Hello Oana,
Thanks for yuur answer
please find below some more test.
The container is listening port 2300
Here is ss command execute from inside container:
bash-5.1# ss -tlpn
State Recv-Q Send-Q Local Address:Port Peer Address:Port Process
LISTEN 0 50 *:2300 *:* users:(("java",pid=34,fd=23))
bash-5.1# ps -f -p 34
UID PID PPID C STIME TTY TIME CMD
root 34 1 0 14:12 ? 00:00:11 java -Xrs -Xmx1024M -jar ./ucxjoss.jar
The agent (process pid =34) is listening port 2300
Here is a check of port from outside of container
openssl s_client -connect localhost:2300 -showcerts
CONNECTED(00000003)
Can't use SSL_get_servername
depth=1 CN = AE Agent Certificate
verify error:num=19:self signed certificate in certificate chain
verify return:1
depth=1 CN = AE Agent Certificate
verify return:1
depth=0 C = US, OU = AE_LNX, CN = LINUX-1
verify return:1
139701829392192:error:14094412:SSL routines:ssl3_read_bytes:sslv3 alert bad certificate:ssl/record/rec_layer_s3.c:1544:SSL alert number 42
---
Certificate chain
0 s:C = US, OU = AE_LNX, CN = LINUX-1
i:CN = AE Agent Certificate
-----BEGIN CERTIFICATE-----
suppressed part
-----END CERTIFICATE-----
---
Server certificate
subject=C = US, OU = AE_LNX, CN = LINUX-1
issuer=CN = AE Agent Certificate
---
Acceptable client certificate CA names
CN = AE Agent Certificate
Client Certificate Types: ECDSA sign, RSA sign, DSA sign
Requested Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:DSA+SHA256:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:ECDSA+SHA1:RSA+SHA1:DSA+SHA1
Shared Requested Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:ECDSA+SHA1:RSA+SHA1
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 3318 bytes and written 394 bytes
Verification error: self signed certificate in certificate chain
---
New, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384
Server public key is 4096 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-RSA-AES256-GCM-SHA384
Session-ID: AE140F208013EEC45F880404E83A9E5076958E06AA67DD73A17E94ECACA79B1E
Session-ID-ctx:
Master-Key: 538A08C23EF32D56C0DE81B1D04B088F265E7E251B6169867892C56777A1B9508AEF8BC7F58109A77D7EEE47DFBA67EB
PSK identity: None
PSK identity hint: None
SRP username: None
Start Time: 1739803330
Timeout : 7200 (sec)
Verify return code: 19 (self signed certificate in certificate chain)
Extended master secret: yes
---
So agent communicate ok on port 2300. It uses self signed certificat,so we have an openssl return code 19. But it not a problem.
So it seems commication is ok on port 2300.
Any idea ?