About the packet server send to client after HandshakeResponse
Posted by:
Lew Lubin
Date: June 15, 2023 10:03PM
After the client send HandshakeResponse to server, the server response a packet with length 2, it only contain `0x03 0x01` 2 bytes.
What is this packet ? I found nothing about it.
MySQL Protocol
Packet Length: 74
Packet Number: 0
Server Greeting
Protocol: 10
Version: 8.0.28
Thread ID: 234410
Salt: k\001\037[?Q9\022
Server Capabilities: 0xffff
Server Language: utf8mb4 COLLATE utf8mb4_0900_ai_ci (255)
Server Status: 0x0002
Extended Server Capabilities: 0xdfff
Authentication Plugin Length: 21
Unused: 00000000000000000000
Salt: m\tg`.-j\037L\026l\001
Authentication Plugin: caching_sha2_password
MySQL Protocol
Packet Length: 154
Packet Number: 1
Login Request
Client Capabilities: 0xa20d
Extended Client Capabilities: 0x003a
MAX Packet: 16777215
Charset: utf8 COLLATE utf8_general_ci (33)
Unused: 0000000000000000000000000000000000000000000000
Username: root
Password: xxxxxxxxxxxxxxxxxxxxxxxx
Schema: test
Client Auth Plugin: caching_sha2_password
Prefix: 56
Length: 56
Connection Attributes
Connection Attributes length: 56
Connection Attribute - _client_name: pymysql
Connection Attribute - _pid: 1280827
Connection Attribute - _client_version: 0.9.3
MySQL Protocol - authentication switch request
Packet Length: 2
Packet Number: 2
Auth Method Name: \001\003
Auth Method Data: <MISSING>
Subject
Written By
Posted
About the packet server send to client after HandshakeResponse
June 15, 2023 10:03PM
Sorry, you can't reply to this topic. It has been closed.
Content reproduced on this site is the property of the respective copyright holders.
It is not reviewed in advance by Oracle and does not necessarily represent the opinion
of Oracle or any other party.