jessie-discuss
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Jessie-discuss] Jessie 1.0.1 not working with Internet Explorer


From: Martin Egholm Nielsen
Subject: Re: [Jessie-discuss] Jessie 1.0.1 not working with Internet Explorer
Date: Tue, 18 Oct 2005 22:21:19 +0200
User-agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7.6) Gecko/20050319

Hi Casey,

Now, everything seemed just fine - until I tried connecting to my Jessie-server with IE... It just rejects immediately, giving a standard "The page cannot be displayed"-page suggesting this and that...
Mozilla and Opera works fine, however...

I've tried disabling different ciphers, but nothing helps.

Have you tried it Nico?

Any suggestions?

Setting 'SSLSocket.DEBUG_HANDSHAKE_LAYER' and 'SSLSocket.DEBUG_KEY_EXCHANGE' to 'true' and recompiling will produce some debug output that might prove useful (posting the output of a run with these enabled may reveal something to me, if I can't get a chance to try this out myself).

Here it goes (if you hadn't made them final, I could have changed through reflection :-))

The leading "1 StdErr" is from each new line my std-err logger logs:

1 StdErr startHandshake called in Thread[Request handler '5' from Tue Oct 18 22:17:42 CEST 2005,5,TJWS threads] 1 StdErr doing server handshake in Thread[Request handler '5' from Tue Oct 18 22:17:42 CEST 2005,5,TJWS threads]
1 StdErr struct {
  type = client_hello;
  struct {
    version = SSLv3;
    struct {
      gmt_unix_time = 1129666662;
random_bytes = 99:69:e4:98:27:ba:6c:c7:a5:59:f9:90:d1:99:37:98:0e:e1:03:c8:9b:8e:6c:68:5c:14:39:9a;
    } Random;
sessionId = ab:07:e5:83:46:c1:3a:84:4f:a8:54:07:fb:54:5c:f3:c7:c2:5b:23:45:9b:79:9d:53:59:95:f6:6b:bb:bc:68;
    cipherSuites = {
      SSL_RSA_WITH_RC4_128_MD5
      SSL_RSA_WITH_RC4_128_SHA
      SSL_RSA_WITH_3DES_EDE_CBC_SHA
      SSL_RSA_WITH_DES_CBC_SHA
      UNKNOWN { 0, 100 }
      UNKNOWN { 0, 98 }
      SSL_RSA_EXPORT_WITH_RC4_40_MD5
      UNKNOWN { 0, 6 }
      SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
      SSL_DHE_DSS_WITH_DES_CBC_SHA
      UNKNOWN { 0, 99 }
    };
    compressionMethods = { null };
  } ClientHello;
} Handshake;
1 StdErr selectSuite req=[SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, UNKNOWN { 0, 100 }, UNKNOWN { 0, 98 }, SSL_RSA_EXPORT_WITH_RC4_40_MD5, UNKNOWN { 0, 6 }, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, UNKNOWN { 0, 99 }] avail=[TLS_RSA_EXPORT_WITH_RC4_40_MD5, TLS_RSA_WITH_RC4_128_MD5, TLS_RSA_WITH_RC4_128_SHA, TLS_RSA_EXPORT_WITH_DES40_CBC_SHA, TLS_RSA_WITH_DES_CBC_SHA, TLS_RSA_WITH_3DES_EDE_CBC_SHA, TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA, TLS_DH_DSS_WITH_DES_CBC_SHA, TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA, TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA, TLS_DH_RSA_WITH_DES_CBC_SHA, TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA, TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, TLS_DHE_DSS_WITH_DES_CBC_SHA, TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DH_DSS_WITH_AES_128_CBC_SHA, TLS_DH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_DH_DSS_WITH_AES_256_CBC_SHA, TLS_DH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA, TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA, TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA, TLS_SRP_SHA_WITH_AES_128_CBC_SHA, TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA, TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA, TLS_SRP_SHA_WITH_AES_256_CBC_SHA, TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA, TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_CAST_128_CBC_SHA, TLS_DHE_DSS_WITH_CAST_128_CBC_RMD, TLS_DHE_DSS_WITH_3DES_EDE_CBC_RMD, TLS_DHE_DSS_WITH_AES_128_CBC_RMD, TLS_DHE_DSS_WITH_AES_256_CBC_RMD, TLS_DHE_RSA_WITH_CAST_128_CBC_SHA, TLS_DHE_RSA_WITH_CAST_128_CBC_RMD, TLS_DHE_RSA_WITH_3DES_EDE_CBC_RMD, TLS_DHE_RSA_WITH_AES_128_CBC_RMD, TLS_DHE_RSA_WITH_AES_256_CBC_RMD, TLS_RSA_WITH_CAST_128_CBC_SHA, TLS_RSA_WITH_CAST_128_CBC_RMD, TLS_RSA_WITH_3DES_EDE_CBC_RMD, TLS_RSA_WITH_AES_128_CBC_RMD, TLS_RSA_WITH_AES_256_CBC_RMD]
1 StdErr TLS_RSA_WITH_RC4_128_MD5 == SSL_RSA_WITH_RC4_128_MD5
1 StdErr saved sessions = []
1 StdErr rejected session
1 StdErr have session id? false
1 StdErr saved sessions = []
1 StdErr struct {
  type = server_hello;
  struct {
    version = SSLv3;
    struct {
      gmt_unix_time = 1129666662;
random_bytes = 91:a7:c0:47:96:70:73:48:3e:70:99:56:47:bc:72:1c:22:82:10:74:e3:d9:78:f6:3b:54:b8:99;
    } Random;
sessionId = 87:d9:04:29:52:56:3e:00:d1:8f:f0:ee:b1:82:3c:96:d5:39:db:4b:59:d2:73:f6:a5:ed:58:f0:32:d3:13:fc;
    cipherSuite = SSL_RSA_WITH_RC4_128_MD5;
    compressionMethod = null;
  } ServerHello;
} Handshake;
1 StdErr struct {
  type = certificate;
  struct {
    certificateList =
      java.security.cert.X509Certificate {
        TBSCertificate {
          version = 3;
          serialNo = 12442898931675110946;
          signature = {
            algorithm = MD5withRSA;
            parameters = null;
          }
          issuer = CN=localhost,OU=Some Unit,O=My Org,L=Here,ST=NA,C=DK;
          validity = {
            notBefore = Tue Apr 19 15:52:43 CEST 2005;
            notAfter  = Wed Apr 19 15:52:43 CEST 2006;
          }
          subject = CN=localhost,OU=Some Unit,O=My Org,L=Here,ST=NA,C=DK;
          subjectPublicKeyInfo = {
            algorithm = RSA
            key =
00000000 30 81 9e 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 0..0...*.H...... 00000010 05 00 03 8d 00 30 81 89 02 81 81 00 b2 77 a5 85 .....0.......w.. 00000020 e5 c7 23 82 c4 34 f2 91 10 08 ea fd 3a 13 16 6c ..#..4......:..l 00000030 0f 8a 0f b8 b1 0d a7 a2 8d 18 56 b5 86 9a 9c 36 ..........V....6 00000040 09 24 15 55 20 86 46 28 1b 2e a3 de 06 09 9e 44 .$.U .F(.......D 00000050 a1 08 17 5b a1 73 29 19 14 b9 9a d4 1f 0e 3b a3 ...[.s).......;. 00000060 12 63 d4 19 19 d3 e9 d6 e1 c5 5c 47 04 33 5b 7d .c........\G.3[} 00000070 97 c2 4c 65 9b 0c a9 f2 2b 26 ad f5 08 08 12 a6 ..Le....+&...... 00000080 3f dd 38 7f ef dc 5e 9e 6e 2c 8a df f1 b9 f9 3f ?.8...^.n,.....? 00000090 ac f1 40 dc f4 52 0d 74 cc 9c 93 81 02 03 01 00 address@hidden 000000a0 01 .
          };
          issuerUniqueId  = null;
          subjectUniqueId = null;
          extensions = {
            id = 2.5.29.19
            value = address@hidden
            id = 2.5.29.14
            value = address@hidden
            id = 2.5.29.35
            value = address@hidden
          }
        }
        signatureAlgorithm = MD5withRSA;
        signatureValue =
00000000 02 40 86 01 3e f2 f8 a5 39 ed 50 4c ca ea 94 02 address@hidden>...9.PL.... 00000010 66 07 e4 a5 29 0d c3 75 52 39 a9 76 12 8b 1f e9 f...)..uR9.v.... 00000020 81 40 fd e5 a7 00 6f 0b 4d 69 f5 58 f4 d7 50 9b address@hidden 00000030 e2 c8 e0 d1 6a 77 63 de 20 f3 0b b6 68 47 e8 3e ....jwc. ...hG.> 00000040 d7 d4 d7 b9 24 9d cf 9f 67 5e f2 fc 7c a5 24 5f ....$...g^..|.$_ 00000050 e2 ea fc 46 e4 b8 ee 82 ff 72 d3 fa a4 09 e0 77 ...F.....r.....w 00000060 fb 55 73 4a 06 90 2f d6 5e b9 64 37 c1 ab a1 cc .UsJ../.^.d7.... 00000070 52 64 0f 68 df 09 5f 15 af aa 4c b9 b7 2e 82 ed Rd.h.._...L.....
      }
  } Certificate;
} Handshake;
1 StdErr struct {
  type = server_hello_done;
} Handshake;
1 StdErr struct {
  type = client_key_exchange;
  struct {
    encryptedPreMasterSecret =
00000000 14 7c a0 31 de 06 91 d5 67 bd 08 3b 07 23 9f 45 .|.1....g..;.#.E 00000010 c1 68 b3 93 e5 7e f0 32 f1 7b d2 c6 7d 42 31 99 .h...~.2.{..}B1. 00000020 f4 fc e3 f5 d6 c4 8b c2 af 47 3e 0a 63 99 a2 59 .........G>.c..Y 00000030 c3 9a 90 80 67 e5 7d 5d 7f 5f 69 92 c8 15 88 f3 ....g.}]._i..... 00000040 e1 75 21 9f dd f2 29 e6 e0 9c b6 2e 62 dd 79 0a .u!...).....b.y. 00000050 48 1c 78 2a ff 7f b9 75 7e 02 2f 24 f7 e4 d2 28 H.x*...u~./$...( 00000060 b7 18 90 4a 95 6e d9 34 71 21 69 19 97 4e 0f 85 ...J.n.4q!i..N.. 00000070 c3 a5 0f ad 07 53 e4 28 25 8e b6 84 e9 e8 6a 41 .....S.(%.....jA
  } ClientKeyExchange;
} Handshake;
1 StdErr preMasterSecret= 03:00:37:81:14:05:32:11:bd:a6:df:b8:c6:3c:7f:1c:c3:c7:c0:2d:cb:07:34:ae:f1:ab:ff:94:f8:55:cf:28:77:c1:27:e5:f0:2d:8c:2c:e9:9c:78:2d:3f:05:14:de 1 StdErr client.random = 43:55:58:66:99:69:e4:98:27:ba:6c:c7:a5:59:f9:90:d1:99:37:98:0e:e1:03:c8:9b:8e:6c:68:5c:14:39:9a 1 StdErr server.random = 43:55:58:66:91:a7:c0:47:96:70:73:48:3e:70:99:56:47:bc:72:1c:22:82:10:74:e3:d9:78:f6:3b:54:b8:99 1 StdErr masterSecret=fd:9a:5c:cc:57:df:12:2a:f8:88:45:7e:3d:84:11:68:d8:c7:6d:1d:0c:2a:9b:5c:7a:ee:5d:ae:70:35:a0:f0:a6:5e:9c:03:00:aa:98:4f:fb:30:b8:3c:83:1b:b1:f8
1 StdErr Generated keys:
1 StdErr 0=9c:36:9f:af:93:22:8f:75:35:f4:3f:3b:32:2a:b4:b2
1 StdErr 1=61:e2:e1:68:4e:e8:da:98:65:aa:a5:16:86:52:f1:97
1 StdErr 2=8d:d5:ca:b8:d1:f5:1c:a0:23:8e:77:78:5e:de:e0:cd
1 StdErr 3=a0:a5:bf:ca:d7:ca:43:b2:5b:73:00:f2:84:ca:77:e0
1 StdErr 4=
1 StdErr 5=
1 StdErr struct {
  type = finished;
  struct {
    md5Hash = af:a5:d3:c6:ba:20:b8:d8:45:91:b0:c3:87:fe:c6:33;
    shaHash = 45:27:10:82:d4:47:36:5d:ac:5c:35:b3:60:6d:98:4a:e2:a3:3e:dc;
  } Finished;
} Handshake;
1 StdErr struct {
  type = finished;
  struct {
    md5Hash = 80:3c:37:7a:b3:7b:0c:5b:c9:ef:65:ac:f1:e7:b3:2b;
    shaHash = 02:c9:6a:2f:1f:4c:11:5b:e0:ad:0c:a3:57:16:f9:63:09:57:9c:f5;
  } Finished;
} Handshake;
1 StdErr Handshake finished in Thread[Request handler '5' from Tue Oct 18 22:17:42 CEST 2005,5,TJWS threads]
1 StdErr Elapsed time 0s




reply via email to

[Prev in Thread] Current Thread [Next in Thread]