OpenSSL TLS 1.1 handshake fails internal error
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
openssl (Ubuntu) |
Incomplete
|
Undecided
|
Unassigned | ||
Hirsute |
Confirmed
|
Undecided
|
Unassigned |
Bug Description
OpenSSL's SSL_do_handshake() method fails with TLSV1_ALERT_
A simple reproducer is:
import ssl
import socket
from test.test_ssl import testing_context, ThreadedEchoServer, HOST
client_context, server_context, hostname = testing_context()
# client 1.0 to 1.2, server 1.0 to 1.1
client_
client_
server_
server_
with ThreadedEchoSer
with client_
assert s.version() == 'TLSv1.1'
On Ubuntu 20.04 the code fails with:
Traceback (most recent call last):
File "/internalerror
s.connect(
File "/usr/lib/
self.
File "/usr/lib/
self.
File "/usr/lib/
self.
ssl.SSLError: [SSL: TLSV1_ALERT_
On Debian testing and Fedora 33 the same test passes with out:
server: new connection from ('127.0.0.1', 52346)
server: connection cipher is now ('ECDHE-
server: selected protocol is now None
You can find Dockerfiles with reproducers at https:/
Also see:
* https:/
* https:/
* https:/
tags: | added: focal rls-ff-incoming |
tags: | added: fr-1204 |
tags: | removed: rls-ff-incoming |
Changed in openssl (Ubuntu): | |
status: | Confirmed → Incomplete |
Status changed to 'Confirmed' because the bug affects multiple users.