Can you share your listeners propeties from server.properties

בתאריך יום ה׳, 24 ביוני 2021, 19:49, מאת Anjali Sharma ‏<
sharma.anjali.2...@gmail.com>:

> But in the pcap I am able to see that it is taking some junk certificates
> from client side
>
> On Thu, Jun 24, 2021, 21:58 Ran Lupovich <ranlupov...@gmail.com> wrote:
>
> > Make sure that the date and time on the server is correct (The wrong time
> > will cause the SSL certificate connection to fail).
> >
> > בתאריך יום ה׳, 24 ביוני 2021, 19:18, מאת Anjali Sharma ‏<
> > sharma.anjali.2...@gmail.com>:
> >
> > > openssl s_client -connect 10.54.65.99:28105
> > > socket: Bad file descriptor
> > > connect:errno=9
> > >
> > > This is the output we are getting
> > >
> > >
> > > On Thu, Jun 24, 2021 at 6:04 PM Shilin Wu <s...@confluent.io.invalid>
> > > wrote:
> > >
> > > > I think your port may not even be enabled with SSL.
> > > >
> > > > do this
> > > > "openssl s_client -connect <host>:<port>"
> > > > and show the result ?
> > > >
> > > >
> > > >
> > > > [image: Confluent] <https://www.confluent.io>
> > > > Wu Shilin
> > > > Solution Architect
> > > > +6581007012
> > > > Follow us: [image: Blog]
> > > > <
> > > >
> > >
> >
> https://www.confluent.io/blog?utm_source=footer&utm_medium=email&utm_campaign=ch.email-signature_type.community_content.blog
> > > > >[image:
> > > > Twitter] <https://twitter.com/ConfluentInc>[image: LinkedIn]
> > > > <https://www.linkedin.com/company/confluent/>[image: Slack]
> > > > <https://slackpass.io/confluentcommunity>[image: YouTube]
> > > > <https://youtube.com/confluent>
> > > > [image: Kafka Summit] <https://www.kafka-summit.org/>
> > > >
> > > >
> > > > On Thu, Jun 24, 2021 at 8:32 PM Anjali Sharma <
> > > > sharma.anjali.2...@gmail.com>
> > > > wrote:
> > > >
> > > > > This is the error we are getting
> > > > >
> > > > >
> > > > >   [2021-06-22 10:59:45,049] ERROR [Consumer clientId=consumer-1,
> > > > > groupId=test-consumer-group] Connection to node -1 failed
> > > authentication
> > > > > due to: SSL handshake failed
> (org.apache.kafka.clients.NetworkClient)
> > > > > [2021-06-22 10:59:45,051] ERROR Authentication failed: terminating
> > > > consumer
> > > > > process (kafka.tools.ConsoleConsumer$)
> > > > > org.apache.kafka.common.errors.SslAuthenticationException: SSL
> > > handshake
> > > > > failed
> > > > > Caused by: javax.net.ssl.SSLException: Unsupported record version
> > > > > Unknown-211.79
> > > > >
> > > > >
> > > > > On Thu, Jun 24, 2021, 17:59 Shilin Wu <s...@confluent.io.invalid>
> > > wrote:
> > > > >
> > > > > > You need to make sure the following one by one... Or you can post
> > the
> > > > > > message of error here so we can see exact error.
> > > > > >
> > > > > >
> > > > > > > > > > > 1. Client trust store need to trust the server cert's
> > > issuer
> > > > > cert
> > > > > > > > (AKA
> > > > > > > > > > the
> > > > > > > > > > > CA cert)
> > > > > > > > > > > 2. The client must have a keystore that can be trusted
> by
> > > > > > server's
> > > > > > > > > trust
> > > > > > > > > > > store.
> > > > > > > > > > > 3. The server needs to be accessed either via FQDN, or
> > one
> > > of
> > > > > the
> > > > > > > SAN
> > > > > > > > > > > address. If you are doing self sign, you can add many
> DNS
> > > > alias
> > > > > > and
> > > > > > > > > even
> > > > > > > > > > ip
> > > > > > > > > > > addresses to the server's cert.
> > > > > > > > > > > 4. Make sure the server cert has extended key usage of
> > > > > > serverAuth,
> > > > > > > > > client
> > > > > > > > > > > cert has extended key usage of clientAuth. Actually you
> > can
> > > > > have
> > > > > > > > both -
> > > > > > > > > > if
> > > > > > > > > > > you are generating yourself.
> > > > > >
> > > > > > [image: Confluent] <https://www.confluent.io>
> > > > > > Wu Shilin
> > > > > > Solution Architect
> > > > > > +6581007012
> > > > > > Follow us: [image: Blog]
> > > > > > <
> > > > > >
> > > > >
> > > >
> > >
> >
> https://www.confluent.io/blog?utm_source=footer&utm_medium=email&utm_campaign=ch.email-signature_type.community_content.blog
> > > > > > >[image:
> > > > > > Twitter] <https://twitter.com/ConfluentInc>[image: LinkedIn]
> > > > > > <https://www.linkedin.com/company/confluent/>[image: Slack]
> > > > > > <https://slackpass.io/confluentcommunity>[image: YouTube]
> > > > > > <https://youtube.com/confluent>
> > > > > > [image: Kafka Summit] <https://www.kafka-summit.org/>
> > > > > >
> > > > > >
> > > > > > On Thu, Jun 24, 2021 at 8:26 PM Anjali Sharma <
> > > > > > sharma.anjali.2...@gmail.com>
> > > > > > wrote:
> > > > > >
> > > > > > > Thanks for this but we are trying to do this on command line
> but
> > > > > getting
> > > > > > > this bad certificate error
> > > > > > >
> > > > > > > On Thu, Jun 24, 2021, 17:52 Shilin Wu
> <s...@confluent.io.invalid
> > >
> > > > > wrote:
> > > > > > >
> > > > > > > > you may do openssl s_client -connect kafkahost:port to dump
> the
> > > > cert.
> > > > > > > >
> > > > > > > > See if the cert makes sense.
> > > > > > > >
> > > > > > > > To test if your SSL works, you may try use this java program
> to
> > > > test
> > > > > if
> > > > > > > you
> > > > > > > > have SSL trust issue - if it connects ok, the cert trust is
> > > mostly
> > > > to
> > > > > > be
> > > > > > > > okay. (remember to change your host name in code, and jks
> path
> > in
> > > > > > command
> > > > > > > > line options.
> > > > > > > >
> > > > > > > >
> > > > > > > > java -Djavax.net.ssl.trustStore=truststore.jks
> > > > > > > > -Djavax.net.ssl.trustStorePassword=changeme Test
> > > > > > > >
> > > > > > > > import java.net.*;
> > > > > > > >
> > > > > > > > import java.io.*;
> > > > > > > >
> > > > > > > > import javax.net.ssl.*;
> > > > > > > >
> > > > > > > >
> > > > > > > > /*
> > > > > > > >
> > > > > > > >  * This example demostrates how to use a SSLSocket as client
> to
> > > > > > > >
> > > > > > > >  * send a HTTP request and get response from an HTTPS server.
> > > > > > > >
> > > > > > > >  * It assumes that the client is not behind a firewall
> > > > > > > >
> > > > > > > >  */
> > > > > > > >
> > > > > > > >
> > > > > > > > public class Test {
> > > > > > > >
> > > > > > > >
> > > > > > > >     public static void main(String[] args) throws Exception {
> > > > > > > >
> > > > > > > >         try {
> > > > > > > >
> > > > > > > >             SSLSocketFactory factory =
> > > > > > > >
> > > > > > > >
> >  (SSLSocketFactory)SSLSocketFactory.getDefault();
> > > > > > > >
> > > > > > > >             SSLSocket socket =
> > > > > > > >
> > > > > > > >                 (SSLSocket)factory.createSocket("cp-kafka1",
> > > 9093);
> > > > > > > >
> > > > > > > >
> > > > > > > >             /*
> > > > > > > >
> > > > > > > >              * send http request
> > > > > > > >
> > > > > > > >              *
> > > > > > > >
> > > > > > > >              * Before any application data is sent or
> received,
> > > the
> > > > > > > >
> > > > > > > >              * SSL socket will do SSL handshaking first to
> set
> > up
> > > > > > > >
> > > > > > > >              * the security attributes.
> > > > > > > >
> > > > > > > >              *
> > > > > > > >
> > > > > > > >              * SSL handshaking can be initiated by either
> > > flushing
> > > > > data
> > > > > > > >
> > > > > > > >              * down the pipe, or by starting the handshaking
> by
> > > > hand.
> > > > > > > >
> > > > > > > >              *
> > > > > > > >
> > > > > > > >              * Handshaking is started manually in this
> example
> > > > > because
> > > > > > > >
> > > > > > > >              * PrintWriter catches all IOExceptions
> (including
> > > > > > > >
> > > > > > > >              * SSLExceptions), sets an internal error flag,
> and
> > > > then
> > > > > > > >
> > > > > > > >              * returns without rethrowing the exception.
> > > > > > > >
> > > > > > > >              *
> > > > > > > >
> > > > > > > >              * Unfortunately, this means any error messages
> are
> > > > lost,
> > > > > > > >
> > > > > > > >              * which caused lots of confusion for others
> using
> > > this
> > > > > > > >
> > > > > > > >              * code.  The only way to tell there was an error
> > is
> > > to
> > > > > > call
> > > > > > > >
> > > > > > > >              * PrintWriter.checkError().
> > > > > > > >
> > > > > > > >              */
> > > > > > > >
> > > > > > > >             socket.startHandshake();
> > > > > > > >
> > > > > > > >
> > > > > > > >             socket.close();
> > > > > > > >
> > > > > > > >
> > > > > > > >         } catch (Exception e) {
> > > > > > > >
> > > > > > > >             e.printStackTrace();
> > > > > > > >
> > > > > > > >         }
> > > > > > > >
> > > > > > > >     }
> > > > > > > >
> > > > > > > > }
> > > > > > > >
> > > > > > > > [image: Confluent] <https://www.confluent.io>
> > > > > > > > Wu Shilin
> > > > > > > > Solution Architect
> > > > > > > > +6581007012
> > > > > > > > Follow us: [image: Blog]
> > > > > > > > <
> > > > > > > >
> > > > > > >
> > > > > >
> > > > >
> > > >
> > >
> >
> https://www.confluent.io/blog?utm_source=footer&utm_medium=email&utm_campaign=ch.email-signature_type.community_content.blog
> > > > > > > > >[image:
> > > > > > > > Twitter] <https://twitter.com/ConfluentInc>[image: LinkedIn]
> > > > > > > > <https://www.linkedin.com/company/confluent/>[image: Slack]
> > > > > > > > <https://slackpass.io/confluentcommunity>[image: YouTube]
> > > > > > > > <https://youtube.com/confluent>
> > > > > > > > [image: Kafka Summit] <https://www.kafka-summit.org/>
> > > > > > > >
> > > > > > > >
> > > > > > > > On Thu, Jun 24, 2021 at 8:17 PM Anjali Sharma <
> > > > > > > > sharma.anjali.2...@gmail.com>
> > > > > > > > wrote:
> > > > > > > >
> > > > > > > > > Had added those configuration but still seeing only junk
> > > > > certificates
> > > > > > > > from
> > > > > > > > > client side ? Any idea how to solve?
> > > > > > > > >
> > > > > > > > >
> > > > > > > > > Thanks
> > > > > > > > > Anjali
> > > > > > > > >
> > > > > > > > > On Thu, Jun 24, 2021, 17:44 Shilin Wu
> > > <s...@confluent.io.invalid
> > > > >
> > > > > > > wrote:
> > > > > > > > >
> > > > > > > > > > ssl.truststore.location=/root/truststore.jks
> > > > > > > > > >
> > > > > > > > > > ssl.truststore.type=JKS
> > > > > > > > > >
> > > > > > > > > > ssl.truststore.password=changeme
> > > > > > > > > >
> > > > > > > > > > ssl.keystore.location=/root/alice.jks
> > > > > > > > > >
> > > > > > > > > > ssl.keystore.type=JKS
> > > > > > > > > >
> > > > > > > > > > ssl.keystore.password=changeme
> > > > > > > > > >
> > > > > > > > > > security.protocol=SSL
> > > > > > > > > >
> > > > > > > > > > bootstrap.server=cp-kafka1:9093
> > > > > > > > > >
> > > > > > > > > > ssl.endpoint.identification.algorithm=https
> > > > > > > > > >
> > > > > > > > > > This worked for me pretty well.
> > > > > > > > > >
> > > > > > > > > > Of course you need to generate those certs from open ssl.
> > > > > > > > > >
> > > > > > > > > > The trust store only contains the CA cert, the key store
> > > > contains
> > > > > > the
> > > > > > > > > > keypair for alice (the user here).
> > > > > > > > > >
> > > > > > > > > >
> > > > > > > > > > [image: Confluent] <https://www.confluent.io>
> > > > > > > > > > Wu Shilin
> > > > > > > > > > Solution Architect
> > > > > > > > > > +6581007012
> > > > > > > > > > Follow us: [image: Blog]
> > > > > > > > > > <
> > > > > > > > > >
> > > > > > > > >
> > > > > > > >
> > > > > > >
> > > > > >
> > > > >
> > > >
> > >
> >
> https://www.confluent.io/blog?utm_source=footer&utm_medium=email&utm_campaign=ch.email-signature_type.community_content.blog
> > > > > > > > > > >[image:
> > > > > > > > > > Twitter] <https://twitter.com/ConfluentInc>[image:
> > LinkedIn]
> > > > > > > > > > <https://www.linkedin.com/company/confluent/>[image:
> > Slack]
> > > > > > > > > > <https://slackpass.io/confluentcommunity>[image:
> YouTube]
> > > > > > > > > > <https://youtube.com/confluent>
> > > > > > > > > > [image: Kafka Summit] <https://www.kafka-summit.org/>
> > > > > > > > > >
> > > > > > > > > >
> > > > > > > > > > On Thu, Jun 24, 2021 at 11:38 AM Anjali Sharma <
> > > > > > > > > > sharma.anjali.2...@gmail.com>
> > > > > > > > > > wrote:
> > > > > > > > > >
> > > > > > > > > > > Thanks for this info can you please share what all
> needs
> > to
> > > > be
> > > > > > > > present
> > > > > > > > > on
> > > > > > > > > > > the client side for mtls as in what all configuration
> are
> > > > > needed
> > > > > > > that
> > > > > > > > > > side?
> > > > > > > > > > >
> > > > > > > > > > > Thanks
> > > > > > > > > > >
> > > > > > > > > > > On Thu, Jun 24, 2021, 07:51 Shilin Wu
> > > > > <s...@confluent.io.invalid
> > > > > > >
> > > > > > > > > wrote:
> > > > > > > > > > >
> > > > > > > > > > > > A few things to check:
> > > > > > > > > > > >
> > > > > > > > > > > > 1. Client trust store need to trust the server cert's
> > > > issuer
> > > > > > cert
> > > > > > > > > (AKA
> > > > > > > > > > > the
> > > > > > > > > > > > CA cert)
> > > > > > > > > > > > 2. The client must have a keystore that can be
> trusted
> > by
> > > > > > > server's
> > > > > > > > > > trust
> > > > > > > > > > > > store.
> > > > > > > > > > > > 3. The server needs to be accessed either via FQDN,
> or
> > > one
> > > > of
> > > > > > the
> > > > > > > > SAN
> > > > > > > > > > > > address. If you are doing self sign, you can add many
> > DNS
> > > > > alias
> > > > > > > and
> > > > > > > > > > even
> > > > > > > > > > > ip
> > > > > > > > > > > > addresses to the server's cert.
> > > > > > > > > > > > 4. Make sure the server cert has extended key usage
> of
> > > > > > > serverAuth,
> > > > > > > > > > client
> > > > > > > > > > > > cert has extended key usage of clientAuth. Actually
> you
> > > can
> > > > > > have
> > > > > > > > > both -
> > > > > > > > > > > if
> > > > > > > > > > > > you are generating yourself.
> > > > > > > > > > > >
> > > > > > > > > > > >
> > > > > > > > > > > >
> > > > > > > > > > > > [image: Confluent] <https://www.confluent.io>
> > > > > > > > > > > > Wu Shilin
> > > > > > > > > > > > Solution Architect
> > > > > > > > > > > > +6581007012
> > > > > > > > > > > > Follow us: [image: Blog]
> > > > > > > > > > > > <
> > > > > > > > > > > >
> > > > > > > > > > >
> > > > > > > > > >
> > > > > > > > >
> > > > > > > >
> > > > > > >
> > > > > >
> > > > >
> > > >
> > >
> >
> https://www.confluent.io/blog?utm_source=footer&utm_medium=email&utm_campaign=ch.email-signature_type.community_content.blog
> > > > > > > > > > > > >[image:
> > > > > > > > > > > > Twitter] <https://twitter.com/ConfluentInc>[image:
> > > > LinkedIn]
> > > > > > > > > > > > <https://www.linkedin.com/company/confluent/>[image:
> > > > Slack]
> > > > > > > > > > > > <https://slackpass.io/confluentcommunity>[image:
> > > YouTube]
> > > > > > > > > > > > <https://youtube.com/confluent>
> > > > > > > > > > > > [image: Kafka Summit] <https://www.kafka-summit.org/
> >
> > > > > > > > > > > >
> > > > > > > > > > > >
> > > > > > > > > > > > On Thu, Jun 24, 2021 at 12:37 AM Anjali Sharma <
> > > > > > > > > > > > sharma.anjali.2...@gmail.com>
> > > > > > > > > > > > wrote:
> > > > > > > > > > > >
> > > > > > > > > > > > > Hi All,
> > > > > > > > > > > > >
> > > > > > > > > > > > > While trying for mtls ssl.client.aut=required, From
> > > > Client
> > > > > > side
> > > > > > > > we
> > > > > > > > > > are
> > > > > > > > > > > > > seeing some junk certificates which we have not
> > > imported
> > > > on
> > > > > > the
> > > > > > > > > > client
> > > > > > > > > > > > > side?
> > > > > > > > > > > > >
> > > > > > > > > > > > > Please help with this?
> > > > > > > > > > > > >
> > > > > > > > > > > > > Thanks & Regards
> > > > > > > > > > > > >
> > > > > > > > > > > > > Anjali
> > > > > > > > > > > > >
> > > > > > > > > > > >
> > > > > > > > > > >
> > > > > > > > > >
> > > > > > > > >
> > > > > > > >
> > > > > > >
> > > > > >
> > > > >
> > > >
> > >
> >
>

Reply via email to