Nelson B Bolyard wrote:
tstclnt is able to support protocols in which the client speaks first,
and protocols in which the server speaks first.  By default, it supports
protocols in which the server speaks first.  To make it support protocols
in which the client speaks first, use the -f command line option.  Most
IETF applications protocols are server-speaks-first protocols.  HTTP is an
exception.  With it, client speaks first.  The effect of the -f flag is
somewhat negligible on Unix, but on Windows it makes a BIG difference.
I suspect that you did the above test on Windows.  Try it with -f.


I got some info from Glenn and I was told to try vfyserv and that worked out OK with the right switches:
vfyserv -p 9443 -C :c005 mink.pki -d .

He also had me build NSS/NSPR/JSS a little differently. I used the head for each and it was working ok. I need to go back now and use the RTM versions and see if things are still ok. The server I'm contacting is a FC8 box running Dogtag so ultimately NSS/JSS are the libraries being used to serve the pages. Now, those are custom built to support the 3rd party EC module as instructed on their wiki pages and all certs in the chain are using NIST P384 curve. One of the things Glenn had me do differently is use the extended EC env var and pull a specific version of the eccurve header file after checking out the other pieces.

Knowing I need to explicitly enable the newer ciphers helps.

As an aside, the usage for vfyserv would be a lot better if it told you what format it was expecting the Ciphers in...I had to browse the source and do some trial and error to figure out ":c005".

Dave
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to