We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Hello i have this strange output reapeated infinitely:
2022-11-15 10:22:52 - DEBUG: No cached session for DnsName(DnsName(DnsName("test.mosquitto.org"))) 2022-11-15 10:22:52 - DEBUG: Not resuming any session 2022-11-15 10:22:52 - TRACE: Sending ClientHello Message { version: TLSv1_0, payload: Handshake { parsed: HandshakeMessagePayload { typ: ClientHello, payload: ClientHello( ClientHelloPayload { client_version: TLSv1_2, random: 43fae2178e0f1f411b695664faa463468548a612d389a7f8f20a87c02da9f109, session_id: dc8f11e7ed5d10781a769ad42e1806278728ad4e01e51872ac671b0453e012cb, cipher_suites: [ TLS13_AES_256_GCM_SHA384, TLS13_AES_128_GCM_SHA256, TLS13_CHACHA20_POLY1305_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, ], compression_methods: [ Null, ], extensions: [ SupportedVersions( [ TLSv1_3, TLSv1_2, ], ), ECPointFormats( [ Uncompressed, ], ), NamedGroups( [ X25519, secp256r1, secp384r1, ], ), SignatureAlgorithms( [ ECDSA_NISTP384_SHA384, ECDSA_NISTP256_SHA256, ED25519, RSA_PSS_SHA512, RSA_PSS_SHA384, RSA_PSS_SHA256, RSA_PKCS1_SHA512, RSA_PKCS1_SHA384, RSA_PKCS1_SHA256, ], ), ExtendedMasterSecretRequest, CertificateStatusRequest( OCSP( OCSPCertificateStatusRequest { responder_ids: [], extensions: , }, ), ), ServerName( [ ServerName { typ: HostName, payload: HostName( ( 746573742e6d6f7371756974746f2e6f7267, DnsName( "test.mosquitto.org", ), ), ), }, ], ), SignedCertificateTimestampRequest, KeyShare( [ KeyShareEntry { group: X25519, payload: 28cd49b32e567bb6abcf2cbcc396a15e482984e4cbc9cbe615e0f13ea297410a, }, ], ), PresharedKeyModes( [ PSK_DHE_KE, ], ), SessionTicket( Request, ), ], }, ), }, encoded: 010000f0030343fae2178e0f1f411b695664faa463468548a612d389a7f8f20a87c02da9f10920dc8f11e7ed5d10781a769ad42e1806278728ad4e01e51872ac671b0453e012cb0014130213011303c02cc02bcca9c030c02fcca800ff01000093002b00050403040303000b00020100000a00080006001d00170018000d0014001205030403080708060805080406010501040100170000000500050100000000000000170015000012746573742e6d6f7371756974746f2e6f726700120000003300260024001d002028cd49b32e567bb6abcf2cbcc396a15e482984e4cbc9cbe615e0f13ea297410a002d0002010100230000, }, } 2022-11-15 10:22:52 - TRACE: We got ServerHello ServerHelloPayload { legacy_version: TLSv1_2, random: 063cbbbd74ebb549d68a42f06965a1513a4d47f98101b932624827561aa85cee, session_id: dc8f11e7ed5d10781a769ad42e1806278728ad4e01e51872ac671b0453e012cb, cipher_suite: TLS13_AES_256_GCM_SHA384, compression_method: Null, extensions: [ SupportedVersions( TLSv1_3, ), KeyShare( KeyShareEntry { group: X25519, payload: a8d5919f92f51c0ba0290348a6caafc8740f4fc6f6d4c33f8f84c688a2b8fc5a, }, ), ], } 2022-11-15 10:22:52 - DEBUG: Using ciphersuite TLS13_AES_256_GCM_SHA384 2022-11-15 10:22:52 - DEBUG: Not resuming 2022-11-15 10:22:52 - TRACE: EarlyData rejected 2022-11-15 10:22:52 - TRACE: Dropping CCS 2022-11-15 10:22:52 - DEBUG: TLS1.3 encrypted extensions: [ServerNameAck] 2022-11-15 10:22:52 - DEBUG: ALPN protocol is None 2022-11-15 10:22:52 - TRACE: Server cert is [Certificate(b"0\x82\x03\x970\x82\x02\x7f\x02\x14}\xd3\x9bO\xdc[\xf7-\x0f\x0c\x04~\xb8\xf3#\x9e\xc1\x9b\xb7\xb70\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\00\x81\x901\x0b0\t\x06\x03U\x04\x06\x13\x02GB1\x170\x15\x06\x03U\x04\x08\x0c\x0eUnited Kingdom1\x0e0\x0c\x06\x03U\x04\x07\x0c\x05Derby1\x120\x10\x06\x03U\x04\n\x0c\tMosquitto1\x0b0\t\x06\x03U\x04\x0b\x0c\x02CA1\x160\x14\x06\x03U\x04\x03\x0c\rmosquitto.org1\x1f0\x1d\x06\t*\x86H\x86\xf7\r\x01\t\x01\x16\[email protected]\x1e\x17\r200609112156Z\x17\r300606112156Z0\x7f1\x0b0\t\x06\x03U\x04\x06\x13\x02GB1\x170\x15\x06\x03U\x04\x08\x0c\x0eUnited Kingdom1\x0e0\x0c\x06\x03U\x04\x07\x0c\x05Derby1\x120\x10\x06\x03U\x04\n\x0c\tMosquitto1\x160\x14\x06\x03U\x04\x0b\x0c\rPublic server1\x1b0\x19\x06\x03U\x04\x03\x0c\x12test.mosquitto.org0\x82\x01\"0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x01\x05\0\x03\x82\x01\x0f\00\x82\x01\n\x02\x82\x01\x01\0\xe5\x84\xb2-\x99mh|\x06\x9c\xa7\xf2\x15\xc9\xcb7\xc7\x85#\xae\x18\xd6$\xf1\x7f\xdd:\x80\xd8\xa9\x1c\xb3\xb4J\t\xa9]:mH\x8f]y\xe1\x8d\x1a#\x1a\xc3%\x8f\xfc.\x0fD\xba\x90\xda\x11\xe4\xb8gh\xc1\xca,\x9b\xa8\x99\xe9e>,~\x8d\x8e\xb2\\HS\xb2`\xe2t\xf8\xad\xbd\xc1\xf8\xd8\x82f0\xb1\xdd\xee\xe4\x97\"w\xcf\xb2\xba\xb2\x1ek\xa4\xb6?\x870\xb7\xe0\x9b\xc4q\x18\x01>\xf4\xfd\"\xee\xbc78\x9eU\x938\xe1k\xde\xdd\x99+\xf8e\xa8(\xfc\xe9F2\x1e~\x07y\xa9\xe5.P\x08\xa1\xa6Y1\xea\x9b\xb9:Fo\xed\xa6\x80\x8d\\\xc9C\xebC$T\x18\xfc\x02_S\xbdx\xea\x85\xf9\\\xe7\x9c:\x12\x15\x0ci\xd37\x0b\xce\x1d\xdbg\xb7\x8a\xc6w\x17_\x97\xa6;\xdf}\xb3\xd3tDK\x91gyoVzkx\x1c\x1c\xca|\x1e[\xb2\x88\n\x0c\x80\xec\xaeN\xd7\x81\xc6`\xaa{\xc7@Z\xf78w\x17\xb6\x7f\xc0iJ!\x02\x03\x01\0\x010\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\0\x03\x82\x01\x01\0\xbao\x99\xce\xe1)!k\xba\xe0\\K\xe2\x96\xfd,\x1f7'\x8f\xdf\x97j\xf7xM5\x04\xf0\xff\xec}U\xe7\xb1\xec\xdf^!\xf7\x1f\xe4\xd8#\xa9\x16z\xc1\xdb\xbc\xb4k\xb8\nW\x8f\xc0\x0bj\xbf4\x82\x9dX\x9dc\xf5\xe6\xc2\"\xf5C\x8b\xae`\xd6\xed\x11\x84\xa5\x92\xb4\x95\xb9`\x96\xfd\xc5:!\x89\xde~w\xe2p$\xea\0\xbf\x90\x18d\\\xa7\x95bB\xa4\x94G\xd4\x0c\x9b\xe8\x18\xfa\x85\xa9\xdd\x9a\x14\xb9\xed\xbd\xd7\xf9\xb1M\xa9\xd6\n\xcf\xee\x1d\x80\xd0*\xef\xf1\xae\xf9{O\xd6k\x96\xa2\x05\xd4{\xa1\x95\x92\x88d=\xd6kfJ\xf7\xfba\xb1\xa4'\x07\xbdx`\x1e\xa5\x8a\x93\xe3Vy\x05\xd6;I_\xe0\xe3\xf5\xd7\x15!\x130nD\n\x99pq\xb1~\x18\xe48\xf4\x85\x89\x1f\x8e\x86\x93 u\x93\xd7?\xff\x07\xb9BufJ\x8f\xb8\xf15|h|\xd7\0\x91\xbf\xf3\x9b\x83\x80X\n\xe9\xad3\xf2\x06<\x8e\xde\x8b\xfd\xe8\x8d\xea\x96\tg}\xa7")] 2022-11-15 10:22:52 - WARN: Sending fatal alert BadCertificate 2022-11-15 10:22:52 - TRACE: deregistering event source from poller Error = Tls(Io(Custom { kind: InvalidData, error: InvalidCertificateData("invalid peer certificate: UnsupportedCertVersion") }))
and this is the function:
#[cfg(feature = "use-rustls")] #[tokio::main] pub async fn test_mqtt() -> Result<(), Box<dyn Error>> { use rumqttc::{self, AsyncClient, Event, Incoming, MqttOptions, Transport}; use rustls::ClientConfig; let mut mqttoptions = MqttOptions::new("nos", "test.mosquitto.org", 8883); mqttoptions.set_keep_alive(std::time::Duration::from_secs(5)); //mqttoptions.set_credentials("rw", "readwrite"); // Use rustls-native-certs to load root certificates from the operating system. let mut root_cert_store = rustls::RootCertStore::empty(); for cert in rustls_native_certs::load_native_certs().expect("could not load platform certs") { root_cert_store.add(&rustls::Certificate(cert.0))?; } let client_config = ClientConfig::builder() .with_safe_defaults() .with_root_certificates(root_cert_store) .with_no_client_auth(); mqttoptions.set_transport(Transport::tls_with_config(client_config.into())); let (_client, mut eventloop) = AsyncClient::new(mqttoptions, 10); loop { match eventloop.poll().await { Ok(Event::Incoming(Incoming::Publish(p))) => { println!("Topic: {}, Payload: {:?}", p.topic, p.payload); } Ok(Event::Incoming(i)) => { println!("Incoming = {:?}", i); } Ok(Event::Outgoing(o)) => println!("Outgoing = {:?}", o), Err(e) => { println!("Error = {:?}", e); } } } }
The text was updated successfully, but these errors were encountered:
Well, the error message is quite specific, right? See briansmith/webpki#219.
Sorry, something went wrong.
Looks like test.mosquitto.org has fixed their certificate now.
No branches or pull requests
Hello i have this strange output reapeated infinitely:
and this is the function:
The text was updated successfully, but these errors were encountered: