- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
SSLHandshakeException on RSA IG&L 7.1.1
Hello,
I'm trying to configure the Generic REST Connector on RSA IG&L 7.1.1 to implement a provisioning to Wallix endpoint.
When I run the test suite for the "login" capability, I get the error below.
Do you know how to solve this problem?
Thank you in advance for your help.
Parameter Name | Value |
---|
javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
Cause:
Stack Trace:
org.mule.transport.http.HttpClientMessageDispatcher.execute(HttpClientMessageDispatcher.java:151)
org.mule.transport.http.HttpClientMessageDispatcher.doSend(HttpClientMessageDispatcher.java:279)
org.mule.transport.AbstractMessageDispatcher.process(AbstractMessageDispatcher.java:84)
org.mule.transport.AbstractConnector$DispatcherMessageProcessor.process(AbstractConnector.java:2637)
org.mule.execution.ExceptionToMessagingExceptionExecutionInterceptor.execute(ExceptionToMessagingExceptionExecutionInterceptor.java:24)
org.mule.execution.MessageProcessorNotificationExecutionInterceptor.execute(MessageProcessorNotificationExecutionInterceptor.java:58)
org.mule.execution.MessageProcessorExecutionTemplate.execute(MessageProcessorExecutionTemplate.java:44)
org.mule.processor.chain.SimpleMessageProcessorChain.doProcess(SimpleMessageProcessorChain.java:43)
org.mule.processor.chain.AbstractMessageProcessorChain.process(AbstractMessageProcessorChain.java:67)
org.mule.execution.ExceptionToMessagingExceptionExecutionInterceptor.execute(ExceptionToMessagingExceptionExecutionInterceptor.java:24)
org.mule.execution.MessageProcessorExecutionTemplate.execute(MessageProcessorExecutionTemplate.java:44)
org.mule.processor.AbstractInterceptingMessageProcessorBase.processNext(AbstractInterceptingMessageProcessorBase.java:102)
org.mule.endpoint.outbound.OutboundResponsePropertiesMessageProcessor.process(OutboundResponsePropertiesMessageProcessor.java:35)
org.mule.execution.ExceptionToMessagingExceptionExecutionInterceptor.execute(ExceptionToMessagingExceptionExecutionInterceptor.java:24)
org.mule.execution.MessageProcessorNotificationExecutionInterceptor.execute(MessageProcessorNotificationExecutionInterceptor.java:58)
org.mule.execution.MessageProcessorExecutionTemplate.execute(MessageProcessorExecutionTemplate.java:44)
org.mule.processor.chain.SimpleMessageProcessorChain.doProcess(SimpleMessageProcessorChain.java:43)
org.mule.processor.chain.AbstractMessageProcessorChain.process(AbstractMessageProcessorChain.java:67)
org.mule.execution.ExceptionToMessagingExceptionExecutionInterceptor.execute(ExceptionToMessagingExceptionExecutionInterceptor.java:24)
org.mule.execution.MessageProcessorExecutionTemplate.execute(MessageProcessorExecutionTemplate.java:44)
org.mule.processor.AbstractInterceptingMessageProcessorBase.processNext(AbstractInterceptingMessageProcessorBase.java:102)
org.mule.processor.EndpointTransactionalInterceptingMessageProcessor$1.process(EndpointTransactionalInterceptingMessageProcessor.java:46)
org.mule.processor.EndpointTransactionalInterceptingMessageProcessor$1.process(EndpointTransactionalInterceptingMessageProcessor.java:43)
org.mule.execution.ExecuteCallbackInterceptor.execute(ExecuteCallbackInterceptor.java:16)
org.mule.execution.BeginAndResolveTransactionInterceptor.execute(BeginAndResolveTransactionInterceptor.java:54)
org.mule.execution.ResolvePreviousTransactionInterceptor.execute(ResolvePreviousTransactionInterceptor.java:44)
org.mule.execution.SuspendXaTransactionInterceptor.execute(SuspendXaTransactionInterceptor.java:50)
org.mule.execution.ValidateTransactionalStateInterceptor.execute(ValidateTransactionalStateInterceptor.java:40)
org.mule.execution.IsolateCurrentTransactionInterceptor.execute(IsolateCurrentTransactionInterceptor.java:41)
org.mule.execution.ExternalTransactionInterceptor.execute(ExternalTransactionInterceptor.java:48)
org.mule.execution.TransactionalExecutionTemplate.execute(TransactionalExecutionTemplate.java:65)
org.mule.processor.EndpointTransactionalInterceptingMessageProcessor.process(EndpointTransactionalInterceptingMessageProcessor.java:52)
org.mule.execution.ExceptionToMessagingExceptionExecutionInterceptor.execute(ExceptionToMessagingExceptionExecutionInterceptor.java:24)
org.mule.execution.MessageProcessorNotificationExecutionInterceptor.execute(MessageProcessorNotificationExecutionInterceptor.ja...
- Tags:
- Community Thread
- Discussion
- Forum Thread
- Identity G&L
- Identity Governance & Lifecycle
- IG&L
- IGL
- RSA Identity
- RSA Identity G&L
- RSA Identity Governance & Lifecycle
- RSA Identity Governance and Lifecycle
- RSA IGL
- sslhandshakeexception on rsa ig&l 7.1.1
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
Hello Ian,
As suggested, I have opened a support case to get some help. We have captured and analyzed SSL negotiation packets with the tcpdump tool.
By comparing with RSA 7.2.0 SSL packets, we noticed that the connection required more secured encryption algorithms, so we updated java jdk version and it solved the problem.
Thank you again.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
This looks like an RSA Identity Governance & Lifecycle question. I will move it one of the RSA Identity & Lifecycle groups so it gets more visibility.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
This is likely an SSL issue similar to the following.
This is an active failure where the endpoint is refusing the connection from IG&L because the java security settings on the server do not adhere to current standards. It is unlikely the endpoint will reduce security to allow this connection so you must increase the security on RSA IG&L.
Likely you are running an older version of Java on this server. Upgrade java according to the method appropriate for the type of appliance you are using.
Note that there are also dependencies between the version of Java that you use and the RSA IG&L version.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
did you import the Wallix certificates to the java truststore that the AFX server is running on?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
Yes I did it but I got the same issue.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
I recommend you get more detail about the actual SSL failure. This can be done in either of two ways.
- Turning on SSL debugging in the JVM using -Djavax.net.debug=ssl (Internal KB article 000033388)
- Capturing a tcpdump packet capture of the SSL negotiation on the REST port.
Both of these are advanced techniques so if you need assistance with gathering or analyzing this information I recommend you open a Support case and quote this discussion.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
Hello Ian,
After I turn on the SSL debugging, which file should I look for to get detailed information?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
Hello Ahmed,
I have added the chain of certificates in the file $JAVA_HOME/jre/lib/security/cacerts.
Is it the right file?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
It depends on the application server, but SSL debug output goes to the aveksaserver.log file on Wildly. Be aware the output will be massive. Do not do this in production or it will bring your system down.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
Hello Ian,
As suggested, I have opened a support case to get some help. We have captured and analyzed SSL negotiation packets with the tcpdump tool.
By comparing with RSA 7.2.0 SSL packets, we noticed that the connection required more secured encryption algorithms, so we updated java jdk version and it solved the problem.
Thank you again.
