我有以下奇怪的SSL连接错误:
openssl s_client -ssl3 -connect host:443 -msg CONNECTED(00000003) >>> SSL 3.0 Handshake [length 0087],ClientHello 01 00 00 83 03 00 53 70 cb 57 f8 66 46 4d ad 9f 12 f9 03 32 11 b9 58 f8 82 d7 43 36 80 c9 39 68 14 72 85 18 95 2b 00 00 5c c0 14 c0 0a 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 write:errno=104 --- no peer certificate available --- No client certificate CA names sent --- SSL handshake has read 0 bytes and written 0 bytes
有时连接工作正常,有时上面的错误发生在没有已知的情况下,甚至没有达到证书交换状态.
我的系统是CentOS 6.5 OpenSSL 1.0.1e-fips 2013年2月11日.
发现默认情况下新的AWS类型的实例具有MTU 9001,这会导致带有SSL数据包的错误:有时它们会延迟,有时会被丢弃.将MTU设置为1500有助于解决此问题.
报价自http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instance-types.html:
The maximum transmission unit (MTU) for an instance depends on its instance type. The following instance types provide 9001 MTU (jumbo frames): CC2,C3,R3,CG1,CR1,G2,HS1,HI1,I2,and M3. The other instance types provide 1500 MTU (Ethernet v2 frames).)