Thanks!
How can I tell IO::Socket::SSL to use more ciphers; those used by openssl s_client? AND, is it a good idea to do so? That is, does doing so introduce vulnerabilities when connecting to Tomcat? (I don't even know what an F5 appliance is.) Or does it only use the best ciphers available to it? Or does it even matter when the client and server are going to negotiate the cipher to use anyway?
I did turn off SNI, but it made no difference except to get rid of the reference to SNI in the output.
I'll send my Wireshark logs directly. I assume that's what you're talking about in your reference to a full packet dump. I just started using Wireshark last Friday, and am still having difficulty making sense of it, or even how to have it actually show me the data (I have all the keys and certificates that would be used in the SSL handshaking, but I don't know if I need to tell Wireshark about them, or how to do so if so).
Thanks
Ted
In reply to Re^10: Can Log4Perl integrated with LWP log SSL/TLS handshaking?
by ted.byers
in thread Can Log4Perl integrated with LWP log SSL/TLS handshaking?
by ted.byers
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |