[OpenSIPS-Users] TLS client simple testing. What is a good result when handshake works?

Rodrigo Pimenta Carvalho pimenta at inatel.br
Tue Jul 28 21:12:58 CEST 2015


Hi.

I have followed the tutorial about setting up the TLS. ( http://www.opensips.org/Documentation/Tutorials-TLS-2-1 ). Then, I have run the command: "

openssl s_client -showcerts -debug -connect <your-ip-address>:<port> -no_ssl2 -bugs", to test the handshake.

But, what is an example of result for this command, telling me that everything is ok?

I got:

CONNECTED(00000003)
...
...
...
verify error:num=19:self signed certificate in certificate chain
verify return:0
..
..
..
---
No client certificate CA names sent
---
SSL handshake has read 1567 bytes and written 285 bytes
---
New, TLSv1/SSLv3, Cipher is AES256-SHA
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
    Protocol  : TLSv1
    Cipher    : AES256-SHA
    Session-ID:
    Session-ID-ctx:
    Master-Key: 90D6174E13EFDF2317B8F24D0AEBC5A56C3633D7DFC1BF8ADF186672CD9F26B5D812BE595775DFE6416C31DDE736D217
    Key-Arg   : None
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    Start Time: 1438110339
    Timeout   : 300 (sec)
    Verify return code: 19 (self signed certificate in certificate chain)

So, did the handshake work? If not, what might be wrong?
Any hint will be very helpful!

Best Regards.



RODRIGO PIMENTA CARVALHO
Inatel Competence Center
Software
Ph: +55 35 3471 9200 RAMAL 979
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.opensips.org/pipermail/users/attachments/20150728/ee36ea69/attachment.htm>


More information about the Users mailing list