Automic Workload Automation

 View Only
  • 1.  Communication error with partner '*SERVER', error: 'TLS-handshake/337047686(certificate verify failed (SSL routines, tls_process_server_certificate))'.

    Posted Jun 20, 2023 08:36 AM
      |   view attached
    The AAKE version we are using is 21.0.5+hf4, and we are attempting to connect a new agent from the backend.
     
    We configured the.ini file and added the jcp certificate to the trusted certs folder on the agent server.
     
    But we are encountering the following error:
    20230617/205841.952 - U02000072 Connection to system 'AUTOMIC' initiated.
    20230617/205841.952 - U02000379 Initiating connection to server 'AUTOMIC' using WebSocket URI: 'aake-ws-dev.****:8443/agent'.
    20230617/205841.988 - U02000377 Certificate loaded from file '/etc/pki/tls/certs/ca-bundle.crt'.
    20230617/205841.989 - U02000378 Loading certificates from directory: '/data/automic/aeinstall-V21/agent/bin/certs'.
    20230617/205841.989 - U02000377 Certificate loaded from file '/data/automic/aeinstall-V21/agent/bin/certs/aake.R5644.pem'.
    20230617/205841.989 - U02000398 Loading certificates from the directory './security' that is specified in the parameter'AgentSecurityFolder'.\
    20230617/205841.989 - U02000376 Could not parse certificate './security/AE01-AAKE.pem'. Please make sure that the certificate is in PEM format.
    20230617/205841.992 - U02000313 Communication error with partner '*SERVER', error: 'TLS-handshake/337047686(certificate verify failed (SSL routines, tls_process_server_certificate))'.
    20230617/205841.993 - U02000010 Connection to Server 'AUTOMIC/*******:8443' terminated.
    20230617/205841.993 - U02000074 Connecting to system 'AUTOMIC' is not possible.
    Attached full log to the thread

    Attachment(s)

    txt
    Log.txt   54 KB 1 version


  • 2.  RE: Communication error with partner '*SERVER', error: 'TLS-handshake/337047686(certificate verify failed (SSL routines, tls_process_server_certificate))'.

    Posted Mar 13, 2024 07:18 AM

    What was the solution to resolve this?




  • 3.  RE: Communication error with partner '*SERVER', error: 'TLS-handshake/337047686(certificate verify failed (SSL routines, tls_process_server_certificate))'.

    Posted Mar 20, 2024 11:11 AM

    Hi SWASTIKA SHET, Lavine Appollis,

    this is a certification problem. Make the TLS handshake manually with command
     openssl s_client -connect <Your-AutomationEngine-Server.de:8443
    The command will return some information. 
    I would not advice to distibute the cert on every agent. You only need to get a cert from your root CA then store the root CA cert or the intermediate cert on every system, and certification problems are solved. 

    With the solution you choose you will run into cert hell, because the day will come, the cert ist becoming invalid. So you have to change on every system you use it. The Root CA's or intermediate cert's are handled by your CA and implemented by your system admins. 

    Hope that helps

    Best Regards

    Andrzej Golaszewski




  • 4.  RE: Communication error with partner '*SERVER', error: 'TLS-handshake/337047686(certificate verify failed (SSL routines, tls_process_server_certificate))'.

    Posted Mar 25, 2024 05:40 AM
    Hi,

    Thanks for the feedback.

    Just a question to what you mentioned.

    "I would not advice to distribute the cert on every agent. You only need to get a cert from your root CA then store the root CA cert or the intermediate cert on every system, and certification problems are solved. "

    We are currently distributing the cert on every agent. Where in the ini file would we store the root CA certificate? Can you please explain this step, because our CA cert expires in 2 years and we would like to resolve this before then.

    Regards,


    [cid:ed6887fd-4478-4530-964b-c44cedb3d6cc]


    Disclaimer

    Please note: This e-mail and its contents are subject to a disclaimer which can be viewed at http://www.woolworths.co.za/disclaimer. This Disclaimer forms part of the content of this email in terms of section 11 of the Electronic Communications and Transactions Act, 25 of 2002. Should you be unable to access the link please e-mail disclaimer@woolworths.co.za and a copy of the disclaimer will be e-mailed to you. NOTICE: If received in error, please destroy and notify sender. Sender does not intend to waive confidentiality or privilege. Use of this email is prohibited when received in error.




  • 5.  RE: Communication error with partner '*SERVER', error: 'TLS-handshake/337047686(certificate verify failed (SSL routines, tls_process_server_certificate))'.

    Posted Mar 25, 2024 07:47 AM

    Hello Lavine Appollis,

    1. To understand it, just a little excursion how certificates work. I give only a rough outline of the topic to understand the background.
      I If you connect via webbrowser to a webserver, your browser checks the certificate. And how did this work.

      1. The client ( browser ) request server for identification
      2. Your web browser downloads the web server's certificate, which contains the public key of the web server. This certificate is signed with the private key of a trusted certificate authority
      3. Your web browser comes installed with the public keys of all of the major certificate authorities. It uses this public key to verify that the web server's certificate was indeed signed by the trusted certificate authority.

      4. The certificate contains the domain name and/or ip address of the web server. Your web browser confirms with the certificate authority that the address listed in the certificate is the one to which it has an open connection.

      5. Browser and server calculate a shared symmetric key which is used for the actual data encryption. Since the server identity is verified the client can be sure, that this "key exchange" is done with the right server and not some man in the middle attacker.
    2. How did this help. Well the Connection with Automation Engine Server works the same way. 
      1. You create an CSR (Certificate Signing Request) at your local CA. To be felxible enough you should use Multi-Domain-Cert (SAN) to use aliases DNS for your server.
      2. Mostly You will get a bunch of files, the certificate for the AE server itself and public keys, intermediate cert, cert chain...
        As described in the manual build your own keystore for ae, and start your ae processes with this keystore. 
      3. Your system administrator must deploy the root and intermediate cert's on every machine. The standard path for cert's is systemdependend, have a look in the manual: Parameters - Agents, Java Components, Proxy and TLS Gateway
      4. Before you start your ae processes, load the Intermediate cert and into the java truststore you use starting automic processes. 
      5. Well that's the magic. Every client (Agent) connecting to your AE server must have the Intermediate certificate. Validating can be donn with openssl 

        openssl s_client -connect <AutomationEngineServer.yourdomain:8443

      6. If everything  was fine you will get an positive answer for your TLS Handshake request.

    3. As an automic administrator you only need server certificates for your ae servers, create a keystorefile as described in the manual and load the certificate of the intermediate CA into the Java truststore. 

    At the first start of your agent, the agent connect's to the AE Server and they handle out a cert for their communication. The cert folder is defined in the ini file, and the cert  file ist stored automatically. 

    Hope that explains a little bit the method. An advice from my own experiences. Build it in a test environment and play around with it. It cost me some hours and much more trial and error to understand the whole process. 

    Hope that helps, best regards

    Andrzej Golaszewski




  • 6.  RE: Communication error with partner '*SERVER', error: 'TLS-handshake/337047686(certificate verify failed (SSL routines, tls_process_server_certificate))'.

    Posted Mar 25, 2024 08:05 AM

    In Addition to the manual 2 useful links:

    1. Broadcom Academy
    2. Creating_and_Using_TLS/SSL_Signed_by_a_Public_CA_for_use_with_Automic_Automation_v21.pdf

    Best regards

    Andrzej Golaszewski