It is the first time I install certificates. I have my MFES set up as per the documentation, but only works when we set "verify peer=no" in the mf_client.dat file. MFES is acting as a client on this setting.
I installed Wireshark in that server, and below is what I see.
When we remove or comment "verify peer=no" in the mf_client.dat file, it behaves as follows:
We send the "Client Hello" message
Host sends back "Server Hello, Certificate, Server Key Exchanged, Server Hello Done" message from the host.
We immediately send back an "Alert (Level: Fatal, Description: Unknown CA)" message, and follow with a "[FIN, ACK]" transmission.
When we set back the "verify peer=no" parameter in the mf_client.dat file, it then behaves as follows:
We send the "Client Hello" message
Host sends back "Server Hello, Certificate, Server Key Exchanged, Server Hello Done" message from the host.
We send back "Client key Exchange, Change Cipher Spec, Encrypted Handshake Message" message
Host sends back "Change Cipher Spec" message, and then an "Encrypted Handshake Message" message
We start sending data.
Want to point out that what catches my attention about this configuration is that we are using exactly the same certificate files on both client and host/server side.
Do we have an SSL SME in that can help guide us?



