SSL/TLS Handshake

https://www.thesslstore.com/blog/explaining-ssl-handshake/

The “Change Cipher Spec” message lets the other party know that it has generated the session key and is going to switch to encrypted communication.

https://www.thesslstore.com/blog/tls-handshake-failed/

https://thesecmaster.com/decoding-tls-v1-2-protocol-handshake-with-wireshark/

After the client receives the server encrypted key. It will respond with the client encrypted key. It also sends change cipher spec. What it means is that it has enough information to start encrypted communication, and it is going to send the data with encryption from now onwards. Till now, the communication was plain text. After this, communication will happen with encryption. After the server receives the change cipher spec message, it expects encrypted data from the client.

https://serverfault.com/questions/875229/two-way-ssl-error-400-the-ssl-certificate-error-just-for-client-certificate

https://doc.openresty.com/en/edge/edge-admin/cert/client-cert/

Yes: Force client certificate verification, if there is no client certificate or incorrect client certificate, 400 error code will be returned directly.

$ curl -vik https://<www.example.com>/desktop/home

*   Trying 10.40.125.118...

< HTTP/1.1 400 Bad Request

HTTP/1.1 400 Bad Request

< Date: Fri, 17 Mar 2023 10:36:33 GMT

Date: Fri, 17 Mar 2023 10:36:33 GMT

<

<head><title>400 The SSL certificate error</title></head> <body>

400 Bad Request

The SSL certificate error

openresty
  • Closing connection 0

  • TLSv1.2 (OUT), TLS alert, close notify (256):

posted @ 2025-03-05 13:23  严肃活泼快乐有趣  阅读(33)  评论(0)    收藏  举报