General OpenSslEngine problem at remote address
See original GitHub issueIssue Type:
- Bug report
- Feature request
What happened:
Upgrading to Linkerd 1.4.0
with the same client/server configuration causes the following error:
General OpenSslEngine problem at remote address: /10.16.0.94:4141. Remote Info: Not Available
What you expected to happen:
I expected Linkerd 1.4.0
to continue working with the same configuration.
HTTP server config example:
servers:
- port: 4140
ip: 0.0.0.0
client:
tls:
commonName: "star.domain.inc.com"
HTTP client config example:
servers:
- port: 4141
ip: 0.0.0.0
tls:
certPath: /certs/wildcard-proxycert
keyPath: /certs/wildcard-proxykey
How to reproduce it (as minimally and precisely as possible):
- Run Linkerd
1.3.6
- Configure it with the client and server TLS as mentioned above.
- Update Linkerd to
1.4.0
(this was tested using thelinkerd-zipkin
build running in Kubernetes). - Send a request to the outgoing proxy and the error above is returned.
Anything else we need to know?:
This issue happened to both HTTP and HTTP/2 requests after the update to 1.4.0
.
Environment:
- linkerd/namerd version, config files: Linkerd
1.4.0
, Namerd1.3.6
, HTTP config example as follows:
- protocol: http
label: out-http
identifier:
kind: io.l5d.path
segments: 2
consume: false
interpreter:
kind: io.l5d.mesh
root: /out-http
dst: /$/inet/<namerd_dns>/4321
servers:
- port: 4140
ip: 0.0.0.0
client:
tls:
commonName: "star.domain.inc.com"
- protocol: http
label: in-http
identifier:
kind: io.l5d.path
segments: 2
consume: true
interpreter:
kind: io.l5d.mesh
root: /in-http
dst: /$/inet/<namerd_dns>/4321
servers:
- port: 4141
ip: 0.0.0.0
tls:
certPath: /certs/wildcard-proxycert
keyPath: /certs/wildcard-proxykey
- Platform, version, and config files (Kubernetes, DC/OS, etc): Kubernetes
1.10.2
- Cloud provider or hardware configuration: Google Cloud Platform
Issue Analytics
- State:
- Created 5 years ago
- Comments:25 (25 by maintainers)
Top Results From Across the Web
twitter/finagle - Gitter
hmmm... no... servername should be set correctly: General OpenSslEngine problem at remote address: buoyant.io/35.185.237.115:443. Remote Info: Not Available.
Read more >Openssl problem while using trust certs - Kubernetes - Linkerd
Openssl problem while using trust certs ... General OpenSslEngine problem at remote address: www.google.com/74.xxx.xx.103:443.
Read more >Using client certificates with twitter finagle - Stack Overflow
twitter.finagle.ChannelWriteException, with message: com.twitter.finagle.SslHandshakeException: General SSLEngine problem at remote address:.
Read more >Problem with trusted certificates - Google Groups
Hi,. previously we were struggling with the netty-tcnative library. That seems to be working now, pushy passes connect() successfully. The initialization is as ......
Read more >Exception when using keystore file - Couchbase Forums
SSLHandshakeException: General OpenSslEngine problem, ... something? in the exception I see that the remote address contains a concatenation ...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
Well, I can’t break it anymore on
1.4.4
:cross-cluster routing with both Linkerds on
1.4.4
so I think we can call this fixed! On to Linkerd 1.4+!
This comment: https://github.com/twitter/finagle/pull/678#issuecomment-405775436 suggests that the Netty upgrade may happen in the next Finagle release.