-
Bug
-
Resolution: Done
-
Major
-
RHDG 8.1 CR1, RHDG 8.2.1 GA
-
False
-
False
-
-
-
-
-
-
-
-
-
With 8.2 Update #1 the wildfly openssl library is upgraded from 1.0.12 to 2.1.3 to support TLSv1.3.
After this the clients are not longer able to connect if the endpoint is configured with SSL encryption.
WARN [io.netty.channel.Defa ultChannelPipeline] An exceptionCaught() event was fired, and it reached at the tail of the pipeline. It usually means the last handler in the pipeline did not handle the exception.
io.netty.handler.codec.DecoderException: java.lang.Illegal StateException: ssl is null
As a result the user log shows the following:
Caused by: javax.net.ssl.SSLHandshakeException: Remote host closed connection during handshake
at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:992)
at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1375)
at sun.security.ssl.SSLSocketImpl.writeRecord(SSLSocketImpl.java:747)
at sun.security.ssl.AppOutputStream.write(AppOutputStream.java:123)
at java.io.BufferedOutputStream.flushBuffer(BufferedOutputStream.java:82)
at java.io.BufferedOutputStream.flush(BufferedOutputStream.java:140)
at org.infinispan.client.hotrod.impl.transport.tcp.TcpTransport.flush(TcpTransport.java:203)
... 72 more
Caused by: java.io.EOFException: SSL peer shut down incorrectly
at sun.security.ssl.InputRecord.read(InputRecord.java:505)
at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:973)
... 78 more
- is related to
-
JDG-4709 SSLHandshakeException: Received fatal alert: bad_certificate
- Closed
- links to