You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This issue documents an unexplained failure of compat.sh on an unremarkable DTLS test case on the CI, with few clues as to the reason. This is very likely to be a problem in the test environment. We are unlikely to spend any more time on it unless the symptoms become more frequent.
In a run of compat.sh, on one test case, the client reports a failed handshake because the server apparently didn't reply (MBEDTLS_ERR_NET_RECV_FAILED). The server logs show no attempt to connect, although there is no conclusive evidence that the server didn't receive anything: it may have died before it was able to print logs.
This happened with the mbedtls-3.6 nightly tests on 2024-12-01 evening, in ./tests/scripts/all.sh --seed 4 --keep-going test_psa_crypto_config_reference_cipher_aead_cmac. Extract from the console log:
The server reports successful connections with several cipher suites (this is normal: we keep the server running within a batch of cipher suites with similar parameters), the last one being TLS_DHE_PSK_WITH_AES_256_CBC_SHA384. The next one should have been TLS_DHE_PSK_WITH_AES_256_CCM, but the server logs stop there.
The least implausible explanations I can think of:
The OS dropped the ClientHello packet. Ok, but then why wasn't it retransmitted?
The shell script killed the server too early. Ok, but why? The script only ever attempts to kill the server after it has processed the output from the client.
The server died. Ok, but why, and why don't the server logs and console show anything?
The text was updated successfully, but these errors were encountered:
This issue documents an unexplained failure of
compat.sh
on an unremarkable DTLS test case on the CI, with few clues as to the reason. This is very likely to be a problem in the test environment. We are unlikely to spend any more time on it unless the symptoms become more frequent.In a run of
compat.sh
, on one test case, the client reports a failed handshake because the server apparently didn't reply (MBEDTLS_ERR_NET_RECV_FAILED
). The server logs show no attempt to connect, although there is no conclusive evidence that the server didn't receive anything: it may have died before it was able to print logs.This happened with the
mbedtls-3.6
nightly tests on 2024-12-01 evening, in./tests/scripts/all.sh --seed 4 --keep-going test_psa_crypto_config_reference_cipher_aead_cmac
. Extract from the console log:Note that this is happening within less than 1 second, so it's not a timeout.
Client and server logs:
all_u16-test_psa_crypto_config_reference_cipher_aead_cmac-c-cli-186.log.txt
all_u16-test_psa_crypto_config_reference_cipher_aead_cmac-c-srv-186.log.txt
The server reports successful connections with several cipher suites (this is normal: we keep the server running within a batch of cipher suites with similar parameters), the last one being
TLS_DHE_PSK_WITH_AES_256_CBC_SHA384
. The next one should have beenTLS_DHE_PSK_WITH_AES_256_CCM
, but the server logs stop there.The least implausible explanations I can think of:
The text was updated successfully, but these errors were encountered: