What | Removed | Added |
---|---|---|
Flags | needinfo? |
maybe I didn't looked close enough. The `pcap` only show the TLSv1 connection attempt but in the log, there are TLSv1.2 attempts. But maybe this error message gives us the hint: > 1633942341.923234: SSL: SSL3 alert: write (local SSL3 detected an error):fatal:handshake failure > 1633942341.923243: EAP: Status notification: local TLS alert (param=handshake failure) > 1633942341.923273: SSL: (where=0x1002 ret=0xffffffff) > 1633942341.923286: SSL: SSL_connect:error in error > 1633942341.923302: OpenSSL: openssl_handshake - SSL_connect error:141A318A:SSL routines:tls_process_ske_dhe:dh key too small Unfortunately I don't see how long is the DH, but maybe it is about the https://en.opensuse.org/SDB:Crypto-policies , maybe you could **try** it with lower security restrictions like: > update-crypto-policies --set LEGACY