-
-
Notifications
You must be signed in to change notification settings - Fork 6.7k
mbedTLS 3.6.0 breaks curl #13653
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
for the failed tests it looks as though stunnel server is sending a tls alert of bad certificate. (it's not clear to me if it's sending or receiving the alert) https://github.com/curl/curl/actions/runs/9086442477/job/24972131840#step:35:1170
I can't reproduce in Linux however I did not copy the CI job configuration. I built mbedtls like this:
I built curl like |
Build with 3.6.0. First test failing is 300, log shows:
Opened issue at mbedTLS: Mbed-TLS/mbedtls#9210 Update: this seems to only fail for connections with Update2: "We don't support disabling server authentication in TLS 1.3." 🤓 |
Made #13838 with workarounds to test fine locally. Let's see what CI says. |
Thanks for looking into this. IMO these are mbedtls bugs and I think we should wait and see what they are going to do about them instead of patching curl. In other words, if they intend to fix the problems then I don't think the workarounds should go in. Hats off to you though for figuring some out. Also- I don't understand why curl passes all tests for me with 3.6.0 if it was intended behavior on their part. |
tlsv1.3 support is broken in curl 8.8.0 with mbedtls 3.6.0. See curl/curl#13653 and Mbed-TLS/mbedtls#9210 for more details. A workaround was implemented in upsteam codes, see curl/curl@0c4b4c1 and curl/curl@5f9017d This snapshot contains all the commits above. Fixes openwrt#24365 openwrt#24386 Signed-off-by: Ryan Keane <the.ra2.ifv@gmail.com>
tlsv1.3 support is broken in curl 8.8.0 with mbedtls 3.6.0. See curl/curl#13653 and Mbed-TLS/mbedtls#9210 for more details. A workaround was implemented in upsteam codes, see curl/curl@0c4b4c1 and curl/curl@5f9017d This snapshot contains all the commits above. Fixes openwrt#24365 openwrt#24386 Signed-off-by: Ryan Keane <the.ra2.ifv@gmail.com>
tlsv1.3 support is broken in curl 8.8.0 with mbedtls 3.6.0. See curl/curl#13653 and Mbed-TLS/mbedtls#9210 for more details. A workaround was implemented in upsteam code, see curl/curl@0c4b4c1 and curl/curl@5f9017d This commit includes patches generated from upstream commits. fix openwrt#24365 openwrt#24386 Signed-off-by: Ryan Keane <the.ra2.ifv@gmail.com>
tlsv1.3 support is broken in curl 8.8.0 with mbedtls 3.6.0. See curl/curl#13653 and Mbed-TLS/mbedtls#9210 for more details. A workaround was implemented in upsteam code, see curl/curl@0c4b4c1 and curl/curl@5f9017d This commit includes patches generated from upstream commits. fix openwrt#24365 openwrt#24386 Signed-off-by: Ryan Keane <the.ra2.ifv@gmail.com>
tlsv1.3 support is broken in curl 8.8.0 with mbedtls 3.6.0. See curl/curl#13653 and Mbed-TLS/mbedtls#9210 for more details. A workaround was implemented in upsteam code, see curl/curl@0c4b4c1 and curl/curl@5f9017d This commit includes patches generated from upstream commits. fix openwrt#24365 openwrt#24386 Signed-off-by: Ryan Keane <the.ra2.ifv@gmail.com>
tlsv1.3 support is broken in curl 8.8.0 with mbedtls 3.6.0. See curl/curl#13653 and Mbed-TLS/mbedtls#9210 for more details. A workaround was implemented in upsteam code, see curl/curl@0c4b4c1 and curl/curl@5f9017d This commit includes patches generated from upstream commits. fix openwrt#24365 openwrt#24386 Signed-off-by: Ryan Keane <the.ra2.ifv@gmail.com>
tlsv1.3 support is broken in curl 8.8.0 with mbedtls 3.6.0. See curl/curl#13653 and Mbed-TLS/mbedtls#9210 for more details. A workaround was implemented in upsteam code, see curl/curl@0c4b4c1 and curl/curl@5f9017d This commit includes patches generated from upstream commits. fix openwrt#24365 openwrt#24386 Signed-off-by: Ryan Keane <the.ra2.ifv@gmail.com>
- add special sauce to disable unwanted peer verification by mbedtls when negotiating TLS v1.3 - add special sauce for MBEDTLS_ERR_SSL_RECEIVED_NEW_SESSION_TICKET return code on *writing* TLS data. We assume the data had not been written and EAGAIN. - return correct Curl error code when peer verification failed. - disable test_08_05 with 50 HTTP/1.1 connections, as mbedtls reports a memory allocation failed during handshake. - bump CI mbedtls version to 3.6.0 Fixes curl#13653 Closes curl#13838
tlsv1.3 support is broken in curl 8.8.0 with mbedtls 3.6.0. See curl/curl#13653 and Mbed-TLS/mbedtls#9210 for more details. A workaround was implemented in upsteam code, see curl/curl@0c4b4c1 and curl/curl@5f9017d This commit includes patches generated from upstream commits. fix openwrt#24365 openwrt#24386 Signed-off-by: Ryan Keane <the.ra2.ifv@gmail.com>
tlsv1.3 support is broken in curl 8.8.0 with mbedtls 3.6.0. See curl/curl#13653 and Mbed-TLS/mbedtls#9210 for more details. A workaround was implemented in upsteam code, see curl/curl@0c4b4c1 and curl/curl@5f9017d This commit includes patches generated from upstream commits. fix openwrt#24365 openwrt#24386 Signed-off-by: Ryan Keane <the.ra2.ifv@gmail.com>
I did this
#13646 tried to upgrade the mbedTLS CI jobs to use version 3.6.0
This caused numerous failed CI jobs.
I expected the following
green builds
curl/libcurl version
curl master
operating system
on Linux, but probably a universal problem
The text was updated successfully, but these errors were encountered: