TLS handshake error

Hello,
I deployed HF on Kubernetes with ORDERER_GENERAL_TLS_ENABLED and ORDERER_GENERAL_TLS_CLIENTAUTHREQUIRED set to true. Everything works fine, I can create, join the channel, install and invoke chaincode but logs are keep reporting errors:
peer:
2021-09-21 04:56:23.244 UTC [core.comm] ServerHandshake -> ERRO 3592 TLS handshake failed with error EOF server=PeerServer remoteaddress=10.0.1.43:39723
2021-09-21 04:56:23.730 UTC [core.comm] ServerHandshake -> ERRO 3593 TLS handshake failed with error EOF server=PeerServer remoteaddress=10.0.3.79:16171
2021-09-21 04:56:33.245 UTC [core.comm] ServerHandshake -> ERRO 3594 TLS handshake failed with error EOF server=PeerServer remoteaddress=10.0.1.43:53561
2021-09-21 04:56:33.730 UTC [core.comm] ServerHandshake -> ERRO 3595 TLS handshake failed with error EOF server=PeerServer remoteaddress=10.0.3.79:23402
2021-09-21 04:56:43.245 UTC [core.comm] ServerHandshake -> ERRO 3596 TLS handshake failed with error EOF server=PeerServer remoteaddress=10.0.1.43:31386
2021-09-21 04:56:43.730 UTC [core.comm] ServerHandshake -> ERRO 3597 TLS handshake failed with error EOF server=PeerServer remoteaddress=10.0.3.79:56648
2021-09-21 04:56:53.244 UTC [core.comm] ServerHandshake -> ERRO 3598 TLS handshake failed with error EOF server=PeerServer remoteaddress=10.0.1.43:24813
2021-09-21 04:56:53.730 UTC [core.comm] ServerHandshake -> ERRO 3599 TLS handshake failed with error EOF server=PeerServer remoteaddress=10.0.3.79:16606
ordered:
2021-09-21 04:57:23.444 UTC [core.comm] ServerHandshake -> ERRO 358a TLS handshake failed with error EOF server=Orderer remoteaddress=10.0.3.79:16379
2021-09-21 04:57:26.715 UTC [core.comm] ServerHandshake -> ERRO 358b TLS handshake failed with error EOF server=Orderer remoteaddress=10.0.1.43:3286
2021-09-21 04:57:33.444 UTC [core.comm] ServerHandshake -> ERRO 358c TLS handshake failed with error EOF server=Orderer remoteaddress=10.0.3.79:53327
2021-09-21 04:57:36.715 UTC [core.comm] ServerHandshake -> ERRO 358d TLS handshake failed with error EOF server=Orderer remoteaddress=10.0.1.43:20585
2021-09-21 04:57:43.444 UTC [core.comm] ServerHandshake -> ERRO 358e TLS handshake failed with error EOF server=Orderer remoteaddress=10.0.3.79:39147
2021-09-21 04:57:46.714 UTC [core.comm] ServerHandshake -> ERRO 358f TLS handshake failed with error EOF server=Orderer remoteaddress=10.0.1.43:9662
2021-09-21 04:57:53.445 UTC [core.comm] ServerHandshake -> ERRO 3590 TLS handshake failed with error EOF server=Orderer remoteaddress=10.0.3.79:18608
2021-09-21 04:57:56.714 UTC [core.comm] ServerHandshake -> ERRO 3591 TLS handshake failed with error EOF server=Orderer remoteaddress=10.0.1.43:63920
ca:
2021/09/21 04:58:02 http: TLS handshake error from 10.0.1.43:34865: EOF
2021/09/21 04:58:08 http: TLS handshake error from 10.0.3.79:26766: EOF
2021/09/21 04:58:12 http: TLS handshake error from 10.0.1.43:54927: EOF
2021/09/21 04:58:18 http: TLS handshake error from 10.0.3.79:7199: EOF
2021/09/21 04:58:22 http: TLS handshake error from 10.0.1.43:38316: EOF
2021/09/21 04:58:28 http: TLS handshake error from 10.0.3.79:49130: EOF
2021/09/21 04:58:32 http: TLS handshake error from 10.0.1.43:56355: EOF
I have set fully qualified domain names in env vars like:
- name: ORDERER_HOST value: orderer-1.mydomain.com
and in configtx.yaml:
OrdererEndpoints: - orderer-1.mydomain.com:7050 - orderer-2.mydomain.com:7050 - orderer-3.mydomain.com:7050
...
AnchorPeers: # AnchorPeers defines the location of peers which can be used # for cross org gossip communication. Note, this value is only # encoded in the genesis block in the Application section context - Host: peer-1.mydomain.com Port: 7051 - Host: peer-2.mydomain.com Port: 7051 - Host: peer-3.mydomain.com Port: 7051
Certificates are generated as:
fabric-ca-client enroll -u https://ca-admin:[email protected]:7054 --caname ca-mydomain.mydomain.com --tls.certfiles /var/fabric/ca/home/tls-cert.pem
fabric-ca-client register -u https://ca-admin:[email protected]:7054 --caname ca-mydomain.mydomain.com --id.name orderer-1 --id.secret $PASSWORD --id.affiliation mydomain --id.type orderer --tls.certfiles /var/fabric/ca/home/tls-cert.pem
fabric-ca-client register -u https://ca-admin:[email protected]:7054 --caname ca-mydomain.mydomain.com --id.name peer-1 --id.secret $PASSWORD --id.affiliation mydomain --id.type peer --tls.certfiles /var/fabric/ca/home/tls-cert.pem
Service discovery looks good:
# discover --configFile discovery-conf.yaml config --channel mydomainchannel --server peer-1.mydomain.com:7051
{
"msps": {
"OrdererMSP": {
"name": "OrdererMSP",
"root_certs": [
"XXXXXXXXXXXX="
],
"crypto_config": {
"signature_hash_family": "SHA2",
"identity_identifier_hash_function": "SHA256"
},
"tls_root_certs": [
"XXXXXXXXXXXX="
],
"fabric_node_ous": {
"enable": true,
"client_ou_identifier": {
"certificate": "XXXXXXXXXXXX=",
"organizational_unit_identifier": "client"
},
"peer_ou_identifier": {
"certificate": "XXXXXXXXXXXX=",
"organizational_unit_identifier": "peer"
},
"admin_ou_identifier": {
"certificate": "XXXXXXXXXXXX=",
"organizational_unit_identifier": "admin"
},
"orderer_ou_identifier": {
"certificate": "XXXXXXXXXXXX=",
"organizational_unit_identifier": "orderer"
}
}
},
"mydomainMSP": {
"name": "mydomainMSP",
"root_certs": [
"XXXXXXXXXXXX="
],
"crypto_config": {
"signature_hash_family": "SHA2",
"identity_identifier_hash_function": "SHA256"
},
"tls_root_certs": [
"XXXXXXXXXXXX="
],
"fabric_node_ous": {
"enable": true,
"client_ou_identifier": {
"certificate": "XXXXXXXXXXXX=",
"organizational_unit_identifier": "client"
},
"peer_ou_identifier": {
"certificate": "XXXXXXXXXXXX=",
"organizational_unit_identifier": "peer"
},
"admin_ou_identifier": {
"certificate": "XXXXXXXXXXXX=",
"organizational_unit_identifier": "admin"
},
"orderer_ou_identifier": {
"certificate": "XXXXXXXXXXXX=",
"organizational_unit_identifier": "orderer"
}
}
}
},
"orderers": {
"OrdererMSP": {
"endpoint": [
{
"host": "orderer-1.mydomain.com",
"port": 7050
},
{
"host": "orderer-2.mydomain.com",
"port": 7050
},
{
"host": "orderer-3.mydomain.com",
"port": 7050
}
]
}
}
}
How to get rid of these errors?
IPs 10.0.3.79, 10.0.1.43 are not defined anywhere, they are not pods' ips, ports are random.
Comments
-
nrostkowski,
Hello, Let's see if we can get to the bottom of this. The lab that supports the course calls for an installation with Docker. I did some research and this problem is generally caused by a bad tls certificate or a bad connection profile. Here is a link that might help you.
The Hyperledger Fabric community offers support and encourages folks to get involved, here are some links to get started as an Hyperledger Community member.
Join Mailing List here:
https://lists.hyperledger.org/g/fabricOr if you have a direct question just email the group here:
[email protected]If you want the current documentation and Working Group efforts please explore the public Wiki page found here:
https://wiki.hyperledger.org/display/fabric.Let us know if this helps, Bobbi
0
Categories
- 8.9K All Categories
- 13 LFX Mentorship
- 66 LFX Mentorship: Linux Kernel
- 364 Linux Foundation Boot Camps
- 231 Cloud Engineer Boot Camp
- 70 Advanced Cloud Engineer Boot Camp
- 25 DevOps Engineer Boot Camp
- 5 Cloud Native Developer Boot Camp
- 852 Training Courses
- 15 LFC110 Class Forum
- 16 LFD102 Class Forum
- 102 LFD103 Class Forum
- 3 LFD121 Class Forum
- 55 LFD201 Class Forum
- 1 LFD213 Class Forum - Discontinued
- 128 LFD232 Class Forum
- 19 LFD254 Class Forum
- 431 LFD259 Class Forum
- 86 LFD272 Class Forum
- 1 LFD272-JP クラス フォーラム
- 16 LFS200 Class Forum
- 694 LFS201 Class Forum
- LFS201-JP クラス フォーラム
- 271 LFS211 Class Forum
- 50 LFS216 Class Forum
- 26 LFS241 Class Forum
- 27 LFS242 Class Forum
- 19 LFS243 Class Forum
- 6 LFS244 Class Forum
- 9 LFS250 Class Forum
- LFS250-JP クラス フォーラム
- 108 LFS253 Class Forum
- 791 LFS258 Class Forum
- 7 LFS258-JP クラス フォーラム
- 51 LFS260 Class Forum
- 79 LFS261 Class Forum
- 13 LFS262 Class Forum
- 76 LFS263 Class Forum
- 14 LFS264 Class Forum
- 10 LFS266 Class Forum
- 8 LFS267 Class Forum
- 9 LFS268 Class Forum
- 6 LFS269 Class Forum
- 180 LFS272 Class Forum
- 1 LFS272-JP クラス フォーラム
- 187 LFW211 Class Forum
- 103 LFW212 Class Forum
- 878 Hardware
- 207 Drivers
- 74 I/O Devices
- 43 Monitors
- 115 Multimedia
- 204 Networking
- 98 Printers & Scanners
- 82 Storage
- 724 Linux Distributions
- 82 Debian
- 64 Fedora
- 12 Linux Mint
- 13 Mageia
- 22 openSUSE
- 126 Red Hat Enterprise
- 33 Slackware
- 13 SUSE Enterprise
- 347 Ubuntu
- 447 Linux System Administration
- 33 Cloud Computing
- 64 Command Line/Scripting
- Github systems admin projects
- 89 Linux Security
- 73 Network Management
- 105 System Management
- 45 Web Management
- 50 Mobile Computing
- 18 Android
- 19 Development
- 1.2K New to Linux
- 1.1K Getting Started with Linux
- 499 Off Topic
- 119 Introductions
- 193 Small Talk
- 19 Study Material
- 748 Programming and Development
- 240 Kernel Development
- 474 Software Development
- 902 Software
- 247 Applications
- 178 Command Line
- 2 Compiling/Installing
- 72 Games
- 314 Installation
- 20 All In Program
- 20 All In Forum
Upcoming Training
-
August 20, 2018
Kubernetes Administration (LFS458)
-
August 20, 2018
Linux System Administration (LFS301)
-
August 27, 2018
Open Source Virtualization (LFS462)
-
August 27, 2018
Linux Kernel Debugging and Security (LFD440)