mailing list archives
nsock_connect_ssl: bad version identification?
From: " mixter () gmail com" <mixter () gmail com>
Date: Thu, 15 May 2008 21:02:53 +0200
I'm trying to establish a SSL connection using nsock_connect_ssl(),
I get "Did not receive identification string" (using nmap -sV with ssl
"Bad protocol version identification '\200\177\001\003\001' from 127.0.0.1"
(the latter with my usage of nsock_connect_ssl():
nmap-exp/ncat/ncat_main.c line 471).
Nsock is supposed to provide a normal, working ssl session, right?
If so, what did I do wrong? I call nsock_connect_ssl(pool, cs.tcp_nsi, handler,
timeout, &cs, &sockaddress, sockaddrlen, port, cs.ssl_session), with:
- pool = nsp_new(NULL)
- tcp_nsi = nsi_new(pool, NULL)
- cs is a struct conn_state of which I only touch the nsi and ssl_session
- handler function does exactly the same as nmap's handler
- timeout, port, sockaddrlen set correctly, cs.ssl_session = NULL
- sockaddress has family, s_addr, port set correctly
- everything actually working if I do a nsock_connect_tcp() instead
As I've already spent considerable time on debugging this, any hints
on closing in
on the problem would be greatly appreciated :-) And as said, the particular
ssl-connection-refusing code is already checked in: nmap-exp/ncat/ncat_main.c
Sent through the nmap-dev mailing list
Archived at http://SecLists.Org
- nsock_connect_ssl: bad version identification? mixter () gmail com (May 15)