Connection issues with Android Marshmallow
Sebastian Hagedorn
Hagedorn at uni-koeln.de
Fri Oct 16 15:29:34 CEST 2015
--On 15. Oktober 2015 16:42:47 -0400 Arran Cudbard-Bell
<a.cudbardb at freeradius.org> wrote:
>> and have options
>> to force it to use a particular TLS... does it?? ;)
>
> tls_disable_tlsv1_0=1 - disable use of TLSv1.0
> tls_disable_tlsv1_1=1 - disable use of TLSv1.1 (a workaround for AAA
> servers that have issues interoperating with updated TLS version)
> tls_disable_tlsv1_2=1 - disable use of TLSv1.2 (a workaround for AAA
> servers that have issues interoperating with updated TLS version)
I hope this isn't a dumb question ... I (successfully) tried eapol_test on
a RHEL 6 system with OpenSSL openssl-1.0.1e-42.el6.x86_64 and FreeRadius
3.0.10 and was surprised that I didn't see TLSv1... at all. Here are all
the lines referencing TLS:
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
TLS: using phase1 config options
SSL: TLS Message Length: 5263
TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in
certificate chain) ca_cert_verify=0 depth=3 buf='/C=DE/O=Deutsche Telekom
AG/OU=T-TeleSec Trust Center/CN=Deutsche Telekom Root CA 2'
TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in
certificate chain) ca_cert_verify=0 depth=3 buf='/C=DE/O=Deutsche Telekom
AG/OU=T-TeleSec Trust Center/CN=Deutsche Telekom Root CA 2'
TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in
certificate chain) ca_cert_verify=0 depth=2
buf='/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Global - G01'
TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in
certificate chain) ca_cert_verify=0 depth=1
buf='/C=DE/L=Koeln/O=Universitaet zu Koeln/CN=UniKoeln
CA/emailAddress=camaster at uni-koeln.de'
TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in
certificate chain) ca_cert_verify=0 depth=0
buf='/C=DE/ST=Nordrhein-Westfalen/L=Koeln/O=Universitaet zu
Koeln/OU=Zentrum fuer Angewandte Informatik/CN=radius1.rrz.uni-koeln.de'
EAP-PEAP: TLS done, proceed to Phase 2
Everything else looks like SSLv3:
SSL: SSL_connect:SSLv2/v3 write client hello A
SSL: SSL_connect:error in SSLv2/v3 read server hello A
SSL: SSL_connect:SSLv3 read server hello A
SSL: SSL_connect:SSLv3 read server certificate A
SSL: SSL_connect:SSLv3 read server key exchange A
SSL: SSL_connect:SSLv3 read server done A
SSL: SSL_connect:SSLv3 write client key exchange A
SSL: SSL_connect:SSLv3 write change cipher spec A
SSL: SSL_connect:SSLv3 write finished A
SSL: SSL_connect:SSLv3 flush data
SSL: SSL_connect:error in SSLv3 read finished A
SSL: SSL_connect:error in SSLv3 read finished A
SSL: SSL_connect:SSLv3 read finished A
What's going on there?
--
.:.Sebastian Hagedorn - Weyertal 121 (Gebäude 133), Zimmer 2.02.:.
.:.Regionales Rechenzentrum (RRZK).:.
.:.Universität zu Köln / Cologne University - ✆ +49-221-470-89578.:.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 191 bytes
Desc: not available
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20151016/af5bf7e3/attachment.sig>
More information about the Freeradius-Users
mailing list