help-gnutls
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: nOOb Error : No certificates found!


From: gonzagueddr
Subject: Re: nOOb Error : No certificates found!
Date: Wed, 14 Apr 2010 09:15:14 +0200
User-agent: Thunderbird 2.0.0.24 (Windows/20100228)

Hi, the server (gnutls 2.8.6) is running on a debian sid distrib (domain.org ), in my home, and the client (2.4.2 ) is on a debian lenny in my office, both commands were ran over ssh. I also tried to run serv and cli on the same machine, for the same result ...
I used certtool to make the .pem :

certtool --generate-privkey > cakey.pem
certtool --generate-self-signed --load-privkey cakey.pem --template ca.info --outfile cacert.pem
certtool --generate-privkey > serverkey.pem
certtool --generate-certificate --load-privkey serverkey.pem --load-ca-certificate cacert.pem --load-ca-privkey cakey.pem --template server.info --outfile servercert.pem

Here is my ca.info :

cn = domain.org
ca
cert_signing_key

and the server.info :

organization = domain.org
cn = domain.org
tls_www_server
encryption_key
signing_key

Looking the log whith the "-d 9" option, i notice a packet's length trouble, but don't know what it's mean.

Here is the full log for the server :

Processed 1 CA certificate(s).
Echo Server listening on 0.0.0.0 port 22222 family 2...done
Echo Server listening on :: port 22222 family 10...done
|<4>| REC[0x9369438]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x9369438]: Received Packet[0] Handshake(22) with length: 134
|<2>| ASSERT: gnutls_cipher.c:204
|<4>| REC[0x9369438]: Decrypted Packet[0] Handshake(22) with length: 134
|<3>| HSK[0x9369438]: CLIENT HELLO was received [134 bytes]
|<3>| HSK[0x9369438]: Client's version: 3.2
|<2>| ASSERT: gnutls_db.c:326
|<2>| ASSERT: gnutls_db.c:246
|<2>| EXT[0x9369438]: Received extension 'CERT_TYPE/9'
|<2>| EXT[0x9369438]: Received extension 'SERVER_NAME/0'
|<2>| EXT[0x9369438]: Received extension 'CERT_TYPE/9'
|<2>| EXT[0x9369438]: Received extension 'SERVER_NAME/0'
|<2>| ASSERT: gnutls_x509.c:948
|<2>| ASSERT: gnutls_x509.c:948
|<2>| ASSERT: gnutls_x509.c:948
|<3>| HSK[0x9369438]: Removing ciphersuite: PSK_SHA_ARCFOUR_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: PSK_SHA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: PSK_SHA_AES_128_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: PSK_SHA_AES_256_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_PSK_SHA_ARCFOUR_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_PSK_SHA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_PSK_SHA_AES_128_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_PSK_SHA_AES_256_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: SRP_SHA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: SRP_SHA_AES_128_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: SRP_SHA_AES_256_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: SRP_SHA_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: SRP_SHA_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: SRP_SHA_DSS_AES_128_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: SRP_SHA_RSA_AES_128_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: SRP_SHA_DSS_AES_256_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: SRP_SHA_RSA_AES_256_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
|<3>| HSK[0x9369438]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
|<3>| HSK[0x9369438]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x9369438]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x9369438]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x9369438]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1
|<3>| HSK[0x9369438]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1
|<3>| HSK[0x9369438]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1
|<3>| HSK[0x9369438]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1
|<3>| HSK[0x9369438]: Selected cipher suite: RSA_AES_128_CBC_SHA1
|<3>| HSK[0x9369438]: Selected Compression Method: NULL
|<3>| HSK[0x9369438]: SessionID: 224e3445cff4013fe0549f2154eacb8489f7ccc2210c634c6358e61868d1b594
|<3>| HSK[0x9369438]: SERVER HELLO was send [74 bytes]
|<4>| REC[0x9369438]: Sending Packet[0] Handshake(22) with length: 74
|<2>| ASSERT: gnutls_cipher.c:204
|<4>| REC[0x9369438]: Sent Packet[1] Handshake(22) with length: 79
|<3>| HSK[0x9369438]: CERTIFICATE was send [859 bytes]
|<4>| REC[0x9369438]: Sending Packet[1] Handshake(22) with length: 859
|<2>| ASSERT: gnutls_cipher.c:204
|<4>| REC[0x9369438]: Sent Packet[2] Handshake(22) with length: 864
|<3>| HSK[0x9369438]: CERTIFICATE REQUEST was send [45 bytes]
|<4>| REC[0x9369438]: Sending Packet[2] Handshake(22) with length: 45
|<2>| ASSERT: gnutls_cipher.c:204
|<4>| REC[0x9369438]: Sent Packet[3] Handshake(22) with length: 50
|<3>| HSK[0x9369438]: SERVER HELLO DONE was send [4 bytes]
|<4>| REC[0x9369438]: Sending Packet[3] Handshake(22) with length: 4
|<2>| ASSERT: gnutls_cipher.c:204
|<4>| REC[0x9369438]: Sent Packet[4] Handshake(22) with length: 9
|<2>| ASSERT: gnutls_buffers.c:322
|<2>| ASSERT: gnutls_buffers.c:1032
|<2>| ASSERT: gnutls_handshake.c:1045
|<4>| REC[0x9369438]: Expected Packet[1] Handshake(22) with length: 1
|<4>| REC[0x9369438]: Received Packet[1] Handshake(22) with length: 7
|<2>| ASSERT: gnutls_cipher.c:204
|<4>| REC[0x9369438]: Decrypted Packet[1] Handshake(22) with length: 7
|<3>| HSK[0x9369438]: CERTIFICATE was received [7 bytes]
|<2>| ASSERT: auth_cert.c:965
|<2>| ASSERT: gnutls_buffers.c:322
|<2>| ASSERT: gnutls_buffers.c:1032
|<2>| ASSERT: gnutls_handshake.c:1045
|<4>| REC[0x9369438]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[0x9369438]: Received Packet[2] Handshake(22) with length: 262
|<2>| ASSERT: gnutls_cipher.c:204
|<4>| REC[0x9369438]: Decrypted Packet[2] Handshake(22) with length: 262
|<3>| HSK[0x9369438]: CLIENT KEY EXCHANGE was received [262 bytes]
|<4>| REC[0x9369438]: Expected Packet[3] Change Cipher Spec(20) with length: 1 |<4>| REC[0x9369438]: Received Packet[3] Change Cipher Spec(20) with length: 1
|<2>| ASSERT: gnutls_cipher.c:204
|<4>| REC[0x9369438]: ChangeCipherSpec Packet was received
|<9>| INT: PREMASTER SECRET[48]: 03020cec5416555698ddbc9d1c55b56e14bf071a99a17bdf554667d3b29073fc8d2906579db9c576f6fca3d4162e1724 |<9>| INT: CLIENT RANDOM[32]: 4bc55be32cd9c4da765c8ab4eddfc32249f0653a1a6166b0da65b45a104c8c55 |<9>| INT: SERVER RANDOM[32]: 4bc561a58e7da6b709e08d01fba0bb072897a19560083b65db8d7b6a26be3fe8 |<9>| INT: MASTER SECRET: 0ba4d5e3a7f793db36218a273f07731bbd9dd13616d53492e6219c5be07d84cf4b7cc6e48d31b88bf1610d8160a53265 |<9>| INT: KEY BLOCK[104]: bf90261ed2912882a4aa9af453bb9fe60ad65814338a22071e8f6cf67d652740
|<9>| INT: CLIENT WRITE KEY [16]: e60ce295037d521507710b409a90ab2f
|<9>| INT: SERVER WRITE KEY [16]: a2d6d70f11df6e0fcd5c534f906b5bbf
|<3>| HSK[0x9369438]: Cipher Suite: RSA_AES_128_CBC_SHA1
|<3>| HSK[0x9369438]: Initializing internal [read] cipher sessions
|<4>| REC[0x9369438]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[0x9369438]: Received Packet[0] Handshake(22) with length: 176
|<4>| REC[0x9369438]: Decrypted Packet[0] Handshake(22) with length: 16
|<3>| HSK[0x9369438]: FINISHED was received [16 bytes]
|<3>| REC[0x9369438]: Sent ChangeCipherSpec
|<4>| REC[0x9369438]: Sending Packet[4] Change Cipher Spec(20) with length: 1
|<2>| ASSERT: gnutls_cipher.c:204
|<4>| REC[0x9369438]: Sent Packet[5] Change Cipher Spec(20) with length: 6
|<3>| HSK[0x9369438]: Cipher Suite: RSA_AES_128_CBC_SHA1
|<3>| HSK[0x9369438]: Initializing internal [write] cipher sessions
|<3>| HSK[0x9369438]: FINISHED was send [16 bytes]
|<4>| REC[0x9369438]: Sending Packet[0] Handshake(22) with length: 16
|<4>| REC[0x9369438]: Sent Packet[1] Handshake(22) with length: 149

* connection from xxx.xx.xxx.xx, port 38662
- Given server name[1]: domain.org
- Certificate type: X.509
No certificates found!
- Could not verify certificate (err: The peer did not send any certificate.)
- Version: TLS1.1
- Key Exchange: RSA
- Cipher: AES-128-CBC
- MAC: SHA1
- Compression: NULL
|<2>| ASSERT: gnutls_buffers.c:322



And the full log of the client :

Processed 1 CA certificate(s).
Resolving 'domain.org'...
Connecting to 'xx.xxx.xxx.xx:22222'...
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_PSK_SHA_AES_128_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_PSK_SHA_AES_256_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_PSK_SHA_3DES_EDE_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: DHE_PSK_SHA_ARCFOUR_SHA1
|<3>| HSK[80752d8]: Removing ciphersuite: SRP_SHA_RSA_AES_128_CBC_SHA1
|<3>| HSK[80752d8]: Removing ciphersuite: SRP_SHA_RSA_AES_256_CBC_SHA1
|<3>| HSK[80752d8]: Removing ciphersuite: SRP_SHA_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[80752d8]: Removing ciphersuite: SRP_SHA_DSS_AES_128_CBC_SHA1
|<3>| HSK[80752d8]: Removing ciphersuite: SRP_SHA_DSS_AES_256_CBC_SHA1
|<3>| HSK[80752d8]: Removing ciphersuite: SRP_SHA_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[80752d8]: Keeping ciphersuite: PSK_SHA_AES_128_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: PSK_SHA_AES_256_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: PSK_SHA_3DES_EDE_CBC_SHA1
|<3>| HSK[80752d8]: Keeping ciphersuite: PSK_SHA_ARCFOUR_SHA1
|<3>| HSK[80752d8]: Removing ciphersuite: SRP_SHA_AES_128_CBC_SHA1
|<3>| HSK[80752d8]: Removing ciphersuite: SRP_SHA_AES_256_CBC_SHA1
|<3>| HSK[80752d8]: Removing ciphersuite: SRP_SHA_3DES_EDE_CBC_SHA1
|<2>| EXT[80752d8]: Sending extension CERT_TYPE
|<2>| EXT[80752d8]: Sending extension SERVER_NAME
|<3>| HSK[80752d8]: CLIENT HELLO was send [134 bytes]
|<4>| REC[80752d8]: Sending Packet[0] Handshake(22) with length: 134
|<2>| ASSERT: gnutls_cipher.c:205
|<4>| REC[80752d8]: Sent Packet[1] Handshake(22) with length: 139
|<4>| REC[80752d8]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[80752d8]: Received Packet[0] Handshake(22) with length: 74
|<2>| ASSERT: gnutls_cipher.c:205
|<4>| REC[80752d8]: Decrypted Packet[0] Handshake(22) with length: 74
|<3>| HSK[80752d8]: SERVER HELLO was received [74 bytes]
|<3>| HSK[80752d8]: Server's version: 3.2
|<3>| HSK[80752d8]: SessionID length: 32
|<3>| HSK[80752d8]: SessionID: 224e3445cff4013fe0549f2154eacb8489f7ccc2210c634c6358e61868d1b594
|<3>| HSK[80752d8]: Selected cipher suite: RSA_AES_128_CBC_SHA1
|<2>| ASSERT: gnutls_extensions.c:165
|<4>| REC[80752d8]: Expected Packet[1] Handshake(22) with length: 1
|<4>| REC[80752d8]: Received Packet[1] Handshake(22) with length: 859
|<2>| ASSERT: gnutls_cipher.c:205
|<4>| REC[80752d8]: Decrypted Packet[1] Handshake(22) with length: 859
|<3>| HSK[80752d8]: CERTIFICATE was received [859 bytes]
|<4>| REC[80752d8]: Expected Packet[2] Handshake(22) with length: 1
|<4>| REC[80752d8]: Received Packet[2] Handshake(22) with length: 45
|<2>| ASSERT: gnutls_cipher.c:205
|<4>| REC[80752d8]: Decrypted Packet[2] Handshake(22) with length: 45
|<3>| HSK[80752d8]: CERTIFICATE REQUEST was received [45 bytes]
- Successfully sent 0 certificate(s) to server.
|<4>| REC[80752d8]: Expected Packet[3] Handshake(22) with length: 1
|<4>| REC[80752d8]: Received Packet[3] Handshake(22) with length: 4
|<2>| ASSERT: gnutls_cipher.c:205
|<4>| REC[80752d8]: Decrypted Packet[3] Handshake(22) with length: 4
|<3>| HSK[80752d8]: SERVER HELLO DONE was received [4 bytes]
|<3>| HSK[80752d8]: CERTIFICATE was send [7 bytes]
|<4>| REC[80752d8]: Sending Packet[1] Handshake(22) with length: 7
|<2>| ASSERT: gnutls_cipher.c:205
|<4>| REC[80752d8]: Sent Packet[2] Handshake(22) with length: 12
|<3>| HSK[80752d8]: CLIENT KEY EXCHANGE was send [262 bytes]
|<4>| REC[80752d8]: Sending Packet[2] Handshake(22) with length: 262
|<2>| ASSERT: gnutls_cipher.c:205
|<4>| REC[80752d8]: Sent Packet[3] Handshake(22) with length: 267
|<3>| REC[80752d8]: Sent ChangeCipherSpec
|<4>| REC[80752d8]: Sending Packet[3] Change Cipher Spec(20) with length: 1
|<2>| ASSERT: gnutls_cipher.c:205
|<4>| REC[80752d8]: Sent Packet[4] Change Cipher Spec(20) with length: 6
|<9>| INT: PREMASTER SECRET[48]: 03020cec5416555698ddbc9d1c55b56e14bf071a99a17bdf554667d3b29073fc8d2906579db9c576f6fca3d4162e1724 |<9>| INT: CLIENT RANDOM[32]: 4bc55be32cd9c4da765c8ab4eddfc32249f0653a1a6166b0da65b45a104c8c55 |<9>| INT: SERVER RANDOM[32]: 4bc561a58e7da6b709e08d01fba0bb072897a19560083b65db8d7b6a26be3fe8 |<9>| INT: MASTER SECRET: 0ba4d5e3a7f793db36218a273f07731bbd9dd13616d53492e6219c5be07d84cf4b7cc6e48d31b88bf1610d8160a53265 |<9>| INT: KEY BLOCK[104]: bf90261ed2912882a4aa9af453bb9fe60ad65814338a22071e8f6cf67d652740
|<9>| INT: CLIENT WRITE KEY [16]: e60ce295037d521507710b409a90ab2f
|<9>| INT: SERVER WRITE KEY [16]: a2d6d70f11df6e0fcd5c534f906b5bbf
|<3>| HSK[80752d8]: Cipher Suite: RSA_AES_128_CBC_SHA1
|<3>| HSK[80752d8]: Initializing internal [write] cipher sessions
|<3>| HSK[80752d8]: FINISHED was send [16 bytes]
|<4>| REC[80752d8]: Sending Packet[0] Handshake(22) with length: 16
|<4>| REC[80752d8]: Sent Packet[1] Handshake(22) with length: 181
|<4>| REC[80752d8]: Expected Packet[4] Change Cipher Spec(20) with length: 1 |<4>| REC[80752d8]: Received Packet[4] Change Cipher Spec(20) with length: 1
|<2>| ASSERT: gnutls_cipher.c:205
|<4>| REC[80752d8]: ChangeCipherSpec Packet was received
|<3>| HSK[80752d8]: Cipher Suite: RSA_AES_128_CBC_SHA1
|<3>| HSK[80752d8]: Initializing internal [read] cipher sessions
|<4>| REC[80752d8]: Expected Packet[0] Handshake(22) with length: 1
|<4>| REC[80752d8]: Received Packet[0] Handshake(22) with length: 144
|<4>| REC[80752d8]: Decrypted Packet[0] Handshake(22) with length: 16
|<3>| HSK[80752d8]: FINISHED was received [16 bytes]
|<2>| ASSERT: ext_server_name.c:257
- Certificate type: X.509
- Got a certificate list of 1 certificates.

- Certificate[0] info:
# The hostname in the certificate matches 'domain.org'.
# valid since: Wed Apr  7 18:39:46 CEST 2010
# expires at: Thu Apr  7 18:39:46 CEST 2011
# fingerprint: 37:12:84:F2:E2:0C:A6:DC:4C:93:B1:18:57:8E:8A:0C
# Subject's DN: O=domain.org,CN=domain.org
# Issuer's DN: CN=domain.org

|<2>| ASSERT: mpi.c:587
|<2>| ASSERT: dn.c:1212

- Peer's certificate is trusted
- Version: TLS1.1
- Key Exchange: RSA
- Cipher: AES-128-CBC
- MAC: SHA1
- Compression: NULL
|<2>| ASSERT: mpi.c:587
|<2>| ASSERT: dn.c:1212
- Handshake was completed

- Simple Client Mode:


Sorry to hide the name and ip, but i don't want this server to be known, of course if you need it, i'll give it. Moreover, i'm not sure if the full logs was what you mean by "more precise" ...

Thanks,
Gonzague



Nikos Mavrogiannopoulos a écrit :
gonzagueddr wrote:

Hi all, and first excuse me to be totaly noob about gnutls.
It's one week i'm trying to stream an mp3 over https using vlc, and i
get the error "TLS handshake error: The peer did not send any certificate".
So after a week on the vlc forum, i thing you're my only hope now (they
say it's a gnutls' bug, but i can't believe that).

Please be more precise. What is your scenario, who is the tls server and
who is the client.

[...]
* connection from xx.xx.xx.xxx, port 50091
- Given server name[1]: domain.org
- Certificate type: X.509
No certificates found!
- Could not verify certificate (err: The peer did not send any
certificate.)
- Version: TLS1.1
- Key Exchange: RSA
- Cipher: AES-128-CBC
- MAC: SHA1
- Compression: NULL

I can not find help about this on the web, i mean something that i can
understand ...
If someone know what can i do for this, it would be very apreciate.

The peer did not send any certificate is normal. A TLS client is not
obliged to send a certificate and in your case didn't. That's why
the server cannot verify it. If you want the client to send a
certificate you have to specify a certificate and a key, that are
suitable for signing.


regards,
Nikos








reply via email to

[Prev in Thread] Current Thread [Next in Thread]