-
Notifications
You must be signed in to change notification settings - Fork 38
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
pagekitec fails to connect securely on openwrt with openssl 1.1.1d #70
Comments
* Add SSL_MODE_AUTO_RETRY * Be forgiving of different platforms having preset modes * Report SSL setup "state" on failure
It works! |
Since I upgraded my server to debian bullseye (from debian buster) including pagekite.py backend, I cannot connect any more with pagekitec from openwrt with openssl 1.1.1t. I spend a few hours trying to get more information at the pagekitec end (adding ERR_print_errors et. al.) in pkconn.c but I don't get anything more than the error code 5 from SSL_get_error() as follows:
Any idea what could be the reason? |
well, it's definitely unrelated to this bug :) I would suggest looking at what actually changed debian side, are they for instance now only allowing tls1.3 or something? I no longer remember the env vars or whatever to get openssl to spit out more information. You probably also would need to rebuild openssl with debug to get the information out of it. |
@karlp thanks for the quick response! In fact, Bullseye (Debian 11) defaults to not using TLSv2, but several sources say it can be configured to use it by setting the following in
Only, pagekite.py does not seem to pick that up. I tried to instrument libpagekite on the client side to see more about that ominous err==5, but the openssl error stack seems to be empty at that point ( My problem is that I have a three to four digit number of devices in the field I'd like to keep accessible without being forced to update them. On the other hand, keeping the server at an old unsupported debian version forever is not a good option, especially since it should work (when TLSv1.2 is enabled server side). So I'd like to understand why exactly the handshake fails. I tried to follow upon the comment on line 78 of pkerror Also, as TLSv1.3 is supported in OpenSSL v1.1.1 libpagekite is built against, I would like to understand what prevents the handshake to just use TLSv1.3? |
Ok, I managed to track it down:
|
used to work in the past
log from connecting
Version: This is pagekitec.c from libpagekite 0.91.190530C
using musl-libc 1.1.23
The text was updated successfully, but these errors were encountered: