Hello,
I'm trying to update a zimbra environment from 8.8.5 to 8.8.6 and when I ran install.sh I got this error:
SSL connect attempt failed error:140770FC:SSL routines:SSL23_GET_SERVER_HELLO:unknown protocol at /opt/zimbra/common/lib/perl5/LWP/Protocol/http.pm line 47.
Does anyone have any idea?
Kind regards.
Fabio
SSL23_GET_SERVER_HELLO:unknown protocol when updating zimbra 8.8.5 to 8.8.6
- fs.schmidt
- Outstanding Member
- Posts: 278
- Joined: Sat Sep 13, 2014 3:37 am
- Location: Brazil
- Contact:
-
- Posts: 5
- Joined: Mon Apr 30, 2018 9:38 am
Re: SSL23_GET_SERVER_HELLO:unknown protocol when updating zimbra 8.8.5 to 8.8.6
Same problem here.
https_proxy is configured to the address and port of a proxy server that allows https requests to the internet.
ssldump gives:
New TCP connection #6: a.b.c.d(36462) <-> e.f.g.h(3128)
6 1 0.0007 (0.0007) C>S Handshake
ClientHello
Version 3.3
cipher suites
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
TLS_DHE_DSS_WITH_AES_128_CBC_SHA
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
TLS_DHE_DSS_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_RC4_128_SHA
TLS_EMPTY_RENEGOTIATION_INFO_SCSV
compression methods
NULL
6 2 0.0011 (0.0004) S>C Short record: 20527 bytes available (expecting: 0)
6 3 0.0013 (0.0002) S>C Short record: 27749 bytes available (expecting: 0)
6 0.0013 (0.0000) S>C TCP FIN
6 0.0027 (0.0013) C>S TCP RST
https_proxy is configured to the address and port of a proxy server that allows https requests to the internet.
ssldump gives:
New TCP connection #6: a.b.c.d(36462) <-> e.f.g.h(3128)
6 1 0.0007 (0.0007) C>S Handshake
ClientHello
Version 3.3
cipher suites
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
TLS_DHE_DSS_WITH_AES_128_CBC_SHA
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
TLS_DHE_DSS_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_RC4_128_SHA
TLS_EMPTY_RENEGOTIATION_INFO_SCSV
compression methods
NULL
6 2 0.0011 (0.0004) S>C Short record: 20527 bytes available (expecting: 0)
6 3 0.0013 (0.0002) S>C Short record: 27749 bytes available (expecting: 0)
6 0.0013 (0.0000) S>C TCP FIN
6 0.0027 (0.0013) C>S TCP RST