From owner-freebsd-ports-bugs@freebsd.org Sun Oct 18 11:30:42 2020 Return-Path: Delivered-To: freebsd-ports-bugs@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 245DD42EF1E for ; Sun, 18 Oct 2020 11:30:42 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 4CDd4209pTz4NWV for ; Sun, 18 Oct 2020 11:30:42 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 060EC42EF1C; Sun, 18 Oct 2020 11:30:42 +0000 (UTC) Delivered-To: ports-bugs@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 05D7F42ECE5 for ; Sun, 18 Oct 2020 11:30:42 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4CDd416Pjcz4NdX for ; Sun, 18 Oct 2020 11:30:41 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id BFD8F118F1 for ; Sun, 18 Oct 2020 11:30:41 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 09IBUfD3042766 for ; Sun, 18 Oct 2020 11:30:41 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 09IBUfkr042765 for ports-bugs@FreeBSD.org; Sun, 18 Oct 2020 11:30:41 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 250068] databases/postgres{12|13}-server: psql: error: could not connect to server: server closed the connection unexpectedly Date: Sun, 18 Oct 2020 11:30:42 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: ohartmann@walstatt.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: ports-bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 18 Oct 2020 11:30:42 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D250068 --- Comment #1 from O. Hartmann --- I just checked on several other CURRENT installations of ours and with different configuration option set when postgresql12|13-server is compiled - with our setup it is always the same. The one thing we didn't check so far is whether the database itself, which = is migrated via a simple dump (pg_dumpall) and rereading when the new setup postgresql server is running might be the culprit. Compiling server and client with the standard config options resulted in the same fail as described above.=20 Disabling ipfw (the firewall we use) or switching to pass everything doesn't change anything. Even allow explicitely ::1 and 127.0.0.1 doesn't change anything. Again, hosts are configured to use IPv4 and IPv6! Remote access via LDAP backed users to databases works fine. Local access via socket works fine, but not when explicetely connect via tcp ::1 or 127.0.0.1! Mots hosts in our lab run dual stack, so next I'll try to switch off IPV6. New setups on freshly installed hosts with IPV4 only seem to work properly. --=20 You are receiving this mail because: You are the assignee for the bug.=