https://bugzilla.novell.com/show_bug.cgi?id=734343
https://bugzilla.novell.com/show_bug.cgi?id=734343#c2
--- Comment #2 from Martin Amadeo 2011-12-12 20:14:20 UTC ---
Hope this helps, please ask for any additional info you may need:
gnutls-cli-debug -V -d 5 -p 443 login.live.com
Resolving 'login.live.com'...
Connecting to '65.54.165.137:443'...
|<4>| REC[0x624510]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:712
|<4>| REC[0x624510]: Allocating epoch #1
|<3>| HSK[0x624510]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x624510]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x624510]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x624510]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x624510]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x624510]: Removing ciphersuite: DH_ANON_3DES_EDE_CBC_SHA1
|<3>| HSK[0x624510]: Removing ciphersuite: DH_ANON_ARCFOUR_MD5
|<3>| HSK[0x624510]: Keeping ciphersuite: RSA_EXPORT_ARCFOUR_40_MD5
|<3>| HSK[0x624510]: CLIENT HELLO was queued [57 bytes]
|<4>| REC[0x624510]: Preparing Packet Handshake(22) with length: 57
|<4>| REC[0x624510]: Sent Packet[1] Handshake(22) with length: 62
|<2>| ASSERT: gnutls_buffers.c:955
|<4>| REC[0x624510]: SSL 3.0 Handshake packet received. Length: 4456
|<4>| REC[0x624510]: Expected Packet Handshake(22)
|<4>| REC[0x624510]: Received Packet Handshake(22) with length: 4456
|<4>| REC[0x624510]: Decrypted Packet[0] Handshake(22) with length: 4456
|<3>| HSK[0x624510]: SERVER HELLO was received. Length 77[4452], frag offset 0,
frag length: 77, sequence: 0
|<3>| HSK[0x624510]: Server's version: 3.0
|<3>| HSK[0x624510]: SessionID length: 32
|<3>| HSK[0x624510]: SessionID:
d1150000e0debd016510bf56fcf6d4b42b7e6fdacb9a7567a4ce92301a28e21b
|<3>| HSK[0x624510]: Selected cipher suite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x624510]: Selected compression method: NULL (0)
|<3>| EXT[0x624510]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes)
|<3>| HSK[0x624510]: Safe renegotiation succeeded
|<2>| ASSERT: gnutls_buffers.c:955
|<3>| HSK[0x624510]: CERTIFICATE was received. Length 4367[4371], frag offset
0, frag length: 4367, sequence: 0
|<2>| ASSERT: gnutls_buffers.c:1161
|<2>| ASSERT: gnutls_buffers.c:955
|<3>| HSK[0x624510]: SERVER HELLO DONE was received. Length 0[0], frag offset
0, frag length: 1, sequence: 0
|<2>| ASSERT: gnutls_buffers.c:1037
|<2>| ASSERT: gnutls_buffers.c:1161
|<2>| ASSERT: gnutls_buffers.c:1146
|<3>| HSK[0x624510]: CLIENT KEY EXCHANGE was queued [260 bytes]
|<3>| REC[0x624510]: Sent ChangeCipherSpec
|<4>| REC[0x624510]: Initializing epoch #1
|<4>| REC[0x624510]: Epoch #1 ready
|<3>| HSK[0x624510]: Cipher Suite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x624510]: Initializing internal [write] cipher sessions
|<3>| HSK[0x624510]: recording tls-unique CB (send)
|<3>| HSK[0x624510]: FINISHED was queued [40 bytes]
|<4>| REC[0x624510]: Preparing Packet Handshake(22) with length: 260
|<4>| REC[0x624510]: Sent Packet[2] Handshake(22) with length: 265
|<4>| REC[0x624510]: Preparing Packet Change Cipher Spec(20) with length: 1
|<4>| REC[0x624510]: Sent Packet[3] Change Cipher Spec(20) with length: 6
|<4>| REC[0x624510]: Preparing Packet Handshake(22) with length: 40
|<4>| REC[0x624510]: Sent Packet[1] Handshake(22) with length: 65
|<2>| ASSERT: session_ticket.c:682
|<4>| REC[0x624510]: SSL 3.0 Change Cipher Spec packet received. Length: 1
|<4>| REC[0x624510]: Expected Packet Change Cipher Spec(20)
|<4>| REC[0x624510]: Received Packet Change Cipher Spec(20) with length: 1
|<4>| REC[0x624510]: Decrypted Packet[1] Change Cipher Spec(20) with length: 1
|<3>| HSK[0x624510]: Cipher Suite: RSA_ARCFOUR_SHA1
|<2>| ASSERT: gnutls_buffers.c:955
|<4>| REC[0x624510]: SSL 3.0 Handshake packet received. Length: 60
|<4>| REC[0x624510]: Expected Packet Handshake(22)
|<4>| REC[0x624510]: Received Packet Handshake(22) with length: 60
|<4>| REC[0x624510]: Decrypted Packet[0] Handshake(22) with length: 40
|<3>| HSK[0x624510]: FINISHED was received. Length 36[36], frag offset 0, frag
length: 36, sequence: 0
|<4>| REC[0x624510]: Start of epoch cleanup
|<4>| REC[0x624510]: Epoch #0 freed
|<4>| REC[0x624510]: End of epoch cleanup
Checking for SSL 3.0 support... yes
|<4>| REC[0x624510]: Start of epoch cleanup
|<4>| REC[0x624510]: End of epoch cleanup
|<4>| REC[0x624510]: Epoch #1 freed
|<4>| REC[0x624510]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:712
|<4>| REC[0x624510]: Allocating epoch #1
|<3>| HSK[0x624510]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x624510]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1
|<3>| HSK[0x624510]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x624510]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1
|<3>| HSK[0x624510]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x624510]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1
|<3>| HSK[0x624510]: Removing ciphersuite: DH_ANON_3DES_EDE_CBC_SHA1
|<3>| HSK[0x624510]: Removing ciphersuite: DH_ANON_AES_128_CBC_SHA1
|<3>| EXT[0x624510]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x624510]: CLIENT HELLO was queued [62 bytes]
|<4>| REC[0x624510]: Preparing Packet Handshake(22) with length: 62
|<4>| REC[0x624510]: Sent Packet[1] Handshake(22) with length: 67
|<2>| ASSERT: gnutls_buffers.c:955
|<4>| REC[0x624510]: SSL 3.1 Handshake packet received. Length: 4456
|<4>| REC[0x624510]: Expected Packet Handshake(22)
|<4>| REC[0x624510]: Received Packet Handshake(22) with length: 4456
|<4>| REC[0x624510]: Decrypted Packet[0] Handshake(22) with length: 4456
|<3>| HSK[0x624510]: SERVER HELLO was received. Length 77[4452], frag offset 0,
frag length: 77, sequence: 0
|<3>| HSK[0x624510]: Server's version: 3.1
|<3>| HSK[0x624510]: SessionID length: 32
|<3>| HSK[0x624510]: SessionID:
87420000527cf2a2cf4bca17c0efee773949808ec54bb7c4886f105b8cb6b0b1
|<3>| HSK[0x624510]: Selected cipher suite: RSA_AES_128_CBC_SHA1
|<3>| HSK[0x624510]: Selected compression method: NULL (0)
|<3>| EXT[0x624510]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes)
|<3>| HSK[0x624510]: Safe renegotiation succeeded
|<2>| ASSERT: gnutls_buffers.c:955
|<3>| HSK[0x624510]: CERTIFICATE was received. Length 4367[4371], frag offset
0, frag length: 4367, sequence: 0
|<2>| ASSERT: gnutls_buffers.c:1161
|<2>| ASSERT: gnutls_buffers.c:955
|<3>| HSK[0x624510]: SERVER HELLO DONE was received. Length 0[0], frag offset
0, frag length: 1, sequence: 0
|<2>| ASSERT: gnutls_buffers.c:1037
|<2>| ASSERT: gnutls_buffers.c:1161
|<2>| ASSERT: gnutls_buffers.c:1146
|<3>| HSK[0x624510]: CLIENT KEY EXCHANGE was queued [262 bytes]
|<3>| REC[0x624510]: Sent ChangeCipherSpec
|<4>| REC[0x624510]: Initializing epoch #1
|<4>| REC[0x624510]: Epoch #1 ready
|<3>| HSK[0x624510]: Cipher Suite: RSA_AES_128_CBC_SHA1
|<3>| HSK[0x624510]: Initializing internal [write] cipher sessions
|<3>| HSK[0x624510]: recording tls-unique CB (send)
|<3>| HSK[0x624510]: FINISHED was queued [16 bytes]
|<4>| REC[0x624510]: Preparing Packet Handshake(22) with length: 262
|<4>| REC[0x624510]: Sent Packet[2] Handshake(22) with length: 267
|<4>| REC[0x624510]: Preparing Packet Change Cipher Spec(20) with length: 1
|<4>| REC[0x624510]: Sent Packet[3] Change Cipher Spec(20) with length: 6
|<4>| REC[0x624510]: Preparing Packet Handshake(22) with length: 16
|<4>| REC[0x624510]: Sent Packet[1] Handshake(22) with length: 261
|<2>| ASSERT: session_ticket.c:682
|<4>| REC[0x624510]: SSL 3.1 Change Cipher Spec packet received. Length: 1
|<4>| REC[0x624510]: Expected Packet Change Cipher Spec(20)
|<4>| REC[0x624510]: Received Packet Change Cipher Spec(20) with length: 1
|<4>| REC[0x624510]: Decrypted Packet[1] Change Cipher Spec(20) with length: 1
|<3>| HSK[0x624510]: Cipher Suite: RSA_AES_128_CBC_SHA1
|<2>| ASSERT: gnutls_buffers.c:955
|<4>| REC[0x624510]: SSL 3.1 Handshake packet received. Length: 48
|<4>| REC[0x624510]: Expected Packet Handshake(22)
|<4>| REC[0x624510]: Received Packet Handshake(22) with length: 48
|<4>| REC[0x624510]: Decrypted Packet[0] Handshake(22) with length: 16
|<3>| HSK[0x624510]: FINISHED was received. Length 12[12], frag offset 0, frag
length: 12, sequence: 0
|<4>| REC[0x624510]: Start of epoch cleanup
|<4>| REC[0x624510]: Epoch #0 freed
|<4>| REC[0x624510]: End of epoch cleanup
Checking whether %COMPAT is required... no
|<4>| REC[0x624510]: Start of epoch cleanup
|<4>| REC[0x624510]: End of epoch cleanup
|<4>| REC[0x624510]: Epoch #1 freed
|<4>| REC[0x624510]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:712
|<4>| REC[0x624510]: Allocating epoch #1
|<3>| HSK[0x624510]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x624510]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x624510]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x624510]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x624510]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x624510]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x624510]: Removing ciphersuite: DH_ANON_3DES_EDE_CBC_SHA1
|<3>| HSK[0x624510]: Removing ciphersuite: DH_ANON_ARCFOUR_MD5
|<3>| HSK[0x624510]: Keeping ciphersuite: RSA_EXPORT_ARCFOUR_40_MD5
|<3>| EXT[0x624510]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x624510]: CLIENT HELLO was queued [64 bytes]
|<4>| REC[0x624510]: Preparing Packet Handshake(22) with length: 64
|<4>| REC[0x624510]: Sent Packet[1] Handshake(22) with length: 69
|<2>| ASSERT: gnutls_buffers.c:955
|<4>| REC[0x624510]: SSL 3.1 Handshake packet received. Length: 4456
|<4>| REC[0x624510]: Expected Packet Handshake(22)
|<4>| REC[0x624510]: Received Packet Handshake(22) with length: 4456
|<4>| REC[0x624510]: Decrypted Packet[0] Handshake(22) with length: 4456
|<3>| HSK[0x624510]: SERVER HELLO was received. Length 77[4452], frag offset 0,
frag length: 77, sequence: 0
|<3>| HSK[0x624510]: Server's version: 3.1
|<3>| HSK[0x624510]: SessionID length: 32
|<3>| HSK[0x624510]: SessionID:
ac2e0000ed5ed96bb4d041bf4a5c29f5b784b4fc4fb039f2730d31970dfabbc2
|<3>| HSK[0x624510]: Selected cipher suite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x624510]: Selected compression method: NULL (0)
|<3>| EXT[0x624510]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes)
|<3>| HSK[0x624510]: Safe renegotiation succeeded
|<2>| ASSERT: gnutls_buffers.c:955
|<3>| HSK[0x624510]: CERTIFICATE was received. Length 4367[4371], frag offset
0, frag length: 4367, sequence: 0
|<2>| ASSERT: gnutls_buffers.c:1161
|<2>| ASSERT: gnutls_buffers.c:955
|<3>| HSK[0x624510]: SERVER HELLO DONE was received. Length 0[0], frag offset
0, frag length: 1, sequence: 0
|<2>| ASSERT: gnutls_buffers.c:1037
|<2>| ASSERT: gnutls_buffers.c:1161
|<2>| ASSERT: gnutls_buffers.c:1146
|<3>| HSK[0x624510]: CLIENT KEY EXCHANGE was queued [262 bytes]
|<3>| REC[0x624510]: Sent ChangeCipherSpec
|<4>| REC[0x624510]: Initializing epoch #1
|<4>| REC[0x624510]: Epoch #1 ready
|<3>| HSK[0x624510]: Cipher Suite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x624510]: Initializing internal [write] cipher sessions
|<3>| HSK[0x624510]: recording tls-unique CB (send)
|<3>| HSK[0x624510]: FINISHED was queued [16 bytes]
|<4>| REC[0x624510]: Preparing Packet Handshake(22) with length: 262
|<4>| REC[0x624510]: Sent Packet[2] Handshake(22) with length: 267
|<4>| REC[0x624510]: Preparing Packet Change Cipher Spec(20) with length: 1
|<4>| REC[0x624510]: Sent Packet[3] Change Cipher Spec(20) with length: 6
|<4>| REC[0x624510]: Preparing Packet Handshake(22) with length: 16
|<4>| REC[0x624510]: Sent Packet[1] Handshake(22) with length: 41
|<2>| ASSERT: session_ticket.c:682
|<4>| REC[0x624510]: SSL 3.1 Change Cipher Spec packet received. Length: 1
|<4>| REC[0x624510]: Expected Packet Change Cipher Spec(20)
|<4>| REC[0x624510]: Received Packet Change Cipher Spec(20) with length: 1
|<4>| REC[0x624510]: Decrypted Packet[1] Change Cipher Spec(20) with length: 1
|<3>| HSK[0x624510]: Cipher Suite: RSA_ARCFOUR_SHA1
|<2>| ASSERT: gnutls_buffers.c:955
|<4>| REC[0x624510]: SSL 3.1 Handshake packet received. Length: 36
|<4>| REC[0x624510]: Expected Packet Handshake(22)
|<4>| REC[0x624510]: Received Packet Handshake(22) with length: 36
|<4>| REC[0x624510]: Decrypted Packet[0] Handshake(22) with length: 16
|<3>| HSK[0x624510]: FINISHED was received. Length 12[12], frag offset 0, frag
length: 12, sequence: 0
|<4>| REC[0x624510]: Start of epoch cleanup
|<4>| REC[0x624510]: Epoch #0 freed
|<4>| REC[0x624510]: End of epoch cleanup
Checking for TLS 1.0 support... yes
|<4>| REC[0x624510]: Start of epoch cleanup
|<4>| REC[0x624510]: End of epoch cleanup
|<4>| REC[0x624510]: Epoch #1 freed
|<4>| REC[0x624510]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:712
|<4>| REC[0x624510]: Allocating epoch #1
|<3>| HSK[0x624510]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x624510]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x624510]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x624510]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x624510]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x624510]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x624510]: Removing ciphersuite: DH_ANON_3DES_EDE_CBC_SHA1
|<3>| HSK[0x624510]: Removing ciphersuite: DH_ANON_ARCFOUR_MD5
|<3>| EXT[0x624510]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x624510]: CLIENT HELLO was queued [62 bytes]
|<4>| REC[0x624510]: Preparing Packet Handshake(22) with length: 62
|<4>| REC[0x624510]: Sent Packet[1] Handshake(22) with length: 67
|<2>| ASSERT: gnutls_buffers.c:955
|<4>| REC[0x624510]: SSL 3.1 Handshake packet received. Length: 4456
|<4>| REC[0x624510]: Expected Packet Handshake(22)
|<4>| REC[0x624510]: Received Packet Handshake(22) with length: 4456
|<4>| REC[0x624510]: Decrypted Packet[0] Handshake(22) with length: 4456
|<3>| HSK[0x624510]: SERVER HELLO was received. Length 77[4452], frag offset 0,
frag length: 77, sequence: 0
|<3>| HSK[0x624510]: Server's version: 3.1
|<2>| ASSERT: gnutls_handshake.c:1517
|<2>| ASSERT: gnutls_handshake.c:2013
|<2>| ASSERT: gnutls_handshake.c:1250
|<2>| ASSERT: gnutls_handshake.c:2432
Checking for TLS 1.1 support... no
|<4>| REC[0x624510]: Start of epoch cleanup
|<4>| REC[0x624510]: End of epoch cleanup
|<4>| REC[0x624510]: Epoch #0 freed
|<4>| REC[0x624510]: Epoch #1 freed
|<4>| REC[0x624510]: Allocating epoch #0
|<2>| ASSERT: gnutls_constate.c:712
|<4>| REC[0x624510]: Allocating epoch #1
|<3>| HSK[0x624510]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x624510]: Keeping ciphersuite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x624510]: Keeping ciphersuite: RSA_ARCFOUR_MD5
|<3>| HSK[0x624510]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
|<3>| HSK[0x624510]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
|<3>| HSK[0x624510]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1
|<3>| HSK[0x624510]: Removing ciphersuite: DH_ANON_3DES_EDE_CBC_SHA1
|<3>| HSK[0x624510]: Removing ciphersuite: DH_ANON_ARCFOUR_MD5
|<3>| EXT[0x624510]: Sending extension SAFE RENEGOTIATION (1 bytes)
|<3>| HSK[0x624510]: CLIENT HELLO was queued [62 bytes]
|<4>| REC[0x624510]: Preparing Packet Handshake(22) with length: 62
|<4>| REC[0x624510]: Sent Packet[1] Handshake(22) with length: 67
|<2>| ASSERT: gnutls_buffers.c:955
|<4>| REC[0x624510]: SSL 3.1 Handshake packet received. Length: 4456
|<4>| REC[0x624510]: Expected Packet Handshake(22)
|<4>| REC[0x624510]: Received Packet Handshake(22) with length: 4456
|<4>| REC[0x624510]: Decrypted Packet[0] Handshake(22) with length: 4456
|<3>| HSK[0x624510]: SERVER HELLO was received. Length 77[4452], frag offset 0,
frag length: 77, sequence: 0
|<3>| HSK[0x624510]: Server's version: 3.1
|<3>| HSK[0x624510]: SessionID length: 32
|<3>| HSK[0x624510]: SessionID:
102600006e13dccfd4a5f3776cf9d1e57f770d89a08d83ca0f2d6194b1290cee
|<3>| HSK[0x624510]: Selected cipher suite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x624510]: Selected compression method: NULL (0)
|<3>| EXT[0x624510]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes)
|<3>| HSK[0x624510]: Safe renegotiation succeeded
|<2>| ASSERT: gnutls_buffers.c:955
|<3>| HSK[0x624510]: CERTIFICATE was received. Length 4367[4371], frag offset
0, frag length: 4367, sequence: 0
|<2>| ASSERT: gnutls_buffers.c:1161
|<2>| ASSERT: gnutls_buffers.c:955
|<3>| HSK[0x624510]: SERVER HELLO DONE was received. Length 0[0], frag offset
0, frag length: 1, sequence: 0
|<2>| ASSERT: gnutls_buffers.c:1037
|<2>| ASSERT: gnutls_buffers.c:1161
|<2>| ASSERT: gnutls_buffers.c:1146
|<3>| HSK[0x624510]: CLIENT KEY EXCHANGE was queued [262 bytes]
|<3>| REC[0x624510]: Sent ChangeCipherSpec
|<4>| REC[0x624510]: Initializing epoch #1
|<4>| REC[0x624510]: Epoch #1 ready
|<3>| HSK[0x624510]: Cipher Suite: RSA_ARCFOUR_SHA1
|<3>| HSK[0x624510]: Initializing internal [write] cipher sessions
|<3>| HSK[0x624510]: recording tls-unique CB (send)
|<3>| HSK[0x624510]: FINISHED was queued [16 bytes]
|<4>| REC[0x624510]: Preparing Packet Handshake(22) with length: 262
|<4>| REC[0x624510]: Sent Packet[2] Handshake(22) with length: 267
|<4>| REC[0x624510]: Preparing Packet Change Cipher Spec(20) with length: 1
|<4>| REC[0x624510]: Sent Packet[3] Change Cipher Spec(20) with length: 6
|<4>| REC[0x624510]: Preparing Packet Handshake(22) with length: 16
|<4>| REC[0x624510]: Sent Packet[1] Handshake(22) with length: 41
|<2>| ASSERT: session_ticket.c:682
|<4>| REC[0x624510]: SSL 3.1 Change Cipher Spec packet received. Length: 1
|<4>| REC[0x624510]: Expected Packet Change Cipher Spec(20)
|<4>| REC[0x624510]: Received Packet Change Cipher Spec(20) with length: 1
|<4>| REC[0x624510]: Decrypted Packet[1] Change Cipher Spec(20) with length: 1
|<3>| HSK[0x624510]: Cipher Suite: RSA_ARCFOUR_SHA1
|<2>| ASSERT: gnutls_buffers.c:955
|<4>| REC[0x624510]: SSL 3.1 Handshake packet received. Length: 36
|<4>| REC[0x624510]: Expected Packet Handshake(22)
|<4>| REC[0x624510]: Received Packet Handshake(22) with length: 36
|<4>| REC[0x624510]: Decrypted Packet[0] Handshake(22) with length: 16
|<3>| HSK[0x624510]: FINISHED was received. Length 12[12], frag offset 0, frag
length: 12, sequence: 0
|<4>| REC[0x624510]: Start of epoch cleanup
|<4>| REC[0x624510]: Epoch #0 freed
|<4>| REC[0x624510]: End of epoch cleanup
Checking fallback from TLS 1.1 to... TLS 1.0
|<4>| REC[0x624510]: Start of epoch cleanup
|<4>| REC[0x624510]: End of epoch cleanup
|<4>| REC[0x624510]: Epoch #1 freed
--
Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.