Openssl SSL_accept() fails with Unknown Protocol





.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty{ height:90px;width:728px;box-sizing:border-box;
}







0















Edit -
I changed



method = SSLv23_server_method(); to 
method = TLSv1_2_server_method()


;



Now SSL_accept() gives me back a wrong version number error.



error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version number:s3_pkt.c:386:


When I listed the SSL and TLS versions in use on my system -



openssl ciphers -v | awk '{print $2}' | sort | uniq
SSLv3
TLSv1.2


What am I missing here ?





@jww -> Tagging you coz I noticed you answered a few qs related to openssl. Hope you dont mind



I am running into an issue with SSL_accept() in my server code. I am using openssl 1.0.2g. After much research, I could not find the real reason for the error.



Here is my server code -



open socket , bind to socket, listen on socket

initialize SSL context and libraries. Load certificate and Private key files
{
SSL_load_error_strings();
ERR_load_BIO_strings();
SSL_library_init();
OpenSSL_add_all_algorithms();
const SSL_METHOD *method;
method = SSLv23_server_method();
ctx = SSL_CTX_new(method);
if (SSL_CTX_use_certificate_file(ctx, ccrt, SSL_FILETYPE_PEM) <= 0) {
ERR_print_errors_fp(stdout);
}
if (SSL_CTX_use_PrivateKey_file(ctx, ckey, SSL_FILETYPE_PEM) <= 0 ) {
ERR_print_errors_fp(stdout);

}

pselect() waits on any incoming connections or any reads on existing connections

if new connection - accept() the connection and add to the pselect FD_SET and return

if existing connection, there is something to read so do the following {
SSL *ssl;
if ( !ctx )
{
return 0;
}
ssl = SSL_new(ctx);
SSL_set_fd(ssl, soc);
int ret = SSL_accept(ssl); --> FAILS
if (ret <= 0) {
ERR_print_errors_fp(stdout);
return 0}
}


When the error queue is printed it shows -



error:140760FC:SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol:s23_srvr.c:640:


Is this a version mismatch (Openssl 1.0.2g) ?










share|improve this question

























  • I just listed the SSL and TLS versions : openssl ciphers -v | awk '{print $2}' | sort | uniq - SSLv3 TLSv1.2

    – PeterJ
    Nov 22 '18 at 6:46













  • But it looks like SSLv3 is disabled by default in 1.0.2g per this - launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu1. So I am confused as to which method I should be using for ubuntu 18.04

    – PeterJ
    Nov 22 '18 at 8:17


















0















Edit -
I changed



method = SSLv23_server_method(); to 
method = TLSv1_2_server_method()


;



Now SSL_accept() gives me back a wrong version number error.



error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version number:s3_pkt.c:386:


When I listed the SSL and TLS versions in use on my system -



openssl ciphers -v | awk '{print $2}' | sort | uniq
SSLv3
TLSv1.2


What am I missing here ?





@jww -> Tagging you coz I noticed you answered a few qs related to openssl. Hope you dont mind



I am running into an issue with SSL_accept() in my server code. I am using openssl 1.0.2g. After much research, I could not find the real reason for the error.



Here is my server code -



open socket , bind to socket, listen on socket

initialize SSL context and libraries. Load certificate and Private key files
{
SSL_load_error_strings();
ERR_load_BIO_strings();
SSL_library_init();
OpenSSL_add_all_algorithms();
const SSL_METHOD *method;
method = SSLv23_server_method();
ctx = SSL_CTX_new(method);
if (SSL_CTX_use_certificate_file(ctx, ccrt, SSL_FILETYPE_PEM) <= 0) {
ERR_print_errors_fp(stdout);
}
if (SSL_CTX_use_PrivateKey_file(ctx, ckey, SSL_FILETYPE_PEM) <= 0 ) {
ERR_print_errors_fp(stdout);

}

pselect() waits on any incoming connections or any reads on existing connections

if new connection - accept() the connection and add to the pselect FD_SET and return

if existing connection, there is something to read so do the following {
SSL *ssl;
if ( !ctx )
{
return 0;
}
ssl = SSL_new(ctx);
SSL_set_fd(ssl, soc);
int ret = SSL_accept(ssl); --> FAILS
if (ret <= 0) {
ERR_print_errors_fp(stdout);
return 0}
}


When the error queue is printed it shows -



error:140760FC:SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol:s23_srvr.c:640:


Is this a version mismatch (Openssl 1.0.2g) ?










share|improve this question

























  • I just listed the SSL and TLS versions : openssl ciphers -v | awk '{print $2}' | sort | uniq - SSLv3 TLSv1.2

    – PeterJ
    Nov 22 '18 at 6:46













  • But it looks like SSLv3 is disabled by default in 1.0.2g per this - launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu1. So I am confused as to which method I should be using for ubuntu 18.04

    – PeterJ
    Nov 22 '18 at 8:17














0












0








0








Edit -
I changed



method = SSLv23_server_method(); to 
method = TLSv1_2_server_method()


;



Now SSL_accept() gives me back a wrong version number error.



error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version number:s3_pkt.c:386:


When I listed the SSL and TLS versions in use on my system -



openssl ciphers -v | awk '{print $2}' | sort | uniq
SSLv3
TLSv1.2


What am I missing here ?





@jww -> Tagging you coz I noticed you answered a few qs related to openssl. Hope you dont mind



I am running into an issue with SSL_accept() in my server code. I am using openssl 1.0.2g. After much research, I could not find the real reason for the error.



Here is my server code -



open socket , bind to socket, listen on socket

initialize SSL context and libraries. Load certificate and Private key files
{
SSL_load_error_strings();
ERR_load_BIO_strings();
SSL_library_init();
OpenSSL_add_all_algorithms();
const SSL_METHOD *method;
method = SSLv23_server_method();
ctx = SSL_CTX_new(method);
if (SSL_CTX_use_certificate_file(ctx, ccrt, SSL_FILETYPE_PEM) <= 0) {
ERR_print_errors_fp(stdout);
}
if (SSL_CTX_use_PrivateKey_file(ctx, ckey, SSL_FILETYPE_PEM) <= 0 ) {
ERR_print_errors_fp(stdout);

}

pselect() waits on any incoming connections or any reads on existing connections

if new connection - accept() the connection and add to the pselect FD_SET and return

if existing connection, there is something to read so do the following {
SSL *ssl;
if ( !ctx )
{
return 0;
}
ssl = SSL_new(ctx);
SSL_set_fd(ssl, soc);
int ret = SSL_accept(ssl); --> FAILS
if (ret <= 0) {
ERR_print_errors_fp(stdout);
return 0}
}


When the error queue is printed it shows -



error:140760FC:SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol:s23_srvr.c:640:


Is this a version mismatch (Openssl 1.0.2g) ?










share|improve this question
















Edit -
I changed



method = SSLv23_server_method(); to 
method = TLSv1_2_server_method()


;



Now SSL_accept() gives me back a wrong version number error.



error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version number:s3_pkt.c:386:


When I listed the SSL and TLS versions in use on my system -



openssl ciphers -v | awk '{print $2}' | sort | uniq
SSLv3
TLSv1.2


What am I missing here ?





@jww -> Tagging you coz I noticed you answered a few qs related to openssl. Hope you dont mind



I am running into an issue with SSL_accept() in my server code. I am using openssl 1.0.2g. After much research, I could not find the real reason for the error.



Here is my server code -



open socket , bind to socket, listen on socket

initialize SSL context and libraries. Load certificate and Private key files
{
SSL_load_error_strings();
ERR_load_BIO_strings();
SSL_library_init();
OpenSSL_add_all_algorithms();
const SSL_METHOD *method;
method = SSLv23_server_method();
ctx = SSL_CTX_new(method);
if (SSL_CTX_use_certificate_file(ctx, ccrt, SSL_FILETYPE_PEM) <= 0) {
ERR_print_errors_fp(stdout);
}
if (SSL_CTX_use_PrivateKey_file(ctx, ckey, SSL_FILETYPE_PEM) <= 0 ) {
ERR_print_errors_fp(stdout);

}

pselect() waits on any incoming connections or any reads on existing connections

if new connection - accept() the connection and add to the pselect FD_SET and return

if existing connection, there is something to read so do the following {
SSL *ssl;
if ( !ctx )
{
return 0;
}
ssl = SSL_new(ctx);
SSL_set_fd(ssl, soc);
int ret = SSL_accept(ssl); --> FAILS
if (ret <= 0) {
ERR_print_errors_fp(stdout);
return 0}
}


When the error queue is printed it shows -



error:140760FC:SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol:s23_srvr.c:640:


Is this a version mismatch (Openssl 1.0.2g) ?







c++ encryption openssl tls1.2






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited Nov 22 '18 at 6:55







PeterJ

















asked Nov 22 '18 at 5:22









PeterJPeterJ

54




54













  • I just listed the SSL and TLS versions : openssl ciphers -v | awk '{print $2}' | sort | uniq - SSLv3 TLSv1.2

    – PeterJ
    Nov 22 '18 at 6:46













  • But it looks like SSLv3 is disabled by default in 1.0.2g per this - launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu1. So I am confused as to which method I should be using for ubuntu 18.04

    – PeterJ
    Nov 22 '18 at 8:17



















  • I just listed the SSL and TLS versions : openssl ciphers -v | awk '{print $2}' | sort | uniq - SSLv3 TLSv1.2

    – PeterJ
    Nov 22 '18 at 6:46













  • But it looks like SSLv3 is disabled by default in 1.0.2g per this - launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu1. So I am confused as to which method I should be using for ubuntu 18.04

    – PeterJ
    Nov 22 '18 at 8:17

















I just listed the SSL and TLS versions : openssl ciphers -v | awk '{print $2}' | sort | uniq - SSLv3 TLSv1.2

– PeterJ
Nov 22 '18 at 6:46







I just listed the SSL and TLS versions : openssl ciphers -v | awk '{print $2}' | sort | uniq - SSLv3 TLSv1.2

– PeterJ
Nov 22 '18 at 6:46















But it looks like SSLv3 is disabled by default in 1.0.2g per this - launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu1. So I am confused as to which method I should be using for ubuntu 18.04

– PeterJ
Nov 22 '18 at 8:17





But it looks like SSLv3 is disabled by default in 1.0.2g per this - launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu1. So I am confused as to which method I should be using for ubuntu 18.04

– PeterJ
Nov 22 '18 at 8:17












0






active

oldest

votes












Your Answer






StackExchange.ifUsing("editor", function () {
StackExchange.using("externalEditor", function () {
StackExchange.using("snippets", function () {
StackExchange.snippets.init();
});
});
}, "code-snippets");

StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "1"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});

function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});


}
});














draft saved

draft discarded


















StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53424351%2fopenssl-ssl-accept-fails-with-unknown-protocol%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown

























0






active

oldest

votes








0






active

oldest

votes









active

oldest

votes






active

oldest

votes
















draft saved

draft discarded




















































Thanks for contributing an answer to Stack Overflow!


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53424351%2fopenssl-ssl-accept-fails-with-unknown-protocol%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

鏡平學校

ꓛꓣだゔៀៅຸ໢ທຮ໕໒ ,ໂ'໥໓າ໼ឨឲ៵៭ៈゎゔit''䖳𥁄卿' ☨₤₨こゎもょの;ꜹꟚꞖꞵꟅꞛေၦေɯ,ɨɡ𛃵𛁹ޝ޳ޠ޾,ޤޒޯ޾𫝒𫠁သ𛅤チョ'サノބޘދ𛁐ᶿᶇᶀᶋᶠ㨑㽹⻮ꧬ꧹؍۩وَؠ㇕㇃㇪ ㇦㇋㇋ṜẰᵡᴠ 軌ᵕ搜۳ٰޗޮ޷ސޯ𫖾𫅀ल, ꙭ꙰ꚅꙁꚊꞻꝔ꟠Ꝭㄤﺟޱސꧨꧼ꧴ꧯꧽ꧲ꧯ'⽹⽭⾁⿞⼳⽋២៩ញណើꩯꩤ꩸ꩮᶻᶺᶧᶂ𫳲𫪭𬸄𫵰𬖩𬫣𬊉ၲ𛅬㕦䬺𫝌𫝼,,𫟖𫞽ហៅ஫㆔ాఆఅꙒꚞꙍ,Ꙟ꙱エ ,ポテ,フࢰࢯ𫟠𫞶 𫝤𫟠ﺕﹱﻜﻣ𪵕𪭸𪻆𪾩𫔷ġ,ŧآꞪ꟥,ꞔꝻ♚☹⛵𛀌ꬷꭞȄƁƪƬșƦǙǗdžƝǯǧⱦⱰꓕꓢႋ神 ဴ၀க௭எ௫ឫោ ' េㇷㇴㇼ神ㇸㇲㇽㇴㇼㇻㇸ'ㇸㇿㇸㇹㇰㆣꓚꓤ₡₧ ㄨㄟ㄂ㄖㄎ໗ツڒذ₶।ऩछएोञयूटक़कयँृी,冬'𛅢𛅥ㇱㇵㇶ𥄥𦒽𠣧𠊓𧢖𥞘𩔋цѰㄠſtʯʭɿʆʗʍʩɷɛ,əʏダヵㄐㄘR{gỚṖḺờṠṫảḙḭᴮᵏᴘᵀᵷᵕᴜᴏᵾq﮲ﲿﴽﭙ軌ﰬﶚﶧ﫲Ҝжюїкӈㇴffצּ﬘﭅﬈軌'ffistfflſtffतभफɳɰʊɲʎ𛁱𛁖𛁮𛀉 𛂯𛀞నఋŀŲ 𫟲𫠖𫞺ຆຆ ໹້໕໗ๆทԊꧢꧠ꧰ꓱ⿝⼑ŎḬẃẖỐẅ ,ờỰỈỗﮊDžȩꭏꭎꬻ꭮ꬿꭖꭥꭅ㇭神 ⾈ꓵꓑ⺄㄄ㄪㄙㄅㄇstA۵䞽ॶ𫞑𫝄㇉㇇゜軌𩜛𩳠Jﻺ‚Üမ႕ႌႊၐၸဓၞၞၡ៸wyvtᶎᶪᶹစဎ꣡꣰꣢꣤ٗ؋لㇳㇾㇻㇱ㆐㆔,,㆟Ⱶヤマފ޼ޝަݿݞݠݷݐ',ݘ,ݪݙݵ𬝉𬜁𫝨𫞘くせぉて¼óû×ó£…𛅑הㄙくԗԀ5606神45,神796'𪤻𫞧ꓐ㄁ㄘɥɺꓵꓲ3''7034׉ⱦⱠˆ“𫝋ȍ,ꩲ軌꩷ꩶꩧꩫఞ۔فڱێظペサ神ナᴦᵑ47 9238їﻂ䐊䔉㠸﬎ffiﬣ,לּᴷᴦᵛᵽ,ᴨᵤ ᵸᵥᴗᵈꚏꚉꚟ⻆rtǟƴ𬎎

Guess what letter conforming each word