SSL/TLS Status Variables
The status variables listed on this page relate to encrypting data during transfer with the Transport Layer Security (TLS) protocol. Often, the term Secure Socket Layer (SSL) is used interchangeably with TLS, although strictly speaking, the SSL protocol is a predecessor to TLS and is no longer considered secure.
For compatibility reasons, the TLS status variables in MariaDB still use the Ssl_ prefix, but MariaDB only supports its more secure successors. For more information on SSL/TLS in MariaDB, see Secure Connections Overview.
Some of these status values are not under the control of the server, but are reporting back settings of the underlying SSL library used by the server.
Variables
Ssl_accept_renegotiates
Ssl_accept_renegotiatesDescription: Number of negotiations needed to establish the TLS connection. The global value can be flushed by FLUSH STATUS.
Scope: Global
Data Type:
numeric
Ssl_accepts
Ssl_acceptsDescription: Number of accepted TLS handshakes. The global value can be flushed by FLUSH STATUS.
Scope: Global
Data Type:
numeric
Ssl_callback_cache_hits
Ssl_callback_cache_hitsDescription: Number of sessions retrieved from the session cache. The global value can be flushed by FLUSH STATUS.
Scope: Global
Data Type:
numeric
Ssl_cipher
Ssl_cipherDescription: The TLS cipher currently in use.
Scope: Global, Session
Data Type:
string
Ssl_cipher_list
Ssl_cipher_listDescription: List of the available TLS ciphers. This is not necessarily the list of ciphers the MariaDB server can actually accept, but rather the list of ciphers supported by the underlying SSL library in general. E.g. some of these may not be compatible with the servers SSL certificate and so can't be used to connect to that server.
Scope: Global, Session
Data Type:
string
Ssl_client_connects
Ssl_client_connectsDescription: Number of TLS handshakes started in client mode. The global value can be flushed by FLUSH STATUS.
Scope: Global
Data Type:
numeric
Ssl_connect_renegotiates
Ssl_connect_renegotiatesDescription: Number of negotiations needed to establish the connection to a TLS-enabled master. The global value can be flushed by FLUSH STATUS.
Scope: Global
Data Type:
numeric
Ssl_ctx_verify_depth
Ssl_ctx_verify_depthDescription: Number of tested TLS certificates in the chain. The global value can be flushed by FLUSH STATUS.
Scope: Global
Data Type:
numeric
Ssl_ctx_verify_mode
Ssl_ctx_verify_modeDescription: Mode used for TLS context verification.The global value can be flushed by FLUSH STATUS.
Scope: Global
Data Type:
numeric
Ssl_default_timeout
Ssl_default_timeoutDescription: Default timeout for TLS, in seconds.
Scope: Global, Session
Data Type:
numeric
Ssl_finished_accepts
Ssl_finished_acceptsDescription: Number of successful TLS sessions in server mode. The global value can be flushed by FLUSH STATUS.
Scope: Global
Data Type:
numeric
Ssl_finished_connects
Ssl_finished_connectsDescription: Number of successful TLS sessions in client mode. The global value can be flushed by FLUSH STATUS.
Scope: Global
Data Type:
numeric
Ssl_server_not_after
Ssl_server_not_afterDescription: Last valid date for the server TLS certificate.
Scope: Global, Session
Data Type:
numericIntroduced: MariaDB 10.0
Ssl_server_not_before
Ssl_server_not_beforeDescription: First valid date for the server TLS certificate.
Scope: Global, Session
Data Type:
numericIntroduced: MariaDB 10.0
Ssl_session_cache_hits
Ssl_session_cache_hitsDescription: Number of TLS sessions found in the session cache. The global value can be flushed by FLUSH STATUS.
Scope: Global
Data Type:
numeric
Ssl_session_cache_misses
Ssl_session_cache_missesDescription: Number of TLS sessions not found in the session cache. The global value can be flushed by FLUSH STATUS.
Scope: Global
Data Type:
numeric
Ssl_session_cache_mode
Ssl_session_cache_modeDescription: Mode used for TLS caching by the server.
Scope: Global
Data Type:
string
Ssl_session_cache_overflows
Ssl_session_cache_overflowsDescription: Number of sessions removed from the session cache because it was full. The global value can be flushed by FLUSH STATUS.
Scope: Global
Data Type:
numeric
Ssl_session_cache_size
Ssl_session_cache_sizeDescription: Size of the session cache. The global value can be flushed by FLUSH STATUS.
Scope: Global
Data Type:
numeric
Ssl_session_cache_timeouts
Ssl_session_cache_timeoutsDescription: Number of sessions which have timed out. The global value can be flushed by FLUSH STATUS.
Scope: Global
Data Type:
numeric
Ssl_sessions_reused
Ssl_sessions_reusedDescription: Number of sessions reused. The global value can be flushed by FLUSH STATUS.
Scope: Global, Session
Data Type:
numeric
Ssl_used_session_cache_entries
Ssl_used_session_cache_entriesDescription: Current number of sessions in the session cache. The global value can be flushed by FLUSH STATUS.
Scope: Global
Data Type:
numeric
Ssl_verify_depth
Ssl_verify_depthDescription: TLS verification depth. How many levels within the certificate signing chain the verification should cover. This is not set by the server itself but by the OpenSSL configuration, and will typically show a very large number like 18446744073709551615, basically meaning "always verify the full signing chain up to the root CA"
Scope: Global, Session
Data Type:
numeric
Ssl_verify_mode
Ssl_verify_modeDescription: TLS verification mode.
The OpenSSL verification mode flags in effect on the server side.
The value so far is always 5 when OpenSSL encryption is in effect, and 0 when not using encryption, or when the server is compiled against WolfSSL.
The value 5 is a combination of the SSL_VERIFY_PEER and SSL_VERIFY_CLIENT_ONCE flags, meaning that the client may send a certificate of its own connect, but will not be asked to send one again later for the duration of the encrypted connection.
The SSL_VERIFY_FAIL_IF_NO_PEER_CERT is not used at this point to enforce that the client sends a certificate if the database user was created with REQUIRE X509, REQUIRE ISSUER or REQUIRE SUBJECT, whether a client certificate was indeed sent, and whether it fits additional REQUIRE conditions, is checked by the server itself at a later state.
See also #notes for a description of the OpenSSL verify mode flags.
Scope: Global, Session
Data Type:
numeric
Ssl_version
Ssl_versionDescription: TLS version in use by the current session, possible values are
TLSv1.0,TLSv1.1,TLSv1.2andTLSv1.3Scope: Global, Session
Data Type:
string
See Also
Server Status Variables - complete list of status variables.
This page is licensed: CC BY-SA / Gnu FDL
Last updated
Was this helpful?

