PS> $ wwwoffle-ls https://bugzilla.mozilla.org/
> PS> DM1DXC+wwzmqA9IEIhJkqQA    3832 Aug 20 12:49 https://bugzilla.mozilla.org/
> Odd, your bytes are much less than my 16367.
> PS> $ https_proxy=http://localhost:8080/ lynx -dump
> PS> https://bugzilla.mozilla.org | wc
> PS>      25     102     943
> Better check what it says and if it is truncated...

I think that you will find that it is truncated - it was for me.


There seems to be a bug with gnutls on the latest Debian (version
2.12.7-6 for me).  Taking the example code from the gnutls
documentation and compiling it gives me an SSL server that will not
accept connections from Iceweasel, wget or the example client from the
same gnutls documentation.

http://www.gnu.org/software/gnutls/manual/html_node/Echo-Server-with-X_002e509-authentication.html
http://www.gnu.org/software/gnutls/manual/html_node/Simple-client-example-with-X_002e509-certificate-support.html

If you want to try it yourself using the certificate files from
WWWOFFLE that you just need to compile it with:

#define KEYFILE "/var/spool/wwwoffle/certificates/server/localhost-key.pem"
#define CERTFILE "/var/spool/wwwoffle/certificates/server/localhost-cert.pem"
#define CAFILE "/var/spool/wwwoffle/certificates/root/root-cert.pem"

and also comment out:

//  gnutls_certificate_set_x509_crl_file (x509_cred, CRLFILE,
//                                        GNUTLS_X509_FMT_PEM);


When run the server says:

| Server ready. Listening to port '5556'.
|
| - connection from 127.0.0.1, port 34901
| *** Handshake has failed (Could not negotiate a supported cipher suite.)

and the client says:

| *** Handshake failed
| GnuTLS error: A TLS packet with unexpected length was received.


Within WWWOFFLE the handshake function from gnutls is crashing rather
than returning with the error status.  This is what is causing the
problem using https proxying through WWWOFFLE.

-- 
Andrew.
----------------------------------------------------------------------
Andrew M. Bishop                             a...@gedanken.demon.co.uk
                                      http://www.gedanken.demon.co.uk/

WWWOFFLE users page:
        http://www.gedanken.demon.co.uk/wwwoffle/version-2.9/user.html



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to