Quote:
Originally Posted by allend
|
Oddly enough it looks like Debian is the one that is using TLSv1.0 in some way. I've compared Wireshark info when connecting to the same server on the same client hardware using Debian and Windows. I was surprised that Windows makes no mention at all of EAP. I don't know why that is. The only difference between these sections is the mention of TLSv1.0 in the Debian packet. I haven't included the lists of cipher suites and hash algorithms.
Edit: There's also an error in the GMT Unix Time field but apparently it's not important, at least to TLS itself.
Debian (not working)
Secure Sockets Layer
SSL Record Layer: Handshake Protocol: Client Hello
Content Type: Handshake (22)
Version: TLS 1.0 (0x0301)
Length: 266
Handshake Protocol: Client Hello
Handshake Type: Client Hello (1)
Length: 262
Version: TLS 1.2 (0x0303)
Random
GMT Unix Time: Mar 28, 2014 16:12:13.000000000 +08
Random Bytes: 96461b52573c44bd376f9254d355b7dbcb5e63e41141ccd5...
Session ID Length: 0
Windows (working)
Secure Sockets Layer
TLSv1.2 Record Layer: Handshake Protocol: Client Hello
Content Type: Handshake (22)
Version: TLS 1.2 (0x0303)
Length: 175
Handshake Protocol: Client Hello
Handshake Type: Client Hello (1)
Length: 171
Version: TLS 1.2 (0x0303)
Random: 5ad56d681c707d3b8fca96cfffb65cacca7e484b1adf3950...
GMT Unix Time: Apr 17, 2018 11:43:36.000000000 Malay Peninsula Standard Time
Random Bytes: 1c707d3b8fca96cfffb65cacca7e484b1adf3950fefca876...
Session ID Length: 0