GNU bug report logs - #16602
24.3.50; gnutls sometimes errors out

Previous Next

Package: emacs;

Reported by: Lars Ingebrigtsen <larsi <at> gnus.org>

Date: Fri, 31 Jan 2014 00:14:01 UTC

Severity: normal

Tags: unreproducible

Found in version 24.3.50

Done: Lars Magne Ingebrigtsen <larsi <at> gnus.org>

Bug is archived. No further changes may be made.

Full log


Message #11 received at 16602 <at> debbugs.gnu.org (full text, mbox):

From: Lars Ingebrigtsen <larsi <at> gnus.org>
To: 16602 <at> debbugs.gnu.org
Subject: Re: bug#16602: 24.3.50; gnutls sometimes errors out
Date: Sun, 09 Feb 2014 19:14:11 -0800
Ted Zlatanov <tzz <at> lifelogs.com> writes:

> I'm not aware of anything that could be causing this.  I've definitely
> not changed anything recently in the GnuTLS integration code.
>
> As a first step, I would check with `gnutls-cli' whether the same
> invocation has a similar problem.

Doesn't seem to be.  I repeated the following ten times, and I got the
output below each time.

Hm.  If I set `gnutls-log-level' to 10, then everything works fine, too?
Sounds kinda timing-related...

Oh, and now I'm unable to reproduce the problem with a log level of 0.
Gah.

$ gnutls-cli -p 443 news.ycombinator.com
Processed 149 CA certificate(s).
Resolving 'news.ycombinator.com'...
Connecting to '198.41.190.47:443'...
- Certificate type: X.509
- Got a certificate list of 2 certificates.
- Certificate[0] info:
 - subject `OU=Domain Control Validated,OU=PositiveSSL Wildcard,CN=*.ycombinator.com', issuer `C=GB,ST=Greater Manchester,L=Salford,O=COMODO CA Limited,CN=PositiveSSL CA 2', RSA key 2048 bits, signed using RSA-SHA1, activated `2013-02-26 00:00:00 UTC', expires `2015-02-26 23:59:59 UTC', SHA-1 fingerprint `5a2b9a0c7d2965aeb06ab02e300c8fe75df74905'
	Public Key Id:
		c2db2a3ec8e356ee1b7c673097d7796a0a19cd64
	Public key's random art:
		+--[ RSA 2048]----+
		|                 |
		|                 |
		|          E      |
		|     .   * . .   |
		|      = S + o .  |
		|   ..  B +   o   |
		| . +o o *   o    |
		|  = +o + . o     |
		| o.+++.   .      |
		+-----------------+

- Certificate[1] info:
 - subject `C=GB,ST=Greater Manchester,L=Salford,O=COMODO CA Limited,CN=PositiveSSL CA 2', issuer `C=SE,O=AddTrust AB,OU=AddTrust External TTP Network,CN=AddTrust External CA Root', RSA key 2048 bits, signed using RSA-SHA1, activated `2012-02-16 00:00:00 UTC', expires `2020-05-30 10:48:38 UTC', SHA-1 fingerprint `94807b1c788dd2fcbe19c8481ce41cfab8a4c17f'
- Status: The certificate is trusted. 
- Description: (TLS1.2-PKIX)-(ECDHE-RSA-SECP256R1)-(AES-128-GCM)-(AEAD)
- Session ID: 70:3C:71:8C:30:93:EB:BB:BA:45:82:EA:94:2C:3F:73:48:B3:EB:50:A0:C5:06:F9:F4:03:85:80:18:3C:16:4D
- Ephemeral EC Diffie-Hellman parameters
 - Using curve: SECP256R1
 - Curve size: 256 bits
- Version: TLS1.2
- Key Exchange: ECDHE-RSA
- Server Signature: RSA-SHA512
- Cipher: AES-128-GCM
- MAC: AEAD
- Compression: NULL
- Handshake was completed

- Simple Client Mode:



-- 
(domestic pets only, the antidote for overdose, milk.)
  bloggy blog http://lars.ingebrigtsen.no/




This bug report was last modified 10 years and 199 days ago.

Previous Next


GNU bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson.