-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
MDEV-22221: wolfssl tls13 #1501
Changes from all commits
f32b135
b11d6be
ebce05f
40379af
4ae7c96
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -3,15 +3,15 @@ create user ssl_user2@localhost require cipher 'AES256-SHA'; | |
create user ssl_user3@localhost require cipher 'AES256-SHA' AND SUBJECT '/C=FI/ST=Helsinki/L=Helsinki/O=MariaDB/CN=client'; | ||
create user ssl_user4@localhost require cipher 'AES256-SHA' AND SUBJECT '/C=FI/ST=Helsinki/L=Helsinki/O=MariaDB/CN=client' ISSUER '/CN=cacert/C=FI/ST=Helsinki/L=Helsinki/O=MariaDB'; | ||
create user ssl_user5@localhost require cipher 'AES256-SHA' AND SUBJECT 'xxx'; | ||
connect con1,localhost,ssl_user1,,,,,SSL-CIPHER=AES256-SHA; | ||
connect con1,localhost,ssl_user1,,,,,SSL-CIPHER=AES256-SHA TLS-VERSION=TLSv1.1; | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I guess you need TLS-VERSION=TLSv1,TLSv1.1,TLSv1.2 here, and in all other places There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Or, you can maybe automatically set tls_version to "TLSv1,TLSv1.1,TLSv1.2", whenever SSL-CIPHER is given, this would minimize the patch There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I like the behaviour of implicit tls_version when SSL-CIPHER Is given. Good idea. I'll probably take a diversion to MDEV-21965 as it has some implications on what the behaviour here should be. I'm also the the depths of EVP_CipherFinal_ex differences between openssl and wolfssl in the aes unittest failure on AES-GCM. So much for a quick enablement PR. |
||
connect(localhost,ssl_user2,,test,MASTER_PORT,MASTER_SOCKET); | ||
connect con2,localhost,ssl_user2,,,,,SSL-CIPHER=AES128-SHA; | ||
connect con2,localhost,ssl_user2,,,,,SSL-CIPHER=AES128-SHA TLS-VERSION=TLSv1.1; | ||
ERROR 28000: Access denied for user 'ssl_user2'@'localhost' (using password: NO) | ||
connect con2,localhost,ssl_user2,,,,,SSL-CIPHER=AES256-SHA; | ||
connect con3,localhost,ssl_user3,,,,,SSL-CIPHER=AES256-SHA; | ||
connect con4,localhost,ssl_user4,,,,,SSL-CIPHER=AES256-SHA; | ||
connect con2,localhost,ssl_user2,,,,,SSL-CIPHER=AES256-SHA TLS-VERSION=TLSv1.1; | ||
connect con3,localhost,ssl_user3,,,,,SSL-CIPHER=AES256-SHA TLS-VERSION=TLSv1.1; | ||
connect con4,localhost,ssl_user4,,,,,SSL-CIPHER=AES256-SHA TLS-VERSION=TLSv1.1; | ||
connect(localhost,ssl_user5,,test,MASTER_PORT,MASTER_SOCKET); | ||
connect con5,localhost,ssl_user5,,,,,SSL-CIPHER=AES256-SHA; | ||
connect con5,localhost,ssl_user5,,,,,SSL-CIPHER=AES256-SHA TLS-VERSION=TLSv1.1; | ||
ERROR 28000: Access denied for user 'ssl_user5'@'localhost' (using password: NO) | ||
connection con1; | ||
SHOW STATUS LIKE 'Ssl_cipher'; | ||
|
@@ -57,7 +57,7 @@ Variable_name Value | |
Ssl_cipher AES256-SHA | ||
drop user mysqltest_1@localhost; | ||
# restart: --ssl-cipher=AES128-SHA | ||
connect ssl_con,localhost,root,,,,,SSL; | ||
connect ssl_con,localhost,root,,,,,SSL TLS-VERSION=TLSv1.1; | ||
SHOW STATUS LIKE 'Ssl_cipher'; | ||
Variable_name Value | ||
Ssl_cipher AES128-SHA | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
is this --tls-version change needed?