Received: (at 270-done) by bugs.devuan.org; 19 Jan 2023 18:57:07 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612] by doc.devuan.org with IMAP (fetchmail-6.4.16) for <debbugs@localhost> (single-drop); Thu, 19 Jan 2023 18:57:07 +0000 (UTC) Received: from email.devuan.org by email.devuan.org with LMTP id Nyo3Em2SyWNECwAAmSBk0A (envelope-from <[email protected]>) for <[email protected]>; Thu, 19 Jan 2023 18:56:45 +0000 Received: by email.devuan.org (Postfix, from userid 109) id 4099A121D; Thu, 19 Jan 2023 18:56:45 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org X-Spam-Level: * X-Spam-Status: No, score=1.4 required=5.0 tests=BODY_SINGLE_WORD,RDNS_DYNAMIC, SPF_PASS autolearn=no autolearn_force=no version=3.4.6 Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; [email protected]; receiver=<UNKNOWN> Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86]) by email.devuan.org (Postfix) with ESMTPS id E9915226 for <[email protected]>; Thu, 19 Jan 2023 18:56:44 +0000 (UTC) Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk) by mx.hindley.org.uk with smtp (Exim 4.84_2) (envelope-from <[email protected]>) id 1pIa5b-0001EH-Im for [email protected]; Thu, 19 Jan 2023 18:56:43 +0000 Received: (nullmailer pid 24373 invoked by uid 1000); Thu, 19 Jan 2023 18:56:43 -0000 Date: Thu, 19 Jan 2023 18:56:43 +0000 From: Mark Hindley <[email protected]> To: [email protected] Subject: Fixed in Debian #921151 Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Debbugs-No-Ack: No Thanks Version:
Thomas Groman <[email protected]>
:Mark Hindley <[email protected]>
:Mark Hindley <[email protected]>
to [email protected]
.
Full text available.Mark Hindley <[email protected]>
to [email protected]
.
Full text available.Received: (at submit) by bugs.devuan.org; 16 Dec 2018 04:00:03 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by fulcanelli with IMAP (fetchmail-6.3.26) for <debbugs@localhost> (single-drop); Sun, 16 Dec 2018 05:00:03 +0100 (CET) Received: from mail.onlinenw.com (mail.onlinenw.com [206.212.237.200]) by vm6.ganeti.dyne.org (Postfix) with ESMTP id 7C9F0F604AE for <[email protected]>; Sun, 16 Dec 2018 04:51:24 +0100 (CET) Received: (qmail 13416 invoked from network); 16 Dec 2018 03:51:15 -0000 Received: from localhost (HELO lappy) ([email protected]@127.0.0.1) by mail1.onlinenw.com with SMTP (d648699c-00e5-11e9-93e5-00188bf9ee8f); Sat, 15 Dec 2018 19:51:15 -0800 Date: Sat, 15 Dec 2018 19:53:44 -0800 From: Thomas Groman <[email protected]> Disposition-Notification-To: Thomas Groman <[email protected]> To: Devuan Bug Tracking System <[email protected]> Subject: unable to connect using TLSv1.2. Message-ID: <154493212845.23324.11005533420082713814.reportbug@lappy> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-MagicMail-OS: MagicMail 3.0-Stable X-MagicMail-UUID: d648699c-00e5-11e9-93e5-00188bf9ee8f X-MagicMail-Authenticated: [email protected] X-MagicMail-SourceIP: 127.0.0.1 X-MagicMail-RegexMatch: 2 X-MagicMail-EnvelopeFrom: <[email protected]> X-Spam-Status: No, score=-0.0 required=5.0 tests=RCVD_IN_DNSWL_NONE,SPF_PASS autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org Package: mariadb-client Version: 10.1.37-0+deb9u1 Severity: important -- System Information: Distributor ID: Devuan Description: Devuan GNU/Linux 2.0 (ascii) Release: 2.0 Codename: ascii Architecture: x86_64 Kernel: Linux 4.9.0-8-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) Versions of packages mariadb-client depends on: ii mariadb-client-10.1 10.1.37-0+deb9u1 mariadb-client recommends no packages. mariadb-client suggests no packages. -- no debconf information Mariadb-client is unable to negotiate to TLSv1.2. I have tested this with server versions: 10.1.37-MariaDB Gentoo Linux mariadb-10.1.37 10.1.34-MariaDB Gentoo Linux mariadb-10.1.34 . It should be noted that only the client version: Ver 15.1 Distrib 10.1.37-MariaDB, for debian-linux-gnu (x86_64) using readline 5.2 is unable to connect to the servers listed previously when TLSv1.2 is enforced. However clients on other operating systems tested: Ver 15.1 Distrib 10.1.34-MariaDB, for Linux (x86_64) using readline 7.0 Ver 15.1 Distrib 10.1.37-MariaDB, for Linux (x86_64) using readline 7.0 are able to connect just fine. Upon further inspection, looking at packet traces with WireShark it appears that the Debian client is only attempting to negotiate a connection with TLSv1.1, which is blacklisted while the Gentoo clients are able to negotiate at TLSv1.2. The Debian client fails and prints "ERROR 2026 (HY000): SSL connection error: unknown error number" to stdout.
Thomas Groman <[email protected]>
:[email protected]
.
Your message specified a Severity: in the pseudo-header, but the severity value important was not recognised. The default severity normal is being used instead. The recognised values are: critical, grave, normal, minor, wishlist.
Full text available.
[email protected], [email protected]
:bug#270
; Package mariadb-client
.
Full text available.Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd,
1994-97 Ian Jackson.
Devuan Bugs Owner <[email protected]>.
Last modified:
Thu, 28 Nov 2024 06:39:01 UTC