You are not logged in.

#1 2020-09-12 09:15:37

aakash123
Member
Registered: 2020-09-12
Posts: 13

[SOLVED] Broadcom driver openssl TSL handshake error

I recently insatalled arch linux and I have BCM4312 802.11b/g wifi card in my laptop so I installed b43-firmware-classic driver, I can connect to network but when I open certain sites like archlinux.org, pypy.org, google.com firefox just keeps loading forever
and curl gives this error

$ curl "[url]https://archlinux.org[/url]" -v -I
*   Trying 2a01:4f8:172:1d86::1:443...
*   Trying 138.201.81.199:443...
* Connected to archlinux.org (2a01:4f8:172:1d86::1) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
*   CAfile: /etc/ssl/certs/ca-certificates.crt
  CApath: none
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* OpenSSL SSL_connect: SSL_ERROR_SYSCALL in connection to archlinux.org:443 
* Closing connection 0
curl: (35) OpenSSL SSL_connect: SSL_ERROR_SYSCALL in connection to archlinux.org:443 

but when i connect to duckduckgo it runs fine

$ curl "[url]https://duckduckgo.org[/url]" -v -I
*   Trying 52.149.246.39:443...
* Connected to duckduckgo.org (52.149.246.39) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
*   CAfile: /etc/ssl/certs/ca-certificates.crt
  CApath: none
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
* TLSv1.3 (IN), TLS handshake, Certificate (11):
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
* TLSv1.3 (IN), TLS handshake, Finished (20):
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.3 (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use h2
* Server certificate:
*  subject: C=US; ST=Pennsylvania; L=Paoli; O=Duck Duck Go, Inc.; OU=Multi-Domain SSL; CN=donttrack.us
*  start date: Aug  5 00:00:00 2020 GMT
*  expire date: Sep  9 12:00:00 2021 GMT
*  subjectAltName: host "duckduckgo.org" matched cert's "duckduckgo.org"
*  issuer: C=US; O=DigiCert Inc; CN=DigiCert SHA2 Secure Server CA
*  SSL certificate verify ok.
* Using HTTP2, server supports multi-use
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* Using Stream ID: 1 (easy handle 0x55f277fdc920)
> HEAD / HTTP/2
> Host: duckduckgo.org
> user-agent: curl/7.72.0
> accept: */*
> 
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* old SSL session ID is stale, removing
* Connection state changed (MAX_CONCURRENT_STREAMS == 128)!
< HTTP/2 301 
HTTP/2 301 
< server: nginx
server: nginx
< date: Sat, 12 Sep 2020 08:43:43 GMT
date: Sat, 12 Sep 2020 08:43:43 GMT
< content-type: text/html
content-type: text/html
< content-length: 162
content-length: 162
< location: [url]https://duckduckgo.com/[/url]
location: [url]https://duckduckgo.com/[/url]
< strict-transport-security: max-age=31536000
strict-transport-security: max-age=31536000
< expires: Sun, 12 Sep 2021 08:43:43 GMT
expires: Sun, 12 Sep 2021 08:43:43 GMT
< cache-control: max-age=31536000
cache-control: max-age=31536000

< 
* Connection #0 to host duckduckgo.org left intact

there is no problem when I connect using ethernet

$ curl "[url]https://archlinux.org[/url]" -v -I
*   Trying 138.201.81.199:443...
*   Trying 2a01:4f8:172:1d86::1:443...
* Immediate connect fail for 2a01:4f8:172:1d86::1: Network is unreachable
* Connected to archlinux.org (138.201.81.199) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
*   CAfile: /etc/ssl/certs/ca-certificates.crt
  CApath: none
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
* TLSv1.3 (IN), TLS handshake, Certificate (11):
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
* TLSv1.3 (IN), TLS handshake, Finished (20):
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.3 (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use h2
* Server certificate:
*  subject: CN=www.archlinux.org
*  start date: Aug 31 19:28:16 2020 GMT
*  expire date: Nov 29 19:28:16 2020 GMT
*  subjectAltName: host "archlinux.org" matched cert's "archlinux.org"
*  issuer: C=US; O=Let's Encrypt; CN=Let's Encrypt Authority X3
*  SSL certificate verify ok.
* Using HTTP2, server supports multi-use
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* Using Stream ID: 1 (easy handle 0x55d8eedda920)
> HEAD / HTTP/2
> Host: archlinux.org
> user-agent: curl/7.72.0
> accept: */*
> 
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* old SSL session ID is stale, removing
* Connection state changed (MAX_CONCURRENT_STREAMS == 128)!
< HTTP/2 301 
HTTP/2 301 
< server: nginx/1.18.0
server: nginx/1.18.0
< date: Sat, 12 Sep 2020 08:36:32 GMT
date: Sat, 12 Sep 2020 08:36:32 GMT
< content-type: text/html
content-type: text/html
< content-length: 169
content-length: 169
< location: [url]https://www.archlinux.org/[/url]
location: [url]https://www.archlinux.org/[/url]
< strict-transport-security: max-age=31536000; includeSubdomains; preload
strict-transport-security: max-age=31536000; includeSubdomains; preload

< 
* Connection #0 to host archlinux.org left intact

Last edited by aakash123 (2020-09-12 12:28:46)

Offline

#2 2020-09-12 10:50:28

loqs
Member
Registered: 2014-03-06
Posts: 17,369

Re: [SOLVED] Broadcom driver openssl TSL handshake error

Please use code tags.  The wireless connection tried to use IPV6 and failed when connecting to archlinux.org.  It succeeded connecting to duckduckgo.org using IPV4
The wired connection succeeded connecting to archlinux.org using IPV4 as the IPV6 address was unreachable.
Does the wireless connection have IPV6 support while the wired connection does not?

Last edited by loqs (2020-09-12 10:50:57)

Offline

#3 2020-09-12 12:27:52

aakash123
Member
Registered: 2020-09-12
Posts: 13

Re: [SOLVED] Broadcom driver openssl TSL handshake error

loqs wrote:

Does the wireless connection have IPV6 support while the wired connection does not?

It does, the problem is fixed thanks.

I tried using b43-firmware but that didn't fix the issue so  I reinstalled the  b43-firmware-classic rebooted again and the connection is working fine now

Offline

Board footer

Powered by FluxBB