On Fri, Dec 18, 2009 at 6:33 AM, Abhishek Rahirikar
<abhishek.rahiri...@gmail.com> wrote:
> Hi,
>
> I am a new user of NSS.
>
> I am testing a tool that checks if any weak cipher are supported by the web
> application server. The tool is based on NSS.
> The tool reports some ciphers that are supported. It uses SSL_ForceHandshake
> function to detect if the handshake is possible or not. SSL_ForceHandshake
> function returns SECSuccess and I can get the certificate later.
> When cross-checked using Openssl for the same ciphers I get following error:
>
> C:\OpenSSL\bin>openssl s_client -host host_name.com -port 443 -ssl3 -cipher
> EXP-ADH-DES-CBC-SHA
> Loading 'screen' into random state - done
> CONNECTED(0000077C)
> 4648:error:14094410:SSL routines:SSL3_READ_BYTES:sslv3 alert handshake
> failure:.\ssl\s3_pkt.c:1061:SSL alert number 40
> 4648:error:1409E0E5:SSL routines:SSL3_WRITE_BYTES:ssl handshake
> failure:.\ssl\s3_pkt.c:530:

NSS doesn't support the EXP-ADH-DES-CBC-SHA cipher suite.
The full name of that cipher suite is
SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA.

NSS doesn't support any of the anonymous Diffie-Hellman
cipher suites.  The cipher suites supported by NSS are
listed in
http://www.mozilla.org/projects/security/pki/nss/nss-3.11/nss-3.11-algorithms.html
and in the source file sslenum.c:
http://bonsai.mozilla.org/cvsblame.cgi?file=mozilla/security/nss/lib/ssl/sslenum.c&mark=58-147&rev=1.16#47

Wan-Teh
I
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to