[openssl-dev] Could someone verify my efforts of a scan for the DROWN attack?
Brian Reichert
reichert at numachi.com
Fri Apr 1 16:35:49 UTC 2016
On Fri, Apr 01, 2016 at 12:19:21PM +0200, Hubert Kario wrote:
> On Wednesday 30 March 2016 12:27:47 Brian Reichert wrote:
> > Each failed conversation yields a 'TLSIllegalParameterException'
> > error; e.g.
> >
> > Connect with SSLv2 EXP-RC4-MD5 ...
[snipped]
> > TLSIllegalParameterException: Malformed record layer header
>
> That may indicate that the server does not respond with a SSLv2 message
> to the client's message.
>
> Could you provide a packet dump of the connection?
Attached; hopefully it won't get filtered out.
> --
> Regards,
> Hubert Kario
> Senior Quality Engineer, QE BaseOS Security team
> Web: www.cz.redhat.com
> Red Hat Czech s.r.o., Purky??ova 99/71, 612 45, Brno, Czech Republic
--
Brian Reichert <reichert at numachi.com>
BSD admin/developer at large
-------------- next part --------------
A non-text attachment was scrubbed...
Name: test-sslv2-force.cap
Type: application/octet-stream
Size: 8368 bytes
Desc: not available
URL: <http://mta.openssl.org/pipermail/openssl-dev/attachments/20160401/5d6b8a4f/attachment.obj>
More information about the openssl-dev
mailing list