Hello Wan-Teh and All,

I am now getting curiously confused with the problem.

Another cipher I saw today which has similar issues.

Tool using NSS fails to perform handshake with cipher 
SSL_RSA_WITH_DES_CBC_SHA. But Openssl is able to perform handshake with its 
cipher equivalant DES-CBC-SHA.
I am doubtful if this cipher is also not supported by the NSS? If it is so 
then why this time it fails to handshake?
NSS version the tool using is 3.12.

> I don't know why the tool can get all the information using
> a cipher that NSS doesn't support.   NSS cannot request
> the SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA cipher,
> so a server cannot possibly select that cipher when
> communicating with an NSS-based client.

Is there any detail document available for SSL_ForceHandshake.

> You'll need to use a tool such as NSS's ssltap
> or wireshark to find out what exactly is going on in
> the SSL handshake, or ask the tool's vendor.

The tool just uses SSL_ForceHandshake function to perform handshake. What 
more details do you think we should get in order to explore the issue more?

I do not know the details of what to look using Wireshark. I will give it a 
try and let you know if I have any doubts.

> Wan-Teh

Regards,
Abhishek 


-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to