Hello,
enclosed you find the debug log.
In my opionen the juniper use old and unsecure cipher. Because of that I got an handshake failure.
The HTTPS Encryption of the webinterface is also not state of the art (3DES / SHA)
So why don´t update Juiper the cipher´s?
ssl connect get cert and ca from pki
free ssl_ctx
ssl_create_cipher_list:
SSL: cipher EDH-RSA-DES-CBC3-SHA
SSL: cipher EDH-DSS-DES-CBC3-SHA
SSL: cipher DES-CBC3-SHA
SSL: cipher DES-CBC3-MD5
SSL: cipher DHE-DSS-RC4-SHA
SSL: cipher IDEA-CBC-SHA
SSL: cipher RC4-SHA
SSL: cipher RC4-MD5
SSL: cipher IDEA-CBC-MD5
SSL: cipher RC2-CBC-MD5
SSL: cipher RC4-MD5
SSL: cipher RC4-64-MD5
SSL: cipher EXP1024-DHE-DSS-RC4-SHA
SSL: cipher EXP1024-RC4-SHA
SSL: cipher EXP1024-DHE-DSS-DES-CBC-SHA
SSL: cipher EXP1024-DES-CBC-SHA
SSL: cipher EXP1024-RC2-CBC-MD5
SSL: cipher EXP1024-RC4-MD5
SSL: cipher EDH-RSA-DES-CBC-SHA
SSL: cipher EDH-DSS-DES-CBC-SHA
SSL: cipher DES-CBC-SHA
SSL: cipher DES-CBC-MD5
SSL: cipher EXP-EDH-RSA-DES-CBC-SHA
SSL: cipher EXP-EDH-DSS-DES-CBC-SHA
SSL: cipher EXP-DES-CBC-SHA
SSL: cipher EXP-RC2-CBC-MD5
SSL: cipher EXP-RC4-MD5
SSL: cipher EXP-RC2-CBC-MD5
SSL: cipher EXP-RC4-MD5
ssl_state: sslStateCertVerified
SSL Connection Init
SSL set client mode
SSL_connect:before/connect initialization
## 2016-10-08 15:22:26 : bio_write, before bwrite.
## 2016-10-08 15:22:26 : send: 114 bytes send for socket 53
## 2016-10-08 15:22:26 : bio_write, after bwrite. <114>
SSL_connectSLv2/v3 write client hello A
## 2016-10-08 15:22:26 : invalid socket state: id: 53, state: 8
ssl connect (53): socket be closed
## 2016-10-08 15:22:26 : DDNS: connect error
ssl close socket(53)
ssl closing connect socket(53)
## 2016-10-08 15:22:26 : close: socket id 53
## 2016-10-08 15:22:26 : socket creation failed
## 2016-10-08 15:22:26 : ddns: resend update after 60 min
## 2016-10-08 15:22:26 : recv: 7 bytes received for socket (53)
SSL3 alert read:fatal:handshake failure