[openssl-dev] Could someone verify my efforts of a scan for the DROWN attack?

Brian Reichert reichert at numachi.com
Fri Apr 1 16:35:49 UTC 2016


On Fri, Apr 01, 2016 at 12:19:21PM +0200, Hubert Kario wrote:
> On Wednesday 30 March 2016 12:27:47 Brian Reichert wrote:
> > Each failed conversation yields a 'TLSIllegalParameterException'
> > error; e.g.
> > 
> >   Connect with SSLv2 EXP-RC4-MD5 ...
[snipped]
> >   TLSIllegalParameterException: Malformed record layer header
> 
> That may indicate that the server does not respond with a SSLv2 message 
> to the client's message.
> 
> Could you provide a packet dump of the connection?

Attached; hopefully it won't get filtered out.

> -- 
> Regards,
> Hubert Kario
> Senior Quality Engineer, QE BaseOS Security team
> Web: www.cz.redhat.com
> Red Hat Czech s.r.o., Purky??ova 99/71, 612 45, Brno, Czech Republic

-- 
Brian Reichert				<reichert at numachi.com>
BSD admin/developer at large	
-------------- next part --------------
A non-text attachment was scrubbed...
Name: test-sslv2-force.cap
Type: application/octet-stream
Size: 8368 bytes
Desc: not available
URL: <http://mta.openssl.org/pipermail/openssl-dev/attachments/20160401/5d6b8a4f/attachment.obj>


More information about the openssl-dev mailing list