Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- mime@kira:~ % gnutls-cli-debug -p 5556 192.168.2.4
- Resolving '192.168.2.4'...
- Connecting to '192.168.2.4:5556'...
- Checking for TLS 1.1 support... no
- Checking fallback from TLS 1.1 to... TLS 1.0
- Checking for TLS 1.0 support... yes
- Checking for SSL 3.0 support... yes
- Checking for HTTPS server name... not checked
- Checking for version rollback bug in RSA PMS... yes
- Checking for version rollback bug in Client Hello... no
- Checking whether we need to disable TLS 1.0... N/A
- Checking whether the server ignores the RSA PMS version... no
- Checking whether the server can accept Hello Extensions... yes
- Checking whether the server can accept cipher suites not in SSL 3.0 spec... no
- Checking whether the server can accept a bogus TLS record version in the client hello... no
- Checking for certificate information... N/A
- Checking for trusted CAs... N/A
- Checking whether the server understands TLS closure alerts... partially
- Checking whether the server supports session resumption... yes
- Checking for export-grade ciphersuite support... yes
- Checking RSA-export ciphersuite info... N/A
- Checking for anonymous authentication support... no
- Checking anonymous Diffie-Hellman group info... N/A
- Checking for ephemeral Diffie-Hellman support... no
- Checking ephemeral Diffie-Hellman group info... N/A
- Checking for AES cipher support (TLS extension)... no
- Checking for CAMELLIA cipher support (TLS extension)... no
- Checking for 3DES cipher support... no
- Checking for ARCFOUR 128 cipher support... no
- Checking for ARCFOUR 40 cipher support... yes
- Checking for MD5 MAC support... yes
- Checking for SHA1 MAC support... no
- Checking for LZO compression support (GnuTLS extension)... no
- Checking for max record size (TLS extension)... no
- Checking for SRP authentication support (TLS extension)... yes
- Checking for OpenPGP authentication support (TLS extension)... no
- mime@kira:~ %
- mime@kira:~ % gnutls-cli -p 5556 192.168.2.4 -d 4711 -V
- Resolving '192.168.2.4'...
- Connecting to '192.168.2.4:5556'...
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA1
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: DHE_PSK_SHA_AES_128_CBC_SHA1
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: DHE_PSK_SHA_AES_256_CBC_SHA1
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: DHE_PSK_SHA_3DES_EDE_CBC_SHA1
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: DHE_PSK_SHA_ARCFOUR_SHA1
- |<3>| HSK[0x8063c60]: Removing ciphersuite: SRP_SHA_RSA_AES_128_CBC_SHA1
- |<3>| HSK[0x8063c60]: Removing ciphersuite: SRP_SHA_RSA_AES_256_CBC_SHA1
- |<3>| HSK[0x8063c60]: Removing ciphersuite: SRP_SHA_RSA_3DES_EDE_CBC_SHA1
- |<3>| HSK[0x8063c60]: Removing ciphersuite: SRP_SHA_DSS_AES_128_CBC_SHA1
- |<3>| HSK[0x8063c60]: Removing ciphersuite: SRP_SHA_DSS_AES_256_CBC_SHA1
- |<3>| HSK[0x8063c60]: Removing ciphersuite: SRP_SHA_DSS_3DES_EDE_CBC_SHA1
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: RSA_ARCFOUR_MD5
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: PSK_SHA_AES_128_CBC_SHA1
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: PSK_SHA_AES_256_CBC_SHA1
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: PSK_SHA_3DES_EDE_CBC_SHA1
- |<3>| HSK[0x8063c60]: Keeping ciphersuite: PSK_SHA_ARCFOUR_SHA1
- |<3>| HSK[0x8063c60]: Removing ciphersuite: SRP_SHA_AES_128_CBC_SHA1
- |<3>| HSK[0x8063c60]: Removing ciphersuite: SRP_SHA_AES_256_CBC_SHA1
- |<3>| HSK[0x8063c60]: Removing ciphersuite: SRP_SHA_3DES_EDE_CBC_SHA1
- |<2>| EXT[0x8063c60]: Sending extension CERT_TYPE
- |<2>| EXT[0x8063c60]: Sending extension SERVER_NAME
- |<3>| HSK[0x8063c60]: CLIENT HELLO was send [124 bytes]
- |<6>| BUF[HSK]: Peeked 0 bytes of Data
- |<6>| BUF[HSK]: Emptied buffer
- |<4>| REC[0x8063c60]: Sending Packet[0] Handshake(22) with length: 124
- |<2>| ASSERT: gnutls_cipher.c:204
- |<7>| WRITE: Will write 129 bytes to 0x4.
- |<7>| WRITE: wrote 129 bytes to 0x4. Left 0 bytes. Total 129 bytes.
- |<7>| 0000 - 16 03 02 00 7c 01 00 00 78 03 02 4b 79 a9 49 42
- |<7>| 0001 - 09 c6 86 f7 27 5f 1d a2 42 38 a1 17 08 47 96 29
- |<7>| 0002 - 53 dd ec c2 22 35 dd a5 88 bc 8d 00 00 34 00 33
- |<7>| 0003 - 00 45 00 39 00 88 00 16 00 32 00 44 00 38 00 87
- |<7>| 0004 - 00 13 00 66 00 90 00 91 00 8f 00 8e 00 2f 00 41
- |<7>| 0005 - 00 35 00 84 00 0a 00 05 00 04 00 8c 00 8d 00 8b
- |<7>| 0006 - 00 8a 01 00 00 1b 00 09 00 03 02 00 01 00 00 00
- |<7>| 0007 - 10 00 0e 00 00 0b 31 39 32 2e 31 36 38 2e 32 2e
- |<7>| 0008 - 34
- |<4>| REC[0x8063c60]: Sent Packet[1] Handshake(22) with length: 129
- |<7>| READ: Got 5 bytes from 0x4
- |<7>| 0000 - 15 03 01 00 02
- |<7>| RB: Have 0 bytes into buffer. Adding 5 bytes.
- |<7>| RB: Requested 5 bytes
- |<4>| REC[0x8063c60]: Expected Packet[0] Handshake(22) with length: 1
- |<4>| REC[0x8063c60]: Received Packet[0] Alert(21) with length: 2
- |<7>| READ: Got 2 bytes from 0x4
- |<7>| READ: read 2 bytes from 0x4
- |<7>| 0000 - 02 28
- |<7>| RB: Have 5 bytes into buffer. Adding 2 bytes.
- |<7>| RB: Requested 7 bytes
- |<2>| ASSERT: gnutls_cipher.c:204
- |<4>| REC[0x8063c60]: Decrypted Packet[0] Alert(21) with length: 2
- |<4>| REC[0x8063c60]: Alert[2|40] - Handshake failed - was received
- |<2>| ASSERT: gnutls_record.c:695
- |<2>| ASSERT: gnutls_record.c:1048
- |<2>| ASSERT: gnutls_buffers.c:1032
- |<2>| ASSERT: gnutls_handshake.c:1045
- |<2>| ASSERT: gnutls_handshake.c:2364
- |<6>| BUF[HSK]: Cleared Data from buffer
- *** Fatal error: A TLS fatal alert has been received.
- *** Received alert [40]: Handshake failed
- *** Handshake has failed
- GNUTLS ERROR: A TLS fatal alert has been received.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement