Openssl SSL_accept() fails with Unknown Protocol












0















Edit -
I changed



method = SSLv23_server_method(); to 
method = TLSv1_2_server_method()


;



Now SSL_accept() gives me back a wrong version number error.



error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version number:s3_pkt.c:386:


When I listed the SSL and TLS versions in use on my system -



openssl ciphers -v | awk '{print $2}' | sort | uniq
SSLv3
TLSv1.2


What am I missing here ?





@jww -> Tagging you coz I noticed you answered a few qs related to openssl. Hope you dont mind



I am running into an issue with SSL_accept() in my server code. I am using openssl 1.0.2g. After much research, I could not find the real reason for the error.



Here is my server code -



open socket , bind to socket, listen on socket

initialize SSL context and libraries. Load certificate and Private key files
{
SSL_load_error_strings();
ERR_load_BIO_strings();
SSL_library_init();
OpenSSL_add_all_algorithms();
const SSL_METHOD *method;
method = SSLv23_server_method();
ctx = SSL_CTX_new(method);
if (SSL_CTX_use_certificate_file(ctx, ccrt, SSL_FILETYPE_PEM) <= 0) {
ERR_print_errors_fp(stdout);
}
if (SSL_CTX_use_PrivateKey_file(ctx, ckey, SSL_FILETYPE_PEM) <= 0 ) {
ERR_print_errors_fp(stdout);

}

pselect() waits on any incoming connections or any reads on existing connections

if new connection - accept() the connection and add to the pselect FD_SET and return

if existing connection, there is something to read so do the following {
SSL *ssl;
if ( !ctx )
{
return 0;
}
ssl = SSL_new(ctx);
SSL_set_fd(ssl, soc);
int ret = SSL_accept(ssl); --> FAILS
if (ret <= 0) {
ERR_print_errors_fp(stdout);
return 0}
}


When the error queue is printed it shows -



error:140760FC:SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol:s23_srvr.c:640:


Is this a version mismatch (Openssl 1.0.2g) ?










share|improve this question

























  • I just listed the SSL and TLS versions : openssl ciphers -v | awk '{print $2}' | sort | uniq - SSLv3 TLSv1.2

    – PeterJ
    Nov 22 '18 at 6:46













  • But it looks like SSLv3 is disabled by default in 1.0.2g per this - launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu1. So I am confused as to which method I should be using for ubuntu 18.04

    – PeterJ
    Nov 22 '18 at 8:17
















0















Edit -
I changed



method = SSLv23_server_method(); to 
method = TLSv1_2_server_method()


;



Now SSL_accept() gives me back a wrong version number error.



error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version number:s3_pkt.c:386:


When I listed the SSL and TLS versions in use on my system -



openssl ciphers -v | awk '{print $2}' | sort | uniq
SSLv3
TLSv1.2


What am I missing here ?





@jww -> Tagging you coz I noticed you answered a few qs related to openssl. Hope you dont mind



I am running into an issue with SSL_accept() in my server code. I am using openssl 1.0.2g. After much research, I could not find the real reason for the error.



Here is my server code -



open socket , bind to socket, listen on socket

initialize SSL context and libraries. Load certificate and Private key files
{
SSL_load_error_strings();
ERR_load_BIO_strings();
SSL_library_init();
OpenSSL_add_all_algorithms();
const SSL_METHOD *method;
method = SSLv23_server_method();
ctx = SSL_CTX_new(method);
if (SSL_CTX_use_certificate_file(ctx, ccrt, SSL_FILETYPE_PEM) <= 0) {
ERR_print_errors_fp(stdout);
}
if (SSL_CTX_use_PrivateKey_file(ctx, ckey, SSL_FILETYPE_PEM) <= 0 ) {
ERR_print_errors_fp(stdout);

}

pselect() waits on any incoming connections or any reads on existing connections

if new connection - accept() the connection and add to the pselect FD_SET and return

if existing connection, there is something to read so do the following {
SSL *ssl;
if ( !ctx )
{
return 0;
}
ssl = SSL_new(ctx);
SSL_set_fd(ssl, soc);
int ret = SSL_accept(ssl); --> FAILS
if (ret <= 0) {
ERR_print_errors_fp(stdout);
return 0}
}


When the error queue is printed it shows -



error:140760FC:SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol:s23_srvr.c:640:


Is this a version mismatch (Openssl 1.0.2g) ?










share|improve this question

























  • I just listed the SSL and TLS versions : openssl ciphers -v | awk '{print $2}' | sort | uniq - SSLv3 TLSv1.2

    – PeterJ
    Nov 22 '18 at 6:46













  • But it looks like SSLv3 is disabled by default in 1.0.2g per this - launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu1. So I am confused as to which method I should be using for ubuntu 18.04

    – PeterJ
    Nov 22 '18 at 8:17














0












0








0








Edit -
I changed



method = SSLv23_server_method(); to 
method = TLSv1_2_server_method()


;



Now SSL_accept() gives me back a wrong version number error.



error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version number:s3_pkt.c:386:


When I listed the SSL and TLS versions in use on my system -



openssl ciphers -v | awk '{print $2}' | sort | uniq
SSLv3
TLSv1.2


What am I missing here ?





@jww -> Tagging you coz I noticed you answered a few qs related to openssl. Hope you dont mind



I am running into an issue with SSL_accept() in my server code. I am using openssl 1.0.2g. After much research, I could not find the real reason for the error.



Here is my server code -



open socket , bind to socket, listen on socket

initialize SSL context and libraries. Load certificate and Private key files
{
SSL_load_error_strings();
ERR_load_BIO_strings();
SSL_library_init();
OpenSSL_add_all_algorithms();
const SSL_METHOD *method;
method = SSLv23_server_method();
ctx = SSL_CTX_new(method);
if (SSL_CTX_use_certificate_file(ctx, ccrt, SSL_FILETYPE_PEM) <= 0) {
ERR_print_errors_fp(stdout);
}
if (SSL_CTX_use_PrivateKey_file(ctx, ckey, SSL_FILETYPE_PEM) <= 0 ) {
ERR_print_errors_fp(stdout);

}

pselect() waits on any incoming connections or any reads on existing connections

if new connection - accept() the connection and add to the pselect FD_SET and return

if existing connection, there is something to read so do the following {
SSL *ssl;
if ( !ctx )
{
return 0;
}
ssl = SSL_new(ctx);
SSL_set_fd(ssl, soc);
int ret = SSL_accept(ssl); --> FAILS
if (ret <= 0) {
ERR_print_errors_fp(stdout);
return 0}
}


When the error queue is printed it shows -



error:140760FC:SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol:s23_srvr.c:640:


Is this a version mismatch (Openssl 1.0.2g) ?










share|improve this question
















Edit -
I changed



method = SSLv23_server_method(); to 
method = TLSv1_2_server_method()


;



Now SSL_accept() gives me back a wrong version number error.



error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version number:s3_pkt.c:386:


When I listed the SSL and TLS versions in use on my system -



openssl ciphers -v | awk '{print $2}' | sort | uniq
SSLv3
TLSv1.2


What am I missing here ?





@jww -> Tagging you coz I noticed you answered a few qs related to openssl. Hope you dont mind



I am running into an issue with SSL_accept() in my server code. I am using openssl 1.0.2g. After much research, I could not find the real reason for the error.



Here is my server code -



open socket , bind to socket, listen on socket

initialize SSL context and libraries. Load certificate and Private key files
{
SSL_load_error_strings();
ERR_load_BIO_strings();
SSL_library_init();
OpenSSL_add_all_algorithms();
const SSL_METHOD *method;
method = SSLv23_server_method();
ctx = SSL_CTX_new(method);
if (SSL_CTX_use_certificate_file(ctx, ccrt, SSL_FILETYPE_PEM) <= 0) {
ERR_print_errors_fp(stdout);
}
if (SSL_CTX_use_PrivateKey_file(ctx, ckey, SSL_FILETYPE_PEM) <= 0 ) {
ERR_print_errors_fp(stdout);

}

pselect() waits on any incoming connections or any reads on existing connections

if new connection - accept() the connection and add to the pselect FD_SET and return

if existing connection, there is something to read so do the following {
SSL *ssl;
if ( !ctx )
{
return 0;
}
ssl = SSL_new(ctx);
SSL_set_fd(ssl, soc);
int ret = SSL_accept(ssl); --> FAILS
if (ret <= 0) {
ERR_print_errors_fp(stdout);
return 0}
}


When the error queue is printed it shows -



error:140760FC:SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol:s23_srvr.c:640:


Is this a version mismatch (Openssl 1.0.2g) ?







c++ encryption openssl tls1.2






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited Nov 22 '18 at 6:55







PeterJ

















asked Nov 22 '18 at 5:22









PeterJPeterJ

54




54













  • I just listed the SSL and TLS versions : openssl ciphers -v | awk '{print $2}' | sort | uniq - SSLv3 TLSv1.2

    – PeterJ
    Nov 22 '18 at 6:46













  • But it looks like SSLv3 is disabled by default in 1.0.2g per this - launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu1. So I am confused as to which method I should be using for ubuntu 18.04

    – PeterJ
    Nov 22 '18 at 8:17



















  • I just listed the SSL and TLS versions : openssl ciphers -v | awk '{print $2}' | sort | uniq - SSLv3 TLSv1.2

    – PeterJ
    Nov 22 '18 at 6:46













  • But it looks like SSLv3 is disabled by default in 1.0.2g per this - launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu1. So I am confused as to which method I should be using for ubuntu 18.04

    – PeterJ
    Nov 22 '18 at 8:17

















I just listed the SSL and TLS versions : openssl ciphers -v | awk '{print $2}' | sort | uniq - SSLv3 TLSv1.2

– PeterJ
Nov 22 '18 at 6:46







I just listed the SSL and TLS versions : openssl ciphers -v | awk '{print $2}' | sort | uniq - SSLv3 TLSv1.2

– PeterJ
Nov 22 '18 at 6:46















But it looks like SSLv3 is disabled by default in 1.0.2g per this - launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu1. So I am confused as to which method I should be using for ubuntu 18.04

– PeterJ
Nov 22 '18 at 8:17





But it looks like SSLv3 is disabled by default in 1.0.2g per this - launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu1. So I am confused as to which method I should be using for ubuntu 18.04

– PeterJ
Nov 22 '18 at 8:17












0






active

oldest

votes











Your Answer






StackExchange.ifUsing("editor", function () {
StackExchange.using("externalEditor", function () {
StackExchange.using("snippets", function () {
StackExchange.snippets.init();
});
});
}, "code-snippets");

StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "1"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});

function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});


}
});














draft saved

draft discarded


















StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53424351%2fopenssl-ssl-accept-fails-with-unknown-protocol%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown

























0






active

oldest

votes








0






active

oldest

votes









active

oldest

votes






active

oldest

votes
















draft saved

draft discarded




















































Thanks for contributing an answer to Stack Overflow!


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53424351%2fopenssl-ssl-accept-fails-with-unknown-protocol%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

Can a sorcerer learn a 5th-level spell early by creating spell slots using the Font of Magic feature?

Does disintegrating a polymorphed enemy still kill it after the 2018 errata?

A Topological Invariant for $pi_3(U(n))$