Issue with cipher suites/signature algorithm on my zephyr based TLS client #73842
Replies: 2 comments 9 replies
-
Hi @LeoBRIANDSmile! We appreciate you submitting your first issue for our open-source project. 🌟 Even though I'm a bot, I can assure you that the whole community is genuinely grateful for your time and effort. 🤖💙 |
Beta Was this translation helpful? Give feedback.
-
The list of available cipersuites on the Zephyr side depends on the mbedTLS configuration, see: You can enable more or less everything with the following configs:
But it's usually better to select those algorithms from the link above that your project really needs. Converting this into discussion, since it's not really a bug. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi,
I'm working on a TLS client based on echo-client sample.
I have been debugging my zephyr based TLS client for 1 week because I have an issue with it. During the handshake between my client (zephyr based) and my server ("$ sudo openssl s_server -accept 443 -cert serv_cert.crt -key serv_key.key -tls1_2") a handshake failure happens.
". 404796A5FF770000:error:0A000076:SSL routines:tls_choose_sigalg:no suitable signature algorithm:../ssl/t1_lib.c:3293:
shutting down SSL
CONNECTION CLOSED"
On WIreshark my client hello looks like this :


I printed the ciphers suite available on my server : "$ openssl ciphers -s -tls1_2"
ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA
There are no common ciphersuites between the previous one and the client hello. How could I add more ciphersuite to my board, particularly the one that "openssl ciphers" command prints ? Does the ciphersuite list depends on the board we use ?
I tried to modify my overlay-tls.conf by adding "CONFIG_MBEDTLS_KEY_EXCHANGE_ALL_ENABLED" but nothing happened.
Thank you in advance for your help !
Beta Was this translation helpful? Give feedback.
All reactions