touch-packages team mailing list archive
-
touch-packages team
-
Mailing list archive
-
Message #61391
Re: [Bug 1419436] Re: tls_socket_read (Decryption has failed.)
After recompiling mutt with openssl instead of gnutls I discovered that
openssl was also affected, so I tried another USB ethernet dongle and
that seems to have fixed it. At least I can't reproduce the problem with
the large IMAP fetch using openssl s_client. I've now blacklisted the
module for the onboard ethernet phy_twl4030_usb.
Maybe this bug could be reassigned?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gnutls26 in Ubuntu.
https://bugs.launchpad.net/bugs/1419436
Title:
tls_socket_read (Decryption has failed.)
Status in gnutls26 package in Ubuntu:
New
Bug description:
Since moving from Ubunutu 12.04 (armel) to 14.04 (armhf) on a
Beagleboard I have a persistent problem using mutt where (especially)
larger messages fail to download resulting in the error:
tls_socket_read (Decryption has failed.)
The failure is reproducable in that I can almost never download
messages with attachments larger than 10MB (it will inevitably fail at
some point during the transfer).
12.04 (armel) had gnutls26 verison 2.12.14-5ubuntu3.8, and I never had
this problem. 14.04 uses 2.12.23-12ubuntu2.1. Strangely enough my
amd64 machines which also run 14.04 and 2.12.23-12ubuntu2.1 do not
have this problem.
In attempting to debug I tried setting GNUTLS_DEBUG_LEVEL=6, which
didn't produce any output from libgnutls26. Next I tried forcing mutt
to use libgnutls28 (3.2.11-2ubuntu1) with LD_PRELOAD. Then setting
GNUTLS_DEBUG_LEVEL=6 and redirecting stderr to a file yields the
following log:
...
gnutls[4]: REC[0x16cb240]: Expected Packet Application Data(23)
gnutls[4]: REC[0x16cb240]: Received Packet Application Data(23) with length: 1395
gnutls[4]: REC[0x16cb240]: Decrypted Packet[4742] Application Data(23) with length: 1371
gnutls[6]: BUF[REC]: Inserted 1371 bytes of Data(23)
gnutls[4]: REC[0x16cb240]: SSL 3.3 Application Data packet received. Epoch 0, length: 1395
gnutls[4]: REC[0x16cb240]: Expected Packet Application Data(23)
gnutls[4]: REC[0x16cb240]: Received Packet Application Data(23) with length: 1395
gnutls[4]: REC[0x16cb240]: Decrypted Packet[4743] Application Data(23) with length: 1371
gnutls[6]: BUF[REC]: Inserted 1371 bytes of Data(23)
gnutls[4]: REC[0x16cb240]: SSL 3.3 Application Data packet received. Epoch 0, length: 1378
gnutls[4]: REC[0x16cb240]: Expected Packet Application Data(23)
gnutls[4]: REC[0x16cb240]: Received Packet Application Data(23) with length: 1378
gnutls[4]: REC[0x16cb240]: Decrypted Packet[4744] Application Data(23) with length: 1354
gnutls[6]: BUF[REC]: Inserted 1354 bytes of Data(23)
gnutls[4]: REC[0x16cb240]: SSL 3.3 Application Data packet received. Epoch 0, length: 1395
gnutls[4]: REC[0x16cb240]: Expected Packet Application Data(23)
gnutls[4]: REC[0x16cb240]: Received Packet Application Data(23) with length: 1395
gnutls[2]: ASSERT: gnutls_cipher.c:951
gnutls[2]: ASSERT: gnutls_cipher.c:199
gnutls[2]: ASSERT: gnutls_record.c:1223
gnutls[1]: Discarded message[4745] due to invalid decryption
gnutls[2]: ASSERT: gnutls_record.c:1407
gnutls[2]: ASSERT: gnutls_buffers.c:624
gnutls[4]: REC: Sending Alert[1|0] - Close notify
gnutls[4]: REC[0x16cb240]: Preparing Packet Alert(21) with length: 2 and min pad: 0
gnutls[4]: REC[0x16cb240]: Sent Packet[10] Alert(21) in epoch 1 and length: 31
gnutls[2]: ASSERT: gnutls_record.c:1384
gnutls[2]: ASSERT: gnutls_record.c:334
gnutls[4]: REC[0x16cb240]: Start of epoch cleanup
gnutls[4]: REC[0x16cb240]: End of epoch cleanup
gnutls[4]: REC[0x16cb240]: Epoch #1 freed
So this problem (at least on armhf) seems to affect both gnutls26 and
gnutls28.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnutls26/+bug/1419436/+subscriptions
References