Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ngtcp2 + gnutls fails to connect h3: "Resource temporarily unavailable" #6896

Closed
bagder opened this issue Apr 15, 2021 · 4 comments
Closed
Labels
HTTP/3 h3 or quic related needs-info

Comments

@bagder
Copy link
Member

bagder commented Apr 15, 2021

It looks like boringssl backed server does not like ClientHello generated by GnuTLS. It is hard for me to debug this because it is TLS internal stuff.

Similar to #6864 but this only happens with GnuTLS builds now.

Originally posted by @tatsuhiro-t in #6864 (comment)

@bagder bagder added the HTTP/3 h3 or quic related label Apr 15, 2021
@tatsuhiro-t
Copy link
Contributor

It looks like GnuTLS sends legacy session ID which must be prohibited in QUIC: https://tools.ietf.org/html/draft-ietf-quic-tls-34#section-8.4
Now I have to find how to make GnuTLS stop sending this.
Meanwhile it seems that OpenSSL does not check this thing out, which smells like a bug.

@tatsuhiro-t
Copy link
Contributor

@ueno Is there any way to tell GnuTLS to disable TLSv1.3 compatibility mode?

It looks like #undef TLS13_APPENDIX_D4 disables it, but it is a compile time option.

@ueno
Copy link
Contributor

ueno commented Apr 15, 2021

Not currently, but it should be easy to add. I've filed an issue at:
https://gitlab.com/gnutls/gnutls/-/issues/1208

@bagder
Copy link
Member Author

bagder commented May 16, 2021

I'm going to close this issue here since this has been determined to be a GnuTLS bug and it isn't very useful for us to keep it open here as well. This should work with curl once GnuTLS is fixed to do right.

@bagder bagder closed this as completed May 16, 2021
bagder pushed a commit that referenced this issue Jun 8, 2021
The latest GnuTLS-3.7.2 implements disable switch for TLSv1.3 compatible
mode for middle box but it is enabled by default, which is unnecessary
for QUIC.

Fixes #6896
Closes #7202
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
HTTP/3 h3 or quic related needs-info
Development

No branches or pull requests

3 participants