Tls 1.2
#20
Replies: 2 comments 20 replies
-
The typo in the error message is hilarious :)) and I'll fix it ASAP Unfortunately thunks based backend does not support TLS 1.2 in server mode (only client) It's only native OS based one that supports older protocol versions but lacks TLS 1.3 support on anything but latest Win10 releases (not tested) So currently there is not much that can be done short of impl TLS 1.2 server mode in thunks backend which is not trivial. |
Beta Was this translation helpful? Give feedback.
20 replies
-
Hi...
Great - thanks!
Graham
…____________________________________________
From: wqweto/VbAsyncSocket
Sent: 18 November 2021 08:49
To: wqweto/VbAsyncSocket ***@***.***>
Subject: Re: [wqweto/VbAsyncSocket] Tls 1.2 (Discussion #20)
Unfortunately thunks based backend does not support TLS 1.2 in server mode
(only client)
It's only native OS based one that supports older protocol versions but
lacks TLS 1.3 support on anything but latest Win10 releases (not tested)
So currently there is not much that can be done short of impl TLS 1.2
server mode in thunks backend which is not trivial.
JFYI, I found some time (bit the bullet) and recent VB6+thunks backend
supports client and server mode for both TLS 1.3 and (legacy) TLS 1.2 incl.
in the Barebones sample.
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub, or unsubscribe.
Triage notifications on the go with GitHub Mobile for iOS or Android.
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hi..
I have an app that works well, based from the barebonetls server example.
It works fine with Tls1.3, except that I now have a client that can at best manage tls 1.2
If I connect from openssl with:
openssl s_client -no_tls1_3 -tlsextdebug 192.168.1.107:10443
I get a handshake error "Missing supported ciphersuite"
I found 2 instances where the code seemed to want tls1.3 only,:
`.LocalFeatures = ucsTlsSupportTls13
For Each vElem In pvTlsGetSortedCipherSuites(ucsTlsSupportTls13)
cCipherPrefs.Add cCipherPrefs.Count, "#" & vElem
Next
`
in mdTlsThunks module.
I altered those to "ucsTlsSupportAll"
I now get the error:
"Received fatal alert. Unsupported expension"
So I may or may not be on the right track!
Any advice on how to get it to work with openssl tls1.2 would be greatly appreciated!
Thanks!
Beta Was this translation helpful? Give feedback.
All reactions