TLS handshake error
Hello,
I deployed HF on Kubernetes with ORDERER_GENERAL_TLS_ENABLED and ORDERER_GENERAL_TLS_CLIENTAUTHREQUIRED set to true. Everything works fine, I can create, join the channel, install and invoke chaincode but logs are keep reporting errors:
peer:
2021-09-21 04:56:23.244 UTC [core.comm] ServerHandshake -> ERRO 3592 TLS handshake failed with error EOF server=PeerServer remoteaddress=10.0.1.43:39723
2021-09-21 04:56:23.730 UTC [core.comm] ServerHandshake -> ERRO 3593 TLS handshake failed with error EOF server=PeerServer remoteaddress=10.0.3.79:16171
2021-09-21 04:56:33.245 UTC [core.comm] ServerHandshake -> ERRO 3594 TLS handshake failed with error EOF server=PeerServer remoteaddress=10.0.1.43:53561
2021-09-21 04:56:33.730 UTC [core.comm] ServerHandshake -> ERRO 3595 TLS handshake failed with error EOF server=PeerServer remoteaddress=10.0.3.79:23402
2021-09-21 04:56:43.245 UTC [core.comm] ServerHandshake -> ERRO 3596 TLS handshake failed with error EOF server=PeerServer remoteaddress=10.0.1.43:31386
2021-09-21 04:56:43.730 UTC [core.comm] ServerHandshake -> ERRO 3597 TLS handshake failed with error EOF server=PeerServer remoteaddress=10.0.3.79:56648
2021-09-21 04:56:53.244 UTC [core.comm] ServerHandshake -> ERRO 3598 TLS handshake failed with error EOF server=PeerServer remoteaddress=10.0.1.43:24813
2021-09-21 04:56:53.730 UTC [core.comm] ServerHandshake -> ERRO 3599 TLS handshake failed with error EOF server=PeerServer remoteaddress=10.0.3.79:16606
ordered:
2021-09-21 04:57:23.444 UTC [core.comm] ServerHandshake -> ERRO 358a TLS handshake failed with error EOF server=Orderer remoteaddress=10.0.3.79:16379
2021-09-21 04:57:26.715 UTC [core.comm] ServerHandshake -> ERRO 358b TLS handshake failed with error EOF server=Orderer remoteaddress=10.0.1.43:3286
2021-09-21 04:57:33.444 UTC [core.comm] ServerHandshake -> ERRO 358c TLS handshake failed with error EOF server=Orderer remoteaddress=10.0.3.79:53327
2021-09-21 04:57:36.715 UTC [core.comm] ServerHandshake -> ERRO 358d TLS handshake failed with error EOF server=Orderer remoteaddress=10.0.1.43:20585
2021-09-21 04:57:43.444 UTC [core.comm] ServerHandshake -> ERRO 358e TLS handshake failed with error EOF server=Orderer remoteaddress=10.0.3.79:39147
2021-09-21 04:57:46.714 UTC [core.comm] ServerHandshake -> ERRO 358f TLS handshake failed with error EOF server=Orderer remoteaddress=10.0.1.43:9662
2021-09-21 04:57:53.445 UTC [core.comm] ServerHandshake -> ERRO 3590 TLS handshake failed with error EOF server=Orderer remoteaddress=10.0.3.79:18608
2021-09-21 04:57:56.714 UTC [core.comm] ServerHandshake -> ERRO 3591 TLS handshake failed with error EOF server=Orderer remoteaddress=10.0.1.43:63920
ca:
2021/09/21 04:58:02 http: TLS handshake error from 10.0.1.43:34865: EOF
2021/09/21 04:58:08 http: TLS handshake error from 10.0.3.79:26766: EOF
2021/09/21 04:58:12 http: TLS handshake error from 10.0.1.43:54927: EOF
2021/09/21 04:58:18 http: TLS handshake error from 10.0.3.79:7199: EOF
2021/09/21 04:58:22 http: TLS handshake error from 10.0.1.43:38316: EOF
2021/09/21 04:58:28 http: TLS handshake error from 10.0.3.79:49130: EOF
2021/09/21 04:58:32 http: TLS handshake error from 10.0.1.43:56355: EOF
I have set fully qualified domain names in env vars like:
- name: ORDERER_HOST value: orderer-1.mydomain.com
and in configtx.yaml:
OrdererEndpoints: - orderer-1.mydomain.com:7050 - orderer-2.mydomain.com:7050 - orderer-3.mydomain.com:7050
...
AnchorPeers: # AnchorPeers defines the location of peers which can be used # for cross org gossip communication. Note, this value is only # encoded in the genesis block in the Application section context - Host: peer-1.mydomain.com Port: 7051 - Host: peer-2.mydomain.com Port: 7051 - Host: peer-3.mydomain.com Port: 7051
Certificates are generated as:
fabric-ca-client enroll -u https://ca-admin:$PASSWORD@ca-mydomain.mydomain.com:7054 --caname ca-mydomain.mydomain.com --tls.certfiles /var/fabric/ca/home/tls-cert.pem
fabric-ca-client register -u https://ca-admin:$PASSWORD@ca-mydomain.mydomain.com:7054 --caname ca-mydomain.mydomain.com --id.name orderer-1 --id.secret $PASSWORD --id.affiliation mydomain --id.type orderer --tls.certfiles /var/fabric/ca/home/tls-cert.pem
fabric-ca-client register -u https://ca-admin:$PASSWORD@ca-mydomain.mydomain.com:7054 --caname ca-mydomain.mydomain.com --id.name peer-1 --id.secret $PASSWORD --id.affiliation mydomain --id.type peer --tls.certfiles /var/fabric/ca/home/tls-cert.pem
Service discovery looks good:
# discover --configFile discovery-conf.yaml config --channel mydomainchannel --server peer-1.mydomain.com:7051
{
"msps": {
"OrdererMSP": {
"name": "OrdererMSP",
"root_certs": [
"XXXXXXXXXXXX="
],
"crypto_config": {
"signature_hash_family": "SHA2",
"identity_identifier_hash_function": "SHA256"
},
"tls_root_certs": [
"XXXXXXXXXXXX="
],
"fabric_node_ous": {
"enable": true,
"client_ou_identifier": {
"certificate": "XXXXXXXXXXXX=",
"organizational_unit_identifier": "client"
},
"peer_ou_identifier": {
"certificate": "XXXXXXXXXXXX=",
"organizational_unit_identifier": "peer"
},
"admin_ou_identifier": {
"certificate": "XXXXXXXXXXXX=",
"organizational_unit_identifier": "admin"
},
"orderer_ou_identifier": {
"certificate": "XXXXXXXXXXXX=",
"organizational_unit_identifier": "orderer"
}
}
},
"mydomainMSP": {
"name": "mydomainMSP",
"root_certs": [
"XXXXXXXXXXXX="
],
"crypto_config": {
"signature_hash_family": "SHA2",
"identity_identifier_hash_function": "SHA256"
},
"tls_root_certs": [
"XXXXXXXXXXXX="
],
"fabric_node_ous": {
"enable": true,
"client_ou_identifier": {
"certificate": "XXXXXXXXXXXX=",
"organizational_unit_identifier": "client"
},
"peer_ou_identifier": {
"certificate": "XXXXXXXXXXXX=",
"organizational_unit_identifier": "peer"
},
"admin_ou_identifier": {
"certificate": "XXXXXXXXXXXX=",
"organizational_unit_identifier": "admin"
},
"orderer_ou_identifier": {
"certificate": "XXXXXXXXXXXX=",
"organizational_unit_identifier": "orderer"
}
}
}
},
"orderers": {
"OrdererMSP": {
"endpoint": [
{
"host": "orderer-1.mydomain.com",
"port": 7050
},
{
"host": "orderer-2.mydomain.com",
"port": 7050
},
{
"host": "orderer-3.mydomain.com",
"port": 7050
}
]
}
}
}
How to get rid of these errors?
IPs 10.0.3.79, 10.0.1.43 are not defined anywhere, they are not pods' ips, ports are random.
Comments
-
nrostkowski,
Hello, Let's see if we can get to the bottom of this. The lab that supports the course calls for an installation with Docker. I did some research and this problem is generally caused by a bad tls certificate or a bad connection profile. Here is a link that might help you.
The Hyperledger Fabric community offers support and encourages folks to get involved, here are some links to get started as an Hyperledger Community member.
Join Mailing List here:
https://lists.hyperledger.org/g/fabricOr if you have a direct question just email the group here:
fabric@lists.hyperledger.orgIf you want the current documentation and Working Group efforts please explore the public Wiki page found here:
https://wiki.hyperledger.org/display/fabric.Let us know if this helps, Bobbi
0
Categories
- All Categories
- 64 LFX Mentorship
- 117 LFX Mentorship: Linux Kernel
- 618 Linux Foundation IT Professional Programs
- 322 Cloud Engineer IT Professional Program
- 141 Advanced Cloud Engineer IT Professional Program
- 56 DevOps Engineer IT Professional Program
- 67 Cloud Native Developer IT Professional Program
- 6 Express Training Courses
- 6 Express Courses - Discussion Forum
- 2.3K Training Courses
- 19 LFC110 Class Forum - Discontinued
- 9 LFC131 Class Forum
- 31 LFD102 Class Forum
- 178 LFD103 Class Forum
- LFD110 Class Forum
- 24 LFD121 Class Forum
- LFD133 Class Forum
- 2 LFD137 Class Forum
- 62 LFD201 Class Forum
- 2 LFD210 Class Forum
- 1 LFD210-CN Class Forum
- 1 LFD213 Class Forum - Discontinued
- 128 LFD232 Class Forum - Discontinued
- LFD233 Class Forum
- LFD237 Class Forum
- 23 LFD254 Class Forum
- 660 LFD259 Class Forum
- 108 LFD272 Class Forum
- 1 LFD272-JP クラス フォーラム
- 4 LFD273 Class Forum
- LFS101 Class Forum
- LFS116 Class Forum
- 2 LFS145 Class Forum
- LFS151 Class Forum
- LFS158 Class Forum
- LFS167 Class Forum
- 28 LFS200 Class Forum
- 740 LFS201 Class Forum - Discontinued
- 1 LFS201-JP クラス フォーラム
- 13 LFS203 Class Forum
- 98 LFS207 Class Forum
- 301 LFS211 Class Forum
- 54 LFS216 Class Forum
- 47 LFS241 Class Forum
- 41 LFS242 Class Forum
- 38 LFS243 Class Forum
- 12 LFS244 Class Forum
- LFS245 Class Forum
- 41 LFS250 Class Forum
- 1 LFS250-JP クラス フォーラム
- LFS251 Class Forum
- 143 LFS253 Class Forum
- LFS254 Class Forum
- LFS255 Class Forum
- 2 LFS256 Class Forum
- LFS257 Class Forum
- 1.2K LFS258 Class Forum
- 10 LFS258-JP クラス フォーラム
- 109 LFS260 Class Forum
- 147 LFS261 Class Forum
- 39 LFS262 Class Forum
- 83 LFS263 Class Forum - Discontinued
- 15 LFS264 Class Forum - Discontinued
- 11 LFS266 Class Forum - Discontinued
- 21 LFS267 Class Forum
- 18 LFS268 Class Forum
- 26 LFS269 Class Forum
- 204 LFS272 Class Forum
- 1 LFS272-JP クラス フォーラム
- LFS274 Class Forum
- 3 LFS281 Class Forum
- 258 LFW211 Class Forum
- 179 LFW212 Class Forum
- 9 SKF100 Class Forum
- SKF200 Class Forum
- 908 Hardware
- 221 Drivers
- 74 I/O Devices
- 44 Monitors
- 116 Multimedia
- 210 Networking
- 102 Printers & Scanners
- 86 Storage
- 765 Linux Distributions
- 88 Debian
- 66 Fedora
- 15 Linux Mint
- 13 Mageia
- 24 openSUSE
- 144 Red Hat Enterprise
- 33 Slackware
- 13 SUSE Enterprise
- 357 Ubuntu
- 484 Linux System Administration
- 40 Cloud Computing
- 71 Command Line/Scripting
- Github systems admin projects
- 95 Linux Security
- 80 Network Management
- 108 System Management
- 52 Web Management
- 75 Mobile Computing
- 25 Android
- 35 Development
- 1.2K New to Linux
- 1.1K Getting Started with Linux
- 544 Off Topic
- 131 Introductions
- 223 Small Talk
- 22 Study Material
- 836 Programming and Development
- 285 Kernel Development
- 517 Software Development
- 975 Software
- 261 Applications
- 185 Command Line
- 3 Compiling/Installing
- 119 Games
- 318 Installation
- 65 All In Program
- 65 All In Forum
Upcoming Training
-
August 20, 2018
Kubernetes Administration (LFS458)
-
August 20, 2018
Linux System Administration (LFS301)
-
August 27, 2018
Open Source Virtualization (LFS462)
-
August 27, 2018
Linux Kernel Debugging and Security (LFD440)