Any ideas what options I need to pass openssl s_client to get it to connect?
openssl s_client -connect bbs.castlerockbbs.com:24553
...deon
Now that I'm running Mystic A46, I'm trying to get a tunneled binkps session between my pi and mystic. I keep running into problems when
using the
following: "openssl s_client -quiet -cipher ALL:@SECLEVEL=1 -alpn
binkp -connect"
After the -connect *H:*I might solve the problem. Here is the node line
I was using to poll hub 4.
node 21:4/100@fsxnet -pipe "openssl s_client -quiet -alpn binkp -cipher ALL@SECLEVEL=1 -connect *H:*I" bbs.castlerockbbs.com:24553 XXXXXXXX c
node 21:4/100@fsxnet -pipe "openssl s_client -quiet -alpn binkp -cipher
ALL@SECLEVEL=1 -connect *H:*I" bbs.castlerockbbs.com:24553 XXXXXXXX c
This didn't seem to make a difference when I reenabled the security settings in my /etc/ssl/openssl.cnf.
openssl s_client -connect bbs.castlerockbbs.com:24553
...deon
After poking around, even doing this test gives me the same result:
openssl s_client -connect bbs.eggy.cc:24553
CONNECTED(00000003)
3069566992:error:1425F102:SSL routines:ssl_choose_client_version:unsupported protocol:../ssl/statem/statem_lib.c:1929:
Then I tried on my linux desktop and my desktop is able to connect..
After some further research.. I looked into /etc/ssl/opensl.cnf on my
pi, it has this at the bottom:
[system_default_sect]
MinProtocol = TLSv1.2
CipherString = DEFAULT@SECLEVEL=2
if I comment this out, it works.
I would think using -cipher ALL:@SECLEVEL=1 would override this, but I guess its not working..
Looks to be a security setting in ssl on my raspberry pi.
| Sysop: | Eric Oulashin |
|---|---|
| Location: | Beaverton, Oregon, USA |
| Users: | 124 |
| Nodes: | 16 (0 / 16) |
| Uptime: | 00:59:20 |
| Calls: | 7,808 |
| Files: | 9,388 |
| D/L today: |
214 files (349M bytes) |
| Messages: | 398,654 |