Show More
@@ -425,7 +425,10 b' def wrapsocket(sock, keyfile, certfile, ' | |||||
425 | # outright. Hopefully the reason for this error is that we require |
|
425 | # outright. Hopefully the reason for this error is that we require | |
426 | # TLS 1.1+ and the server only supports TLS 1.0. Whatever the |
|
426 | # TLS 1.1+ and the server only supports TLS 1.0. Whatever the | |
427 | # reason, try to emit an actionable warning. |
|
427 | # reason, try to emit an actionable warning. | |
428 |
if e.reason |
|
428 | if e.reason in ( | |
|
429 | 'UNSUPPORTED_PROTOCOL', | |||
|
430 | 'TLSV1_ALERT_PROTOCOL_VERSION', | |||
|
431 | ): | |||
429 | # We attempted TLS 1.0+. |
|
432 | # We attempted TLS 1.0+. | |
430 | if settings[b'minimumprotocol'] == b'tls1.0': |
|
433 | if settings[b'minimumprotocol'] == b'tls1.0': | |
431 | # We support more than just TLS 1.0+. If this happens, |
|
434 | # We support more than just TLS 1.0+. If this happens, |
@@ -374,26 +374,26 b' Clients requiring newer TLS version than' | |||||
374 | (could not negotiate a common security protocol (tls1.1+) with localhost; the likely cause is Mercurial is configured to be more secure than the server can support) |
|
374 | (could not negotiate a common security protocol (tls1.1+) with localhost; the likely cause is Mercurial is configured to be more secure than the server can support) | |
375 | (consider contacting the operator of this server and ask them to support modern TLS protocol versions; or, set hostsecurity.localhost:minimumprotocol=tls1.0 to allow use of legacy, less secure protocols when communicating with this server) |
|
375 | (consider contacting the operator of this server and ask them to support modern TLS protocol versions; or, set hostsecurity.localhost:minimumprotocol=tls1.0 to allow use of legacy, less secure protocols when communicating with this server) | |
376 | (see https://mercurial-scm.org/wiki/SecureConnections for more info) |
|
376 | (see https://mercurial-scm.org/wiki/SecureConnections for more info) | |
377 | abort: error: .*(unsupported protocol|wrong ssl version).* (re) |
|
377 | abort: error: .*(unsupported protocol|wrong ssl version|alert protocol version).* (re) | |
378 | [100] |
|
378 | [100] | |
379 |
|
379 | |||
380 | $ P="$CERTSDIR" hg --config hostsecurity.minimumprotocol=tls1.1 id https://localhost:$HGPORT/ |
|
380 | $ P="$CERTSDIR" hg --config hostsecurity.minimumprotocol=tls1.1 id https://localhost:$HGPORT/ | |
381 | (could not negotiate a common security protocol (tls1.1+) with localhost; the likely cause is Mercurial is configured to be more secure than the server can support) |
|
381 | (could not negotiate a common security protocol (tls1.1+) with localhost; the likely cause is Mercurial is configured to be more secure than the server can support) | |
382 | (consider contacting the operator of this server and ask them to support modern TLS protocol versions; or, set hostsecurity.localhost:minimumprotocol=tls1.0 to allow use of legacy, less secure protocols when communicating with this server) |
|
382 | (consider contacting the operator of this server and ask them to support modern TLS protocol versions; or, set hostsecurity.localhost:minimumprotocol=tls1.0 to allow use of legacy, less secure protocols when communicating with this server) | |
383 | (see https://mercurial-scm.org/wiki/SecureConnections for more info) |
|
383 | (see https://mercurial-scm.org/wiki/SecureConnections for more info) | |
384 | abort: error: .*(unsupported protocol|wrong ssl version).* (re) |
|
384 | abort: error: .*(unsupported protocol|wrong ssl version|alert protocol version).* (re) | |
385 | [100] |
|
385 | [100] | |
386 | $ P="$CERTSDIR" hg --config hostsecurity.minimumprotocol=tls1.2 id https://localhost:$HGPORT/ |
|
386 | $ P="$CERTSDIR" hg --config hostsecurity.minimumprotocol=tls1.2 id https://localhost:$HGPORT/ | |
387 | (could not negotiate a common security protocol (tls1.2+) with localhost; the likely cause is Mercurial is configured to be more secure than the server can support) |
|
387 | (could not negotiate a common security protocol (tls1.2+) with localhost; the likely cause is Mercurial is configured to be more secure than the server can support) | |
388 | (consider contacting the operator of this server and ask them to support modern TLS protocol versions; or, set hostsecurity.localhost:minimumprotocol=tls1.0 to allow use of legacy, less secure protocols when communicating with this server) |
|
388 | (consider contacting the operator of this server and ask them to support modern TLS protocol versions; or, set hostsecurity.localhost:minimumprotocol=tls1.0 to allow use of legacy, less secure protocols when communicating with this server) | |
389 | (see https://mercurial-scm.org/wiki/SecureConnections for more info) |
|
389 | (see https://mercurial-scm.org/wiki/SecureConnections for more info) | |
390 | abort: error: .*(unsupported protocol|wrong ssl version).* (re) |
|
390 | abort: error: .*(unsupported protocol|wrong ssl version|alert protocol version).* (re) | |
391 | [100] |
|
391 | [100] | |
392 | $ P="$CERTSDIR" hg --config hostsecurity.minimumprotocol=tls1.2 id https://localhost:$HGPORT1/ |
|
392 | $ P="$CERTSDIR" hg --config hostsecurity.minimumprotocol=tls1.2 id https://localhost:$HGPORT1/ | |
393 | (could not negotiate a common security protocol (tls1.2+) with localhost; the likely cause is Mercurial is configured to be more secure than the server can support) |
|
393 | (could not negotiate a common security protocol (tls1.2+) with localhost; the likely cause is Mercurial is configured to be more secure than the server can support) | |
394 | (consider contacting the operator of this server and ask them to support modern TLS protocol versions; or, set hostsecurity.localhost:minimumprotocol=tls1.0 to allow use of legacy, less secure protocols when communicating with this server) |
|
394 | (consider contacting the operator of this server and ask them to support modern TLS protocol versions; or, set hostsecurity.localhost:minimumprotocol=tls1.0 to allow use of legacy, less secure protocols when communicating with this server) | |
395 | (see https://mercurial-scm.org/wiki/SecureConnections for more info) |
|
395 | (see https://mercurial-scm.org/wiki/SecureConnections for more info) | |
396 | abort: error: .*(unsupported protocol|wrong ssl version).* (re) |
|
396 | abort: error: .*(unsupported protocol|wrong ssl version|alert protocol version).* (re) | |
397 | [100] |
|
397 | [100] | |
398 |
|
398 | |||
399 | --insecure will allow TLS 1.0 connections and override configs |
|
399 | --insecure will allow TLS 1.0 connections and override configs | |
@@ -417,7 +417,7 b' The per-host config option by itself wor' | |||||
417 | (could not negotiate a common security protocol (tls1.2+) with localhost; the likely cause is Mercurial is configured to be more secure than the server can support) |
|
417 | (could not negotiate a common security protocol (tls1.2+) with localhost; the likely cause is Mercurial is configured to be more secure than the server can support) | |
418 | (consider contacting the operator of this server and ask them to support modern TLS protocol versions; or, set hostsecurity.localhost:minimumprotocol=tls1.0 to allow use of legacy, less secure protocols when communicating with this server) |
|
418 | (consider contacting the operator of this server and ask them to support modern TLS protocol versions; or, set hostsecurity.localhost:minimumprotocol=tls1.0 to allow use of legacy, less secure protocols when communicating with this server) | |
419 | (see https://mercurial-scm.org/wiki/SecureConnections for more info) |
|
419 | (see https://mercurial-scm.org/wiki/SecureConnections for more info) | |
420 | abort: error: .*(unsupported protocol|wrong ssl version).* (re) |
|
420 | abort: error: .*(unsupported protocol|wrong ssl version|alert protocol version).* (re) | |
421 | [100] |
|
421 | [100] | |
422 |
|
422 | |||
423 | .hg/hgrc file [hostsecurity] settings are applied to remote ui instances (issue5305) |
|
423 | .hg/hgrc file [hostsecurity] settings are applied to remote ui instances (issue5305) | |
@@ -430,7 +430,7 b' The per-host config option by itself wor' | |||||
430 | (could not negotiate a common security protocol (tls1.2+) with localhost; the likely cause is Mercurial is configured to be more secure than the server can support) |
|
430 | (could not negotiate a common security protocol (tls1.2+) with localhost; the likely cause is Mercurial is configured to be more secure than the server can support) | |
431 | (consider contacting the operator of this server and ask them to support modern TLS protocol versions; or, set hostsecurity.localhost:minimumprotocol=tls1.0 to allow use of legacy, less secure protocols when communicating with this server) |
|
431 | (consider contacting the operator of this server and ask them to support modern TLS protocol versions; or, set hostsecurity.localhost:minimumprotocol=tls1.0 to allow use of legacy, less secure protocols when communicating with this server) | |
432 | (see https://mercurial-scm.org/wiki/SecureConnections for more info) |
|
432 | (see https://mercurial-scm.org/wiki/SecureConnections for more info) | |
433 | abort: error: .*(unsupported protocol|wrong ssl version).* (re) |
|
433 | abort: error: .*(unsupported protocol|wrong ssl version|alert protocol version).* (re) | |
434 | [100] |
|
434 | [100] | |
435 |
|
435 | |||
436 | $ killdaemons.py hg0.pid |
|
436 | $ killdaemons.py hg0.pid |
General Comments 0
You need to be logged in to leave comments.
Login now