X-Loop: [email protected] Subject: bug#270: unable to connect using TLSv1.2. Reply-To: Thomas Groman <[email protected]>, [email protected] Resent-From: Thomas Groman <[email protected]> Resent-To: [email protected] Resent-CC: [email protected] Resent-Date: Sun, 16 Dec 2018 04:03:01 UTC Resent-Message-ID: <[email protected]> Resent-Sender: [email protected] X-Devuan-PR-Message: report 270 X-Devuan-PR-Package: mariadb-client X-Devuan-PR-Keywords: Received: via spool by [email protected] id=B.154493280327679 (code B ref -1); Sun, 16 Dec 2018 04:03:01 UTC Received: (at submit) by bugs.devuan.org; 16 Dec 2018 04:00:03 +0000 Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by fulcanelli with IMAP (fetchmail-6.3.26) for <debbugs@localhost> (single-drop); Sun, 16 Dec 2018 05:00:03 +0100 (CET) Received: from mail.onlinenw.com (mail.onlinenw.com [206.212.237.200]) by vm6.ganeti.dyne.org (Postfix) with ESMTP id 7C9F0F604AE for <[email protected]>; Sun, 16 Dec 2018 04:51:24 +0100 (CET) Received: (qmail 13416 invoked from network); 16 Dec 2018 03:51:15 -0000 Received: from localhost (HELO lappy) ([email protected]@127.0.0.1) by mail1.onlinenw.com with SMTP (d648699c-00e5-11e9-93e5-00188bf9ee8f); Sat, 15 Dec 2018 19:51:15 -0800 Date: Sat, 15 Dec 2018 19:53:44 -0800 From: Thomas Groman <[email protected]> Disposition-Notification-To: Thomas Groman <[email protected]> To: Devuan Bug Tracking System <[email protected]> Message-ID: <154493212845.23324.11005533420082713814.reportbug@lappy> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-MagicMail-OS: MagicMail 3.0-Stable X-MagicMail-UUID: d648699c-00e5-11e9-93e5-00188bf9ee8f X-MagicMail-Authenticated: [email protected] X-MagicMail-SourceIP: 127.0.0.1 X-MagicMail-RegexMatch: 2 X-MagicMail-EnvelopeFrom: <[email protected]> X-Spam-Status: No, score=-0.0 required=5.0 tests=RCVD_IN_DNSWL_NONE,SPF_PASS autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org Package: mariadb-client Version: 10.1.37-0+deb9u1 Severity: important -- System Information: Distributor ID: Devuan Description: Devuan GNU/Linux 2.0 (ascii) Release: 2.0 Codename: ascii Architecture: x86_64 Kernel: Linux 4.9.0-8-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) Versions of packages mariadb-client depends on: ii mariadb-client-10.1 10.1.37-0+deb9u1 mariadb-client recommends no packages. mariadb-client suggests no packages. -- no debconf information Mariadb-client is unable to negotiate to TLSv1.2. I have tested this with server versions: 10.1.37-MariaDB Gentoo Linux mariadb-10.1.37 10.1.34-MariaDB Gentoo Linux mariadb-10.1.34 . It should be noted that only the client version: Ver 15.1 Distrib 10.1.37-MariaDB, for debian-linux-gnu (x86_64) using readline 5.2 is unable to connect to the servers listed previously when TLSv1.2 is enforced. However clients on other operating systems tested: Ver 15.1 Distrib 10.1.34-MariaDB, for Linux (x86_64) using readline 7.0 Ver 15.1 Distrib 10.1.37-MariaDB, for Linux (x86_64) using readline 7.0 are able to connect just fine. Upon further inspection, looking at packet traces with WireShark it appears that the Debian client is only attempting to negotiate a connection with TLSv1.1, which is blacklisted while the Gentoo clients are able to negotiate at TLSv1.2. The Debian client fails and prints "ERROR 2026 (HY000): SSL connection error: unknown error number" to stdout.
X-Loop: [email protected] From: [email protected] (Devuan bug Tracking System) To: Thomas Groman <[email protected]> Subject: bug#270: Acknowledgement (unable to connect using TLSv1.2.) Message-ID: <[email protected]> In-Reply-To: <154493212845.23324.11005533420082713814.reportbug@lappy> References: <154493212845.23324.11005533420082713814.reportbug@lappy> Precedence: bulk X-Devuan-PR-Message: ack 270 X-Devuan-PR-Package: mariadb-client X-Devuan-PR-Keywords: Reply-To: [email protected] Thank you for the problem report you have sent regarding Devuan. This is an automatically generated reply, to let you know your message has been received. It is being forwarded to the developers mailing list for their attention; they will reply in due course. Your message has been sent to the package maintainer(s): [email protected] If you wish to submit further information on your problem, please send it to [email protected] (and *not* to [email protected]). Please do not reply to the address at the top of this message, unless you wish to report a problem with the bug-tracking system. Your message specified a Severity: in the pseudo-header, but the severity value important was not recognised. The default severity normal is being used instead. The recognised values are: critical, grave, normal, minor, wishlist. Devuan Bugs Owner (administrator, Devuan bugs database)
Received: (at control) by bugs.devuan.org; 19 Jan 2023 18:48:06 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612] by doc.devuan.org with IMAP (fetchmail-6.4.16) for <debbugs@localhost> (single-drop); Thu, 19 Jan 2023 18:48:06 +0000 (UTC) Received: from email.devuan.org by email.devuan.org with LMTP id glVnD16QyWOaCgAAmSBk0A (envelope-from <[email protected]>) for <[email protected]>; Thu, 19 Jan 2023 18:47:58 +0000 Received: by email.devuan.org (Postfix, from userid 109) id 342EA121D; Thu, 19 Jan 2023 18:47:58 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org X-Spam-Level: X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; [email protected]; receiver=<UNKNOWN> Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86]) by email.devuan.org (Postfix) with ESMTPS id E6CEA226 for <[email protected]>; Thu, 19 Jan 2023 18:47:57 +0000 (UTC) Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk) by mx.hindley.org.uk with smtp (Exim 4.84_2) (envelope-from <[email protected]>) id 1pIZx6-0001B0-Pu for [email protected]; Thu, 19 Jan 2023 18:47:56 +0000 Received: (nullmailer pid 22127 invoked by uid 1000); Thu, 19 Jan 2023 18:47:56 -0000 Date: Thu, 19 Jan 2023 18:47:56 +0000 From: Mark Hindley <[email protected]> To: [email protected] Subject: bug 270 is forwarded to https://bugs.debian.org/921151 Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: devscripts bts/2.22.2 X-Debbugs-No-Ack: No Thanks tags 270 debian forwarded 270 https://bugs.debian.org/921151 thanks
Received: (at control) by bugs.devuan.org; 19 Jan 2023 18:48:06 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612] by doc.devuan.org with IMAP (fetchmail-6.4.16) for <debbugs@localhost> (single-drop); Thu, 19 Jan 2023 18:48:06 +0000 (UTC) Received: from email.devuan.org by email.devuan.org with LMTP id glVnD16QyWOaCgAAmSBk0A (envelope-from <[email protected]>) for <[email protected]>; Thu, 19 Jan 2023 18:47:58 +0000 Received: by email.devuan.org (Postfix, from userid 109) id 342EA121D; Thu, 19 Jan 2023 18:47:58 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org X-Spam-Level: X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; [email protected]; receiver=<UNKNOWN> Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86]) by email.devuan.org (Postfix) with ESMTPS id E6CEA226 for <[email protected]>; Thu, 19 Jan 2023 18:47:57 +0000 (UTC) Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk) by mx.hindley.org.uk with smtp (Exim 4.84_2) (envelope-from <[email protected]>) id 1pIZx6-0001B0-Pu for [email protected]; Thu, 19 Jan 2023 18:47:56 +0000 Received: (nullmailer pid 22127 invoked by uid 1000); Thu, 19 Jan 2023 18:47:56 -0000 Date: Thu, 19 Jan 2023 18:47:56 +0000 From: Mark Hindley <[email protected]> To: [email protected] Subject: bug 270 is forwarded to https://bugs.debian.org/921151 Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: devscripts bts/2.22.2 X-Debbugs-No-Ack: No Thanks tags 270 debian forwarded 270 https://bugs.debian.org/921151 thanks
MIME-Version: 1.0 X-Mailer: MIME-tools 5.509 (Entity 5.509) X-Loop: [email protected] From: "Devuan bug Tracking System" <[email protected]> To: Mark Hindley <[email protected]> Subject: bug#270: marked as done (unable to connect using TLSv1.2.) Message-ID: <[email protected]> References: <[email protected]> <154493212845.23324.11005533420082713814.reportbug@lappy> X-Devuan-PR-Message: closed 270 X-Devuan-PR-Package: mariadb-client X-Devuan-PR-Keywords: debian Reply-To: [email protected] Date: Thu, 19 Jan 2023 18:58:01 +0000 Content-Type: multipart/mixed; boundary="----------=_1674154681-3694-0" This is a multi-part message in MIME format... ------------=_1674154681-3694-0 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Your message dated Thu, 19 Jan 2023 18:56:43 +0000 with message-id <[email protected]> and subject line Fixed in Debian #921151 has caused the Devuan bug report #270, regarding unable to connect using TLSv1.2. to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) --=20 270: https://bugs.devuan.org/cgi/bugreport.cgi?bug=3D270 Devuan Bug Tracking System Contact [email protected] with problems ------------=_1674154681-3694-0 Content-Type: message/rfc822 Content-Disposition: inline Content-Transfer-Encoding: 7bit Received: (at submit) by bugs.devuan.org; 16 Dec 2018 04:00:03 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by fulcanelli with IMAP (fetchmail-6.3.26) for <debbugs@localhost> (single-drop); Sun, 16 Dec 2018 05:00:03 +0100 (CET) Received: from mail.onlinenw.com (mail.onlinenw.com [206.212.237.200]) by vm6.ganeti.dyne.org (Postfix) with ESMTP id 7C9F0F604AE for <[email protected]>; Sun, 16 Dec 2018 04:51:24 +0100 (CET) Received: (qmail 13416 invoked from network); 16 Dec 2018 03:51:15 -0000 Received: from localhost (HELO lappy) ([email protected]@127.0.0.1) by mail1.onlinenw.com with SMTP (d648699c-00e5-11e9-93e5-00188bf9ee8f); Sat, 15 Dec 2018 19:51:15 -0800 Date: Sat, 15 Dec 2018 19:53:44 -0800 From: Thomas Groman <[email protected]> Disposition-Notification-To: Thomas Groman <[email protected]> To: Devuan Bug Tracking System <[email protected]> Subject: unable to connect using TLSv1.2. Message-ID: <154493212845.23324.11005533420082713814.reportbug@lappy> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-MagicMail-OS: MagicMail 3.0-Stable X-MagicMail-UUID: d648699c-00e5-11e9-93e5-00188bf9ee8f X-MagicMail-Authenticated: [email protected] X-MagicMail-SourceIP: 127.0.0.1 X-MagicMail-RegexMatch: 2 X-MagicMail-EnvelopeFrom: <[email protected]> X-Spam-Status: No, score=-0.0 required=5.0 tests=RCVD_IN_DNSWL_NONE,SPF_PASS autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org Package: mariadb-client Version: 10.1.37-0+deb9u1 Severity: important -- System Information: Distributor ID: Devuan Description: Devuan GNU/Linux 2.0 (ascii) Release: 2.0 Codename: ascii Architecture: x86_64 Kernel: Linux 4.9.0-8-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) Versions of packages mariadb-client depends on: ii mariadb-client-10.1 10.1.37-0+deb9u1 mariadb-client recommends no packages. mariadb-client suggests no packages. -- no debconf information Mariadb-client is unable to negotiate to TLSv1.2. I have tested this with server versions: 10.1.37-MariaDB Gentoo Linux mariadb-10.1.37 10.1.34-MariaDB Gentoo Linux mariadb-10.1.34 . It should be noted that only the client version: Ver 15.1 Distrib 10.1.37-MariaDB, for debian-linux-gnu (x86_64) using readline 5.2 is unable to connect to the servers listed previously when TLSv1.2 is enforced. However clients on other operating systems tested: Ver 15.1 Distrib 10.1.34-MariaDB, for Linux (x86_64) using readline 7.0 Ver 15.1 Distrib 10.1.37-MariaDB, for Linux (x86_64) using readline 7.0 are able to connect just fine. Upon further inspection, looking at packet traces with WireShark it appears that the Debian client is only attempting to negotiate a connection with TLSv1.1, which is blacklisted while the Gentoo clients are able to negotiate at TLSv1.2. The Debian client fails and prints "ERROR 2026 (HY000): SSL connection error: unknown error number" to stdout. ------------=_1674154681-3694-0 Content-Type: message/rfc822 Content-Disposition: inline Content-Transfer-Encoding: 7bit Received: (at 270-done) by bugs.devuan.org; 19 Jan 2023 18:57:07 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612] by doc.devuan.org with IMAP (fetchmail-6.4.16) for <debbugs@localhost> (single-drop); Thu, 19 Jan 2023 18:57:07 +0000 (UTC) Received: from email.devuan.org by email.devuan.org with LMTP id Nyo3Em2SyWNECwAAmSBk0A (envelope-from <[email protected]>) for <[email protected]>; Thu, 19 Jan 2023 18:56:45 +0000 Received: by email.devuan.org (Postfix, from userid 109) id 4099A121D; Thu, 19 Jan 2023 18:56:45 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org X-Spam-Level: * X-Spam-Status: No, score=1.4 required=5.0 tests=BODY_SINGLE_WORD,RDNS_DYNAMIC, SPF_PASS autolearn=no autolearn_force=no version=3.4.6 Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; [email protected]; receiver=<UNKNOWN> Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86]) by email.devuan.org (Postfix) with ESMTPS id E9915226 for <[email protected]>; Thu, 19 Jan 2023 18:56:44 +0000 (UTC) Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk) by mx.hindley.org.uk with smtp (Exim 4.84_2) (envelope-from <[email protected]>) id 1pIa5b-0001EH-Im for [email protected]; Thu, 19 Jan 2023 18:56:43 +0000 Received: (nullmailer pid 24373 invoked by uid 1000); Thu, 19 Jan 2023 18:56:43 -0000 Date: Thu, 19 Jan 2023 18:56:43 +0000 From: Mark Hindley <[email protected]> To: [email protected] Subject: Fixed in Debian #921151 Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Debbugs-No-Ack: No Thanks Version: ------------=_1674154681-3694-0--
MIME-Version: 1.0 X-Mailer: MIME-tools 5.509 (Entity 5.509) X-Loop: [email protected] From: "Devuan bug Tracking System" <[email protected]> To: Thomas Groman <[email protected]> Subject: bug#270 closed by Mark Hindley <[email protected]> (Fixed in Debian #921151) Message-ID: <[email protected]> References: <[email protected]> <154493212845.23324.11005533420082713814.reportbug@lappy> X-Devuan-PR-Message: they-closed 270 X-Devuan-PR-Package: mariadb-client X-Devuan-PR-Keywords: debian Reply-To: [email protected] Date: Thu, 19 Jan 2023 18:58:03 +0000 Content-Type: multipart/mixed; boundary="----------=_1674154683-3694-1" This is a multi-part message in MIME format... ------------=_1674154683-3694-1 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" This is an automatic notification regarding your bug report which was filed against the mariadb-client package: #270: unable to connect using TLSv1.2. It has been closed by Mark Hindley <[email protected]>. Their explanation is attached below along with your original report. If this explanation is unsatisfactory and you have not received a better one in a separate message then please contact Mark Hindley <mark@hin= dley.org.uk> by replying to this email. --=20 270: https://bugs.devuan.org/cgi/bugreport.cgi?bug=3D270 Devuan Bug Tracking System Contact [email protected] with problems ------------=_1674154683-3694-1 Content-Type: message/rfc822 Content-Disposition: inline Content-Transfer-Encoding: 7bit Received: (at 270-done) by bugs.devuan.org; 19 Jan 2023 18:57:07 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612] by doc.devuan.org with IMAP (fetchmail-6.4.16) for <debbugs@localhost> (single-drop); Thu, 19 Jan 2023 18:57:07 +0000 (UTC) Received: from email.devuan.org by email.devuan.org with LMTP id Nyo3Em2SyWNECwAAmSBk0A (envelope-from <[email protected]>) for <[email protected]>; Thu, 19 Jan 2023 18:56:45 +0000 Received: by email.devuan.org (Postfix, from userid 109) id 4099A121D; Thu, 19 Jan 2023 18:56:45 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org X-Spam-Level: * X-Spam-Status: No, score=1.4 required=5.0 tests=BODY_SINGLE_WORD,RDNS_DYNAMIC, SPF_PASS autolearn=no autolearn_force=no version=3.4.6 Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; [email protected]; receiver=<UNKNOWN> Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86]) by email.devuan.org (Postfix) with ESMTPS id E9915226 for <[email protected]>; Thu, 19 Jan 2023 18:56:44 +0000 (UTC) Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk) by mx.hindley.org.uk with smtp (Exim 4.84_2) (envelope-from <[email protected]>) id 1pIa5b-0001EH-Im for [email protected]; Thu, 19 Jan 2023 18:56:43 +0000 Received: (nullmailer pid 24373 invoked by uid 1000); Thu, 19 Jan 2023 18:56:43 -0000 Date: Thu, 19 Jan 2023 18:56:43 +0000 From: Mark Hindley <[email protected]> To: [email protected] Subject: Fixed in Debian #921151 Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Debbugs-No-Ack: No Thanks Version: ------------=_1674154683-3694-1 Content-Type: message/rfc822 Content-Disposition: inline Content-Transfer-Encoding: 7bit Received: (at submit) by bugs.devuan.org; 16 Dec 2018 04:00:03 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by fulcanelli with IMAP (fetchmail-6.3.26) for <debbugs@localhost> (single-drop); Sun, 16 Dec 2018 05:00:03 +0100 (CET) Received: from mail.onlinenw.com (mail.onlinenw.com [206.212.237.200]) by vm6.ganeti.dyne.org (Postfix) with ESMTP id 7C9F0F604AE for <[email protected]>; Sun, 16 Dec 2018 04:51:24 +0100 (CET) Received: (qmail 13416 invoked from network); 16 Dec 2018 03:51:15 -0000 Received: from localhost (HELO lappy) ([email protected]@127.0.0.1) by mail1.onlinenw.com with SMTP (d648699c-00e5-11e9-93e5-00188bf9ee8f); Sat, 15 Dec 2018 19:51:15 -0800 Date: Sat, 15 Dec 2018 19:53:44 -0800 From: Thomas Groman <[email protected]> Disposition-Notification-To: Thomas Groman <[email protected]> To: Devuan Bug Tracking System <[email protected]> Subject: unable to connect using TLSv1.2. Message-ID: <154493212845.23324.11005533420082713814.reportbug@lappy> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-MagicMail-OS: MagicMail 3.0-Stable X-MagicMail-UUID: d648699c-00e5-11e9-93e5-00188bf9ee8f X-MagicMail-Authenticated: [email protected] X-MagicMail-SourceIP: 127.0.0.1 X-MagicMail-RegexMatch: 2 X-MagicMail-EnvelopeFrom: <[email protected]> X-Spam-Status: No, score=-0.0 required=5.0 tests=RCVD_IN_DNSWL_NONE,SPF_PASS autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org Package: mariadb-client Version: 10.1.37-0+deb9u1 Severity: important -- System Information: Distributor ID: Devuan Description: Devuan GNU/Linux 2.0 (ascii) Release: 2.0 Codename: ascii Architecture: x86_64 Kernel: Linux 4.9.0-8-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) Versions of packages mariadb-client depends on: ii mariadb-client-10.1 10.1.37-0+deb9u1 mariadb-client recommends no packages. mariadb-client suggests no packages. -- no debconf information Mariadb-client is unable to negotiate to TLSv1.2. I have tested this with server versions: 10.1.37-MariaDB Gentoo Linux mariadb-10.1.37 10.1.34-MariaDB Gentoo Linux mariadb-10.1.34 . It should be noted that only the client version: Ver 15.1 Distrib 10.1.37-MariaDB, for debian-linux-gnu (x86_64) using readline 5.2 is unable to connect to the servers listed previously when TLSv1.2 is enforced. However clients on other operating systems tested: Ver 15.1 Distrib 10.1.34-MariaDB, for Linux (x86_64) using readline 7.0 Ver 15.1 Distrib 10.1.37-MariaDB, for Linux (x86_64) using readline 7.0 are able to connect just fine. Upon further inspection, looking at packet traces with WireShark it appears that the Debian client is only attempting to negotiate a connection with TLSv1.1, which is blacklisted while the Gentoo clients are able to negotiate at TLSv1.2. The Debian client fails and prints "ERROR 2026 (HY000): SSL connection error: unknown error number" to stdout. ------------=_1674154683-3694-1--
Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd,
1994-97 Ian Jackson.
Devuan Bugs Owner <[email protected]>.
Last modified:
Thu, 28 Nov 2024 08:39:01 UTC