Database Administrators
Q&A for database professionals who wish to improve their database skills
Latest Questions
0
votes
1
answers
212
views
How to connect in case Azure Cosmos DB default force use TLS/SSL?
My case: Client: Windows 10 x64. pgAdmin 4 version 8.4 (latest). Server: Cloud Azure Cosmos DB for PostgreSQL burstable, version 16. [![enter image description here][1]][1] My connection string will be likes this ``` jdbc:postgresql://c-donhuvycluster.qs4vulsae3t7uz.postgres.cosmos.azure.com:5432/vy...
My case:
Client: Windows 10 x64. pgAdmin 4 version 8.4 (latest).
Server: Cloud Azure Cosmos DB for PostgreSQL burstable, version 16.
My connection string will be likes this

jdbc:postgresql://c-donhuvycluster.qs4vulsae3t7uz.postgres.cosmos.azure.com:5432/vydb?user=citus&password={your_password}&sslmode=require
Encrypted connections
This cluster enforces encrypted connections using Transport Layer Security (TLS). For information on TLS version and certificates, refer to connecting with TLS/SSL.
How to connect in case Azure Cosmos DB default force use TLS/SSL? Please guide me. I search video tutorial on YouTube but did not see.
I did not know how to face with sslmode=require
.
My workaround: https://learn.microsoft.com/en-us/azure/cosmos-db/postgresql/howto-ssl-connection-security#applications-that-require-certificate-verification-for-tls-connectivity
But Is this command support Windows OS (I can run OpenSSL with Git Bash for Windows)? , how to declare certificate it with pgAdmin v4 8.4?
David Lapetina
(219 rep)
Mar 11, 2024, 02:02 AM
• Last activity: Jun 16, 2025, 03:09 AM
0
votes
1
answers
843
views
TLS 1.2 Implementation Validation
I have a validation question regarding implementation of TLS 1.2. What tools, scripts, processes, etc.. can be used to validate that TLS 1.2 is working when clients, webserver, and SQL Servers are communicating between each other? Do I need to perform network packet sniffing, run traces, use process...
I have a validation question regarding implementation of TLS 1.2.
What tools, scripts, processes, etc.. can be used to validate that TLS 1.2 is working when clients, webserver, and SQL Servers are communicating between each other?
Do I need to perform network packet sniffing, run traces, use process explorer? Is there a verbose option somewhere that can be turned on with logs reviewed?
Note: if it makes a difference, the SQL Servers involved run a variety of versions: 2008R2, 2012, and 2014.
user3344488
(1 rep)
Jan 23, 2018, 08:39 PM
• Last activity: Jun 15, 2025, 05:03 PM
0
votes
1
answers
1723
views
Enabling TLSv1 in postgres12 / openssl1.1.1f
After upgrading a server to postgres12 / OpenSSL 1.1.1f (Ubuntu 20.04) I got `tlsv1 alert protocol version` error messages from a client using an old openssl 1.0.1 library supporting only tlsv1. I thought setting `ssl_min_protocol_version = 'TLSv1'` in **postgresql.conf** should enable the protocol...
After upgrading a server to postgres12 / OpenSSL 1.1.1f (Ubuntu 20.04) I got
tlsv1 alert protocol version
error messages from a client using an old openssl 1.0.1 library supporting only tlsv1.
I thought setting ssl_min_protocol_version = 'TLSv1'
in **postgresql.conf** should enable the protocol allowing that client to connect. However it does not. I used nmap to check for supported protocols and found only one section with the TLSv1.2 ciphers:
➜ ~ nmap --script ssl-enum-ciphers -p 5432 127.0.0.1
Starting Nmap 7.80 ( https://nmap.org ) at 2020-09-23 22:28 CEST
Nmap scan report for localhost (127.0.0.1)
Host is up (0.000064s latency).
PORT STATE SERVICE
5432/tcp open postgresql
| ssl-enum-ciphers:
| TLSv1.2:
| ciphers:
| TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
| TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
| TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
| TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
I used this SE answer Ubuntu 20.04 - how to set lower SSL security level? to change the system default MinProtocol
setting in **openssl.cnf** to TLSv1
and postgres picked up this setting (also the openssl1.0.1 client could connect with this setting):
➜ ~ sudo service postgresql restart
➜ ~ nmap --script ssl-enum-ciphers -p 5432 127.0.0.1
Starting Nmap 7.80 ( https://nmap.org ) at 2020-09-23 22:31 CEST
Nmap scan report for localhost (127.0.0.1)
Host is up (0.000062s latency).
PORT STATE SERVICE
5432/tcp open postgresql
| ssl-enum-ciphers:
| TLSv1.0:
| ciphers:
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
| TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
| TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
| TLSv1.1:
| ciphers:
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
| TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
| TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
| TLSv1.2:
| ciphers:
| TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
| TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
| TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
| TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
For curiosity I changed ssl_min_protocol_version = 'TLSv1.2'
in **postgresql.conf** to see if the postgres server uses the intersection of the two configured ranges and after some debugging help from Laurenz i found that this setting was applied.
My question remained:
How can I configure my system so that postgres will accept TLSv1
through TLSv1.2
connections while keeping the openssl default MinProtocol
setting of TLSv1.2
?
clamp
(111 rep)
Sep 23, 2020, 10:19 PM
• Last activity: Mar 16, 2025, 12:06 PM
0
votes
1
answers
3031
views
MongoDB TLS unable to get issuer certificate
I'm setting up a MongoDB server, and wanted to use TLS from a proper CA and DNS. I got a domain name and put an A record in, linking to my server. Afterwards, I applied for a SSL certificate on sectigo.com. By their instructions, I generated a key and CSR. After confirming I did indeed own the domai...
I'm setting up a MongoDB server, and wanted to use TLS from a proper CA and DNS.
I got a domain name and put an A record in, linking to my server. Afterwards, I applied for a SSL certificate on sectigo.com. By their instructions, I generated a key and CSR. After confirming I did indeed own the domain name they sent me two files: a signed crt file, and a ca-bundle file.
I uploaded these to my server to /etc/ssl/mongodb_server and combined the signed .crt file and .key file into a pem with
cat server.key server.crt | server.pem
. I then filled in the mongod.conf file as per the documentation:
storage:
dbPath: /var/lib/mongodb
journal:
enabled: true
systemLog:
destination: file
logAppend: true
verbosity: 5
path: /var/log/mongodb/mongod.log
net:
port: 27017
bindIp:
tls:
mode: requireTLS
certificateKeyFile: /etc/ssl/mongodb_server/server.pem
allowConnectionsWithoutCertificates: true
processManagement:
timeZoneInfo: /usr/share/zoneinfo
security:
authorization: enabled
I'm looking to set up my server so client's don't need a ca signed certificate to connect, as this server will mainly be an API for a piece of software to grab files from.
Based on this link https://docs.mongodb.com/manual/tutorial/configure-ssl-clients/#std-label-tls-client-connection-only
The client needs to just specify a tlsCAFile to validate the server's certificate. I assume this is that ca-bundle.pem I was given as it includes two certificates that I assume are a chain of ca's for my certificate?
When I run:
mongosh --port XXXXX --host --tls --tlsCAFile ./ca-bundle.pem
after a while it comes back with: MongoServerSelectionError: unable to get issuer certificate
.
It is only able to connect when I specify the flag --tlsAllowInvalidCertificates
, which is not good enough.
I tried adding allowConnectionWithoutCertificates: true
to the config, as well as adding the CAFile ca-bundle.pem
, but nothing changed.
I also tried connecting from multiple devices and such.
My mongodb is bound to a local_ip, on which a modem router has port forwarding to the server. I'm also using IP tables to change ports to 27017. I'm able to ping my server's public IP and also dig for the DNS records. But none of this should matter as I'm able to connect if I don't validate the server's certificate.
I've used openssl
to check that my certificate does in fact mention my domain, and that is not expired.
I'm running MongoDB on Ubuntu Server 20.04 via a conf file and systemctl.
Is there some step I'm missing?
mosfeta
(11 rep)
Nov 25, 2021, 07:47 AM
• Last activity: Feb 6, 2025, 05:04 AM
1
votes
1
answers
5119
views
How do i disable SSL on MySQL Community 8.0.36 on Ubuntu 23.10?
I wasn't paying attention when I was presented with the option to generate credentials for operating via SSL. Having gone through the whole process, I was advised to follow-up on installing credentials. Well, I didn't know what it was advising and I left the utility. Once I restarted the MySQL serve...
I wasn't paying attention when I was presented with the option to generate credentials for operating via SSL. Having gone through the whole process, I was advised to follow-up on installing credentials. Well, I didn't know what it was advising and I left the utility. Once I restarted the MySQL server, I was unable to log into mySQL Workbench as I had previously been able to do. This hasn't (so far) seemed to affect my logging into MySQL command line interface. So, that means I am able to tweak should I need to. Something tells me that there's settings in the user table identifying which clients can connect and from where. All of this is on one machine, where I run mySQL server and perform my client business. I don't think OS is affecting this -- my woes started once I used (what appeared to be) an automated setup to install SSL.
I found references online to a MySQL utility (mysql_ssl_rsa_setup) which is supposed to be for automating SSL setup. However, when I try this, I am presented with WARNING message: mysql_ssl_rsa_setup is deprecated and will be removed in a future version. Use the mysqld server instead. I'm running MySQL version 8.0.36. I don't know how to find the mysqld server version.
The specific message reported by my MySQL Workbench says: Your connection attempt failed for user 'root' to the MySQL server at localhost:3306. It goes on to give 4 things to try:
1) Check that MySQL is running on address localhost. (CHECK!)
2) Check that MySQL is reachable on port 3306. (CHECK!)
3) Check the user root has rights to connect to localhost from your address. (CHECK! I can log in via the command line MySQL shell.)
4) Make sure that you are both providing a password if needed and using the correct password for localhost connecting from the host address you're connecting from (Unsure about this one except to verify that I can log into the server using
mysql -u root -p
When I list the "variables like '%SSL%'" , I get a listing of about 30 items. "have_openssl" and "have_ssl" are both yes. "ssl_ca" is "ca.pem;" and "ssl_cert" is "server-cert.pem." Finally, "ssl_key" is "server-key.pem." "ssl_session_cache_mode" and "ssl_session_cache_timeout" are "ON" and "300" respectively. "ssl_fips_mode" is "OFF".
My question: How do I undo the damage done (i.e., disable ssl)?
TheGeeko61
(121 rep)
Feb 17, 2024, 06:28 AM
• Last activity: Sep 21, 2024, 06:03 PM
0
votes
0
answers
49
views
How can I avoid downtime for AWS RDS SSL/TLS certificate rotation?
I have some production databases in RDS for which I have active connections and writes every minute. The current server certificates are expiring on 22nd August. I tried to update one, it takes 5 minutes and the database restarts. Are there any ways in which I can avoid this downtime of 5-10 minutes...
I have some production databases in RDS for which I have active connections and writes every minute. The current server certificates are expiring on 22nd August. I tried to update one, it takes 5 minutes and the database restarts. Are there any ways in which I can avoid this downtime of 5-10 minutes and still update the certificate?
DR93
(101 rep)
Aug 7, 2024, 05:53 AM
2
votes
2
answers
529
views
Can one TLS certificate be used for multiple instances of SQL Server?
Windows 2022, SQL Server 2022, FCI cluster with 2 physical nodes. 5 instances of SQL Server running on the FCI cluster. I need to have TLS certification running on all 5 instances of SQL Server. Can a single TLS certificate (installed on the servers) be used for all 5 instances, or does it require a...
Windows 2022, SQL Server 2022, FCI cluster with 2 physical nodes. 5 instances of SQL Server running on the FCI cluster. I need to have TLS certification running on all 5 instances of SQL Server. Can a single TLS certificate (installed on the servers) be used for all 5 instances, or does it require a single certificate for each instance?
SQL_Hacker
(531 rep)
Jun 21, 2024, 04:45 PM
• Last activity: Jul 4, 2024, 02:23 PM
2
votes
1
answers
12397
views
Enable TLS 1.2 and disable SSL 3 on SQL Server 2008
I know similar questions have been asked. What I'm asking for are concrete instructions on what to do, or not do, for my particular installation. I have some questions that I can't find the answer to, and I need some answers before I can install Microsoft's hotfix. The goal is to disable SSL 3 on th...
I know similar questions have been asked. What I'm asking for are concrete instructions on what to do, or not do, for my particular installation. I have some questions that I can't find the answer to, and I need some answers before I can install Microsoft's hotfix.
The goal is to disable SSL 3 on the machine by adding the registry key
Here's Microsoft's official download to enable TLS1.2 support: [link to microsoft](https://support.microsoft.com/en-us/help/3135244/tls-1-2-support-for-microsoft-sql-server)
The page reads *First build that supports TLS 1.2 - 10.50.6542.0*. This is higher than my build number. Does it mean the hotfix only is compatible with builds from 10.50.6542 and up? And so my build is not supported?
If my build is supported, then I supposed I should install it. Then what happens next?
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\SSL 3.0\Server\ - add value Enabled = 0
. However this causes SqlServerAgent to not start.
Running SQL Server 2008 R2 (SP3) build 10.50.6220.0 (X64).

Jam
(155 rep)
Jun 26, 2018, 12:26 PM
• Last activity: May 3, 2024, 07:33 PM
5
votes
1
answers
4426
views
Why does TLS1.2 break connections to SQL Server?
I have a Client who moved to TLS 1.2, which broke an app that connects to SQL Server 2017 and it got dumped on my lap. Being a Linux person all I can say is when they went back to TLS 1.1 it worked and here is the only error message I can glean in all this mess: > dbnetlib connectionopen secdoclient...
I have a Client who moved to TLS 1.2, which broke an app that connects to SQL Server 2017 and it got dumped on my lap.
Being a Linux person all I can say is when they went back to TLS 1.1 it worked and here is the only error message I can glean in all this mess:
> dbnetlib connectionopen secdoclienthandshake ssl security error
When I try to connect to the SQL Server from SQL Server Management Studio, I get this error message:
> Error connecting to 'hostname'.
>
> Login failed for user 'CORP\myaccount'. (.Net SqlClient Data Provider)
>
> Server Name: hostname
> Error Number: 18456
> Severity: 14
> State: 1
> Line Number: 65536
>
> Program Location:
>
> at System.Data.SqlClient.SqlInternalConnectionTds..ctor(DbConnectionPoolIdentity identity, SqlConnectionString connectionOptions, SqlCredential credential, Object providerInfo, String newPassword, SecureString newSecurePassword, Boolean redirectedUserInstance, SqlConnectionString userConnectionOptions, SessionData reconnectSessionData, DbConnectionPool pool, String accessToken, Boolean applyTransientFaultHandling, SqlAuthenticationProviderManager sqlAuthProviderManager)
> at System.Data.SqlClient.SqlConnectionFactory.CreateConnection(DbConnectionOptions options, DbConnectionPoolKey poolKey, Object poolGroupProviderInfo, DbConnectionPool pool, DbConnection owningConnection, DbConnectionOptions userOptions)
> at System.Data.ProviderBase.DbConnectionFactory.CreateNonPooledConnection(DbConnection owningConnection, DbConnectionPoolGroup poolGroup, DbConnectionOptions userOptions)
> at System.Data.ProviderBase.DbConnectionFactory.TryGetConnection(DbConnection owningConnection, TaskCompletionSource\`1 retry, DbConnectionOptions userOptions, DbConnectionInternal oldConnection, DbConnectionInternal& connection)
> at System.Data.ProviderBase.DbConnectionInternal.TryOpenConnectionInternal(DbConnection outerConnection, DbConnectionFactory connectionFactory, TaskCompletionSource\`1 retry, DbConnectionOptions userOptions)
> at System.Data.ProviderBase.DbConnectionClosed.TryOpenConnection(DbConnection outerConnection, DbConnectionFactory connectionFactory, TaskCompletionSource\`1 retry, DbConnectionOptions userOptions)
> at System.Data.SqlClient.SqlConnection.TryOpenInner(TaskCompletionSource\`1 retry)
> at System.Data.SqlClient.SqlConnection.TryOpen(TaskCompletionSource\`1 retry)
> at System.Data.SqlClient.SqlConnection.Open()
> at Microsoft.SqlServer.Management.SqlStudio.Explorer.ObjectExplorerService.ValidateConnection(UIConnectionInfo ci, IServerType server)
> at Microsoft.SqlServer.Management.SqlStudio.Explorer.ObjectExplorerService.ConnectToServer(UIConnectionInfo connectionInfo, IDbConnection liveConnection, Boolean validateConnection)
TLS 1.2 was enabled on the server that hosts SQL Server.
Marinaio
(207 rep)
Feb 11, 2020, 03:16 PM
• Last activity: May 1, 2024, 02:43 PM
2
votes
1
answers
1020
views
Is there a way for mongodb clients to connect to mongodb server (SSL/TLS enabled) without client certificates?
I am trying to setup a MongoDB with SSL/TLS enabled. I'm just wondering is there a way for clients to connect to my mongodb server without having a client certificate that would not compromise the security? (not considering --sslAllowInvalidCertificates or --tlsInsecure=true) Just like how mongodb a...
I am trying to setup a MongoDB with SSL/TLS enabled. I'm just wondering is there a way for clients to connect to my mongodb server without having a client certificate that would not compromise the security? (not considering --sslAllowInvalidCertificates or --tlsInsecure=true)
Just like how mongodb atlas is doing it.
JRA
(137 rep)
Mar 6, 2023, 03:48 AM
• Last activity: Mar 31, 2024, 10:04 AM
0
votes
2
answers
794
views
mongodump refuses to connect with ssl
I have set up my mongod instance with the following config: ``` net: port: 27017 bindIp: 0.0.0.0 ssl: mode: requireSSL PEMKeyFile: /config/mongo.pem CAFile: /config/ca.pem allowConnectionsWithoutCertificates: true security: authorization: enabled ``` I can connect to it fine with `mongosh`: ``` mong...
I have set up my mongod instance with the following config:
net:
port: 27017
bindIp: 0.0.0.0
ssl:
mode: requireSSL
PEMKeyFile: /config/mongo.pem
CAFile: /config/ca.pem
allowConnectionsWithoutCertificates: true
security:
authorization: enabled
I can connect to it fine with mongosh
:
mongosh --host=":27017" --username="root" --db="mydbname" --ssl --authenticationDatabase="admin"
But when I try to connect with mongodump
using the exact same options...:
mongodump --host=":27017" --username="root" --db="mydbname" --ssl --authenticationDatabase="admin"
...It fails with the message Failed: error connecting to db server: no reachable servers
. Checking the mongod logs I see the following:
{"t":{"$date":"2023-12-08T13:55:30.966+00:00"},"s":"I", "c":"NETWORK", "id":22943, "ctx":"listener","msg":"Connection accepted","attr":{"remote":"","uuid":"41542a35-0815-4fb7-a618-d3ecf6b21a33","connectionId":244,"connectionCount":4}}
{"t":{"$date":"2023-12-08T13:55:30.980+00:00"},"s":"W", "c":"NETWORK", "id":23234, "ctx":"conn244","msg":"No SSL certificate provided by peer"}
{"t":{"$date":"2023-12-08T13:55:30.985+00:00"},"s":"I", "c":"NETWORK", "id":22944, "ctx":"conn244","msg":"Connection ended","attr":{"remote":"","uuid":"41542a35-0815-4fb7-a618-d3ecf6b21a33","connectionId":244,"connectionCount":3}}
These three lines are repeated several times until the connection times out.
I'm wondering why it says No SSL certificate provided by peer
when I have allowConnectionsWithoutCertificates
set to true
. It obviously doesn't seem to be a problem when using mongosh as it connects without a problem.
taxfree
(1 rep)
Dec 8, 2023, 02:03 PM
• Last activity: Dec 12, 2023, 10:18 AM
0
votes
1
answers
4583
views
[ODBC SQL Server Driver][DBNETLIB] SSL Security Error - Windows 2003 App Server to Remote SQL Server 2022 Connection
We have migrated the application databases from an old SQL Server 2000 instance running on Windows 2003 to a new SQL Server 2022 instance running on Windows 2022. The application tier has a number of web servers using IIS 6.0 on Windows 2003 and when they try to test the connection to the new SQL Se...
We have migrated the application databases from an old SQL Server 2000 instance running on Windows 2003 to a new SQL Server 2022 instance running on Windows 2022. The application tier has a number of web servers using IIS 6.0 on Windows 2003 and when they try to test the connection to the new SQL Server they get the below SSL security error. Any idea what could be the issue is here, is it likely to be the driver(screenshot below shows drivers installed on the web servers)? Or is it likely to be related to what versions of SSL/TLS are enabled on either side?


Fza
(652 rep)
Nov 14, 2023, 09:23 AM
• Last activity: Nov 15, 2023, 12:48 PM
1
votes
0
answers
233
views
How can I enable server certificate verification when connecting to a remote host, but not when connecting via localhost?
When I add `ssl-verify-server-cert` to a `[client-mariadb]` section in the configuration files, the client correctly verifies the server certificate when connecting to a remote MariaDB instance. When attempting to login on the client itself via localhost, however, login fails with a TLS validation e...
When I add
ssl-verify-server-cert
to a [client-mariadb]
section in the configuration files, the client correctly verifies the server certificate when connecting to a remote MariaDB instance.
When attempting to login on the client itself via localhost, however, login fails with a TLS validation error:
mariadb -u root -v
ERROR 2026 (HY000): TLS/SSL error: Validation of SSL server certificate failed
Removing ssl-verify-server-cert
allows logging in from localhost normally.
How can I enable server certificate verification when connecting to a remote host, but not when connecting via localhost?
I presume the error is because localhost
is not the domain in the certificate on the client machine. But I also feel that adding localhost
as a Subject Alt Name is probably not a good idea.
Is there a solution or recommended practice for this?
Nick
(301 rep)
Oct 25, 2023, 09:57 AM
24
votes
4
answers
59933
views
Enable TLS 1.2 for SQL Server 2016 database mail
I have been puzzled by this issue for almost 1 week. Hopefully someone in our community has experienced the same issue and already found a solution. So here is my problem: As per our company policy, we want database mail to be able to send emails over port 25 with TLS 1.2 enabled and with TLS 1.0 &...
I have been puzzled by this issue for almost 1 week. Hopefully someone in our community has experienced the same issue and already found a solution.
So here is my problem:
As per our company policy, we want database mail to be able to send emails over port 25 with TLS 1.2 enabled and with TLS 1.0 & TLS 1.1 disabled.
Our mail server is Exchange Server 2010, our SQL Server 2016 (Developer and Enterprise editions) boxes have OS of Windows Server 2016 Standard editions.
Our SQL Server version is:
select @@version
----------------------------------------
Microsoft SQL Server 2016 (SP1-CU7-GDR) (KB4057119) - 13.0.4466.4 (X64)
Dec 22 2017 11:25:00
Copyright (c) Microsoft Corporation
Developer Edition (64-bit) on Windows Server 2016 Datacenter 10.0 (Build 14393: ) (Hypervisor)
We have the DB mail configuration as shown here.
The issue is whenever we turn on SSL
use msdb
exec dbo.sysmail_update_account_sp @account_id=2, @enable_ssl = 1;
We CANNOT send db mail (no matter whether our SMTP authentication is Windows Authentication, Basic authentication or Anonymous Authentication). The error message in db mail log is as follows:
> Message
>
> The mail could not be sent to the recipients because of the
> mail server failure. (Sending Mail using Account 2
> (2018-07-30T10:52:41). Exception Message: Cannot send mails to mail
> server. (Failure sending mail.). )
But if we turn off this SSL, there is no problem for db mail sent out.
So how can we enable SSL and uses TLS 1.2 for db mail?
I have enabled TLS 1.2 by adding registry as shown below
The details is from this link (see the FAQ section)


jyao
(3083 rep)
Jul 30, 2018, 08:27 PM
• Last activity: Aug 31, 2023, 06:51 AM
4
votes
2
answers
5649
views
SSRS using external images through tls 1.2 leaves src(unknown)
One of our SSRS reports loads images from external sources and one of these sources has been locked down to tls 1.2 (which is fair and we're expecting more of our clients to be doing this in the future) The tls 1.2 update has been applied to the server holding the ReportServer database and the two R...
One of our SSRS reports loads images from external sources and one of these sources has been locked down to tls 1.2 (which is fair and we're expecting more of our clients to be doing this in the future)
The tls 1.2 update has been applied to the server holding the ReportServer database and the two Reporting Services endpoints held on seperate machines.
All three machines have been tested locally and can all load the secured image in their browsers but when a report is ran using SSRS it fails
I've set up a report for testing which has no database connection, it is simply a non secured image link and a tls 1.2 secured image link,
The error I get is:
Warning [rsInvalidImageReference] The ImageData for the image ‘Image2’ is invalid. Details: The request was aborted: Could not create SSL/TLS secure channel.
This leaves the image as src(unknown)
in the actual report
So I feel like I've missed something in the installation of the tls 1.2 patch
Anyone have any ideas what might be going on?
Ste Bov
(2101 rep)
Sep 25, 2017, 08:26 AM
• Last activity: Jun 1, 2023, 06:18 PM
0
votes
1
answers
841
views
Unable to start MySQL with SSL support
I've generated a handful of certificates for my MySQL 8.0.30 (mysql-server.x86_64 8.0.30-1.module+el8.6.0+16523+5cb0e868 @rhel-8-for-x86_64-appstream-rpms) on RHEL 8.7 and I'm running into an issue... I have my ca.pem which contains the root and intermediate certificates, server-key.pem which contai...
I've generated a handful of certificates for my MySQL 8.0.30 (mysql-server.x86_64 8.0.30-1.module+el8.6.0+16523+5cb0e868 @rhel-8-for-x86_64-appstream-rpms) on RHEL 8.7 and I'm running into an issue...
I have my ca.pem which contains the root and intermediate certificates, server-key.pem which contains the RSA key (BEGIN RSA PRIVATE KEY/END RSA PRIVATE KEY) and server-cert.pem which contains the actual server certificate. I'm getting the following error when I start up MySQL:
2023-03-19T11:36:56.572166Z 0 [Warning] [MY-013595] [Server] Failed to initialize TLS for channel: mysql_main. See below for the description of exact issue.
2023-03-19T11:36:56.572209Z 0 [Warning] [MY-010069] [Server] Failed to set up SSL because of the following SSL library error: SSL_CTX_set_tmp_dh failed
2023-03-19T11:36:56.641677Z 0 [Warning] [MY-011302] [Server] Plugin mysqlx reported: 'Failed at SSL configuration: "SSL context is not usable without certificate and private key"
I don't know what I'm doing wrong... anyone?
Kevin Huntly
(33 rep)
Mar 19, 2023, 04:26 PM
• Last activity: Mar 20, 2023, 02:47 PM
0
votes
0
answers
7219
views
ORA-28759: failure to open file
I have implemented oracle wallet using orapki utility following this guide : https://stackoverflow.com/questions/63834638/how-to-change-protocol-for-oracle-database-connection-in-asp-net-core However, when I try to connect from the App Server to the database using the TCPS Protocol on non-default po...
I have implemented oracle wallet using orapki utility following this guide : https://stackoverflow.com/questions/63834638/how-to-change-protocol-for-oracle-database-connection-in-asp-net-core
However, when I try to connect from the App Server to the database using the TCPS Protocol on non-default port 1531, I am getting the following error :
SQL*Plus: Release 12.1.0.2.0 Production on Fri Dec 23 10:30:23 2022
Copyright (c) 1982, 2014, Oracle. All rights reserved.
Enter password:
ERROR:
ORA-28759: failure to open file
Enter user-name:
Is it the database user that I am trying to connect as need the permission on the db server wallet files? Does it need permission on the entire wallet folder or something else? I found nothing in the trace folder
currently oracle user own the wallet folder:
/oracle/apps/product/19.3.0.0/db/owm/wallets/oracle
Database :
Oracle 19c on Linux 7
App Server :
Windows Server 2016 with Oracle Client 12.1
Ali
(345 rep)
Dec 23, 2022, 06:34 PM
• Last activity: Dec 24, 2022, 12:47 PM
0
votes
1
answers
6118
views
can SQLSRV32.DLL broker a TLS 1.2 handshake?
Are there updates to SQLSRV32.DLL driver to support TLS 1.2? Version 10.00.18362 seems to broker a successful #TLS 1.2 handshake to #SQLServer 2016 https://sqlvandalism.com/2017/03/22/what-client-provider-am-i-using-to-connect-to-sql-server/ (near the end)
Are there updates to SQLSRV32.DLL driver to support TLS 1.2? Version 10.00.18362 seems to broker a successful #TLS 1.2 handshake to #SQLServer 2016
https://sqlvandalism.com/2017/03/22/what-client-provider-am-i-using-to-connect-to-sql-server/ (near the end)
EngineeringSQL
(579 rep)
Dec 8, 2021, 10:48 PM
• Last activity: Nov 9, 2022, 08:51 PM
0
votes
1
answers
3470
views
DBeaver error returned connecting to Db2 database using SSL/TLS with hostname validation error
I have configured SSL/TLS on Db2/Linux v11.5.7.0. In DBeaver 22.1.5 (Java GUI program to access database) in *Driver properties* I have configured parameter: `sslConnection` to `true` and DBeaver successfully connects to Db2 user using SSL/TLS. [According to Db2 Java Driver documentation][1] in DBea...
I have configured SSL/TLS on Db2/Linux v11.5.7.0. In DBeaver 22.1.5 (Java GUI program to access database) in *Driver properties* I have configured parameter:
sslConnection
to true
and DBeaver successfully connects to Db2 user using SSL/TLS.
According to Db2 Java Driver documentation in DBeaver at *Driver properties* I have configured sslClientHostnameValidation
to BASIC
to enable Db2 client to execute hostname validation.
When I double click to establish connection in DBeaver I get error:
> [jcc][t4][4.31.10] Connection failed: could not
> establish a SSL connection with the server. The connection has been
> configured to use hostname validation and the servers TLS certificate
> does not contain a hostname or IP address which matches the value
> configured by the client. ERRORCODE=-20576, SQLSTATE=08001
To troubleshoot the problem, in DBeaver I enabled *Connection calls* trace and the output is:
> [jcc][Time:2022-09-01-13:32:11.588][Thread:Connect to
> 'test1ssl_hostname_validation'][Connection@1fcbbce6]doHostnameValidation
> () called [jcc][Time:2022-09-01-13:32:11.588][Thread:Connect to
> 'test1ssl_hostname_validation'][Connection@1fcbbce6]doHostnameValidation
> () returned sslIsHostnameValid=false
It does not tell anything about what was the hostname it checked.
I have read Db2 documentation Troubleshooting hostname validation at the client when negotiating a TLS connection and according to documentation error should be logged into db2diag.log at Db2 server site. But there is no error at all recorded in my case.
I have even increased DIAGLEVEL dbm cfg parameter to maximum 4 and restarted the instance, reproduced the problem, but still no error is displayed in db2diag.log
For certificate I have double check Subject Alternative Name and there is correctly set FQDN.
How can I verify which hostname did client recognized and which hostname did it get from certificate?
Regards
folow
(523 rep)
Sep 1, 2022, 11:53 AM
• Last activity: Sep 5, 2022, 10:46 AM
0
votes
1
answers
1951
views
Unable to connect to SQL Server from one machine; "an existing connection was forcably closed by the remote host"
Connecting to the SQL Server (2008 R2 SP3 - KB 4057113) with SSMS version 18 yields: A connection was successfully established with the server, but then an error occurred during the login process. (provider: SSL Provider, error: 0 - An existing connection was forcibly closed by the remote host.) (.N...
Connecting to the SQL Server (2008 R2 SP3 - KB 4057113) with SSMS version 18 yields:
A connection was successfully established with the server, but then an error occurred during the login process. (provider: SSL Provider, error: 0 - An existing connection was forcibly closed by the remote host.) (.Net SqlClient Data Provider)
------------------------------
For help, click: http://go.microsoft.com/fwlink?ProdName=Microsoft%20SQL%20Server&EvtSrc=MSSQLServer&EvtID=10054&LinkId=20476
------------------------------
Error Number: 10054
Severity: 20
State: 0
Connection failure logging is enabled on the server but nothing gets logged. Please note the for help link is dead. I've tried various database applications. Nothing gets through. The problem appears to be on the server, not the workstation, but other workstations can connect to the server. This workstation can also connect to other servers.
I've got a good guess this is somehow TLS related, because that's what it was last time (server didn't support TLS 1.2 and needed a patch). This time I can't find the problem though.
Joshua
(426 rep)
Feb 25, 2020, 10:38 PM
• Last activity: Oct 14, 2021, 09:03 AM
Showing page 1 of 20 total questions