Using encrypted connections is possible when connecting to a TLS (sometimes referred to as SSL) enabled MySQL server. Much of the configuration of MySQL Shell is based on the options used by MySQL server, see Using Encrypted Connections for more information.
To configure an encrypted connection at startup of MySQL Shell, use the following command options:
--ssl
: Deprecated, to be removed in a future version. Use--ssl-mode
. This option enables or disables encrypted connections.--ssl-mode
: This option specifies the desired security state of the connection to the server.--ssl-ca=
: The path to a file in PEM format that contains a list of trusted SSL Certificate Authorities.file_name
--ssl-capath=
: The path to a directory that contains trusted SSL Certificate Authority certificates in PEM format.dir_name
--ssl-cert=
: The name of the SSL certificate file in PEM format to use for establishing an encrypted connection.file_name
--ssl-cipher=
: The name of the SSL cipher to use for establishing an encrypted connection.name
--ssl-key=
: The name of the SSL key file in PEM format to use for establishing an encrypted connection.file_name
--ssl-crl=
: The path to a file containing certificate revocation lists in PEM format.name
--ssl-crlpath=
: The path to a directory that contains files containing certificate revocation lists in PEM format.dir_name
--tls-ciphersuites=
: The TLS cipher suites permitted for encrypted connections, specified as a colon separated list of TLS cipher suite names. For examplesuites
--tls-ciphersuites=
. Added in version 8.0.18.TLS_DHE_PSK_WITH_AES_128_GCM_SHA256:TLS_CHACHA20_POLY1305_SHA256
-
--tls-version=
: The TLS protocols permitted for encrypted connections, specified as a comma separated list. For exampleversion
--tls-version=
.TLSv1.2,TLSv1.3
From MySQL 8.0.28, the TLSv1 and TLSv1.1 protocols are not supported by MySQL Server, and MySQL Shell cannot make a TLS/SSL connection with the protocol set to TLSv1 or TLSv1.1. If you attempt to make a connection using TLS/SSL from any version of MySQL Shell to a MySQL Server instance at 8.0.28 or above, and you specify the TLSv1 or TLSv1.1 protocol using the
--tls-version
option, you will see the following results:For TCP connections, the connection fails, and an error is returned to MySQL Shell.
For socket connections, if
--ssl-mode
is set toREQUIRED
, the connection fails. If--ssl-mode
is not set toREQUIRED
, the connection is made but with TLS/SSL disabled.
The TLSv1 and TLSv1.1 protocols were deprecated from MySQL 8.0.26. For background, refer to the IETF memo Deprecating TLSv1.0 and TLSv1.1. Make connections between MySQL Shell and MySQL Server using the more-secure TLSv1.2 and TLSv1.3 protocols. TLSv1.3 requires that both the MySQL server and the client application be compiled with OpenSSL 1.1.1 or higher. For more information on the support for TLS protocol versions in MySQL Server releases, see Removal of Support for the TLSv1 and TLSv1.1 Protocols.
Alternatively, the SSL options can be encoded as part of a
URI-like connection string as part of the query element. The
available SSL options are the same as those listed above, but
written without the preceding hyphens. For example,
ssl-ca
is the equivalent of
--ssl-ca
.
Paths specified in a URI-like string must be percent encoded, for example:
ssluser@127.0.0.1?ssl-ca%3D%2Froot%2Fclientcert%2Fca-cert.pem%26ssl-cert%3D%2Fro\
ot%2Fclientcert%2Fclient-cert.pem%26ssl-key%3D%2Froot%2Fclientcert%2Fclient-key
.pem
See Connecting to the Server Using URI-Like Strings or Key-Value Pairs for more information.
To establish an encrypted connection for a scripting session in
JavaScript or Python mode, set the SSL information in the
connectionData
dictionary. For example:
mysql-js> var session=mysqlx.getSession({host: 'localhost',
user: 'root',
password: 'password',
ssl_ca: "path_to_ca_file",
ssl_cert: "path_to_cert_file",
ssl_key: "path_to_key_file"});
Sessions created using mysqlx.getSession()
,
mysql.getSession()
, or
mysql.getClassicSession()
use
ssl-mode=REQUIRED
as the default if no
ssl-mode
is provided, and neither
ssl-ca
nor ssl-capath
is
provided. If no ssl-mode
is provided and any
of ssl-ca
or ssl-capath
is
provided, created sessions default to
ssl-mode=VERIFY_CA
.
See Connecting Using Key-Value Pairs for more information.