Here is the part of ssl debug from server side:
Thread-1, READ: TLSv1 Handshake, length = 128
Allow unsafe renegotiation: false
Allow legacy hello messages: false
Is initial handshake: false
Is secure renegotiation: true
*** ClientHello, TLSv1
RandomCookie: GMT: 1326076465 bytes = { 195, 102, 145, 176, 167, 150, 9, 162, 47, 62, 214, 163, 120, 118, 26, 152, 69, 200, 72, 61, 175, 174, 252, 236, 120, 20
4, 18, 86 }
Session ID: {}
Cipher Suites: [TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS
_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, SSL_RSA
_WITH_IDEA_CBC_SHA, SSL_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_MD5, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SS
L_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5, SSL_RSA_EXPOR
T_WITH_RC4_40_MD5]
Compression Methods: { 0 }
Extension renegotiation_info, renegotiated_connection: 3c:6d:0b:aa:47:f4:d1:63:05:4b:cb:f8
Unsupported extension type_35, data:
***
%% Initialized: [Session-2, SSL_NULL_WITH_NULL_NULL]
%% Negotiating: [Session-2, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA]
*** ServerHello, TLSv1
RandomCookie: GMT: 1326076452 bytes = { 238, 57, 234, 189, 103, 165, 225, 15, 14, 39, 146, 76, 2, 106, 174, 240, 176, 192, 176, 239, 254, 212, 35, 207, 90, 61,
71, 204 }
Session ID: {79, 10, 82, 36, 145, 206, 200, 58, 8, 62, 53, 177, 184, 159, 162, 24, 188, 126, 183, 111, 211, 236, 89, 112, 2, 217, 27, 34, 183, 180, 160, 202}
Cipher Suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: 3c:6d:0b:aa:47:f4:d1:63:05:4b:cb:f8:fa:2a:58:cb:84:5d:07:16:25:c6:3e:ec
***
Cipher suite: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
You can see both properties set to false already.