<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Agent heartbeat failing after enabling Auto-TLS on existing cluster (SSLError: sslv3 alert certificate unknown) in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Agent-heartbeat-failing-after-enabling-Auto-TLS-on-existing/m-p/319344#M227765</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/82722"&gt;@OlliT&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since you added the hosts to the Client Trust Store File, I have the same problem, however in my certificate if the TLS Web Client Authentication, TLS Web Server Authentication options are found&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
    <pubDate>Fri, 25 Jun 2021 14:15:44 GMT</pubDate>
    <dc:creator>sdlfjfldgj</dc:creator>
    <dc:date>2021-06-25T14:15:44Z</dc:date>
    <item>
      <title>Agent heartbeat failing after enabling Auto-TLS on existing cluster (SSLError: sslv3 alert certificate unknown)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Agent-heartbeat-failing-after-enabling-Auto-TLS-on-existing/m-p/305516#M222475</link>
      <description>&lt;P&gt;Hi, I've enabled Auto-TLS as instructed in option 2b (&lt;A href="https://docs.cloudera.com/cdp-private-cloud-base/7.1.4/security-encrypting-data-in-transit/topics/cm-security-use-case-2.html)&amp;nbsp;but" target="_blank" rel="noopener"&gt;https://docs.cloudera.com/cdp-private-cloud-base/7.1.4/security-encrypting-data-in-transit/topics/cm-security-use-case-2.html)&amp;nbsp;but&lt;/A&gt; my agents are reporting heartbeat failed in /var/log/cloudera-scm-agent/cloudera-scm-agent.log.&amp;nbsp;Agent at master does not have problems with it's heartbeat. The environment is CDP 7.1.4 with CDP 7.1.3 parcels.&lt;/P&gt;&lt;P&gt;I have a development license in place.&lt;/P&gt;&lt;P&gt;Also noticed following messages in the certmanager log:&lt;/P&gt;&lt;P&gt;"[03/Nov/2020 20:46:58 +0200] 16654 MainThread cert INFO No password file found for host 'masterofanalytics.hemanuniverse.com' at location: /opt/cloudera/AutoTLS/hosts-key-store/masterofanalytics.hemanuniverse.com/cm-auto-host_key.pw. Assuming default in-cluster password."&lt;/P&gt;&lt;P&gt;FQDNs and name resolution should be OK.&lt;/P&gt;&lt;P&gt;[azureuser@skeletor ~]$ cat /etc/hosts&lt;BR /&gt;127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4&lt;BR /&gt;::1 localhost localhost.localdomain localhost6 localhost6.localdomain6&lt;BR /&gt;10.0.0.4 masterofanalytics.hemanuniverse.com masterofanalytics&lt;BR /&gt;10.0.0.6 skeletor.hemanuniverse.com skeletor&lt;BR /&gt;10.0.0.7 hordeprime.hemanuniverse.com hordeprime&lt;BR /&gt;10.0.0.8 horlak.hemanuniverse.com horlak&lt;/P&gt;&lt;P&gt;Below I've verified the fqdn of all 4 servers in the cluster and verified that their key and certificate matches and owner of certificate. There's an company CA in place that has signed the CSR's. It seems that as agents are having trouble authenticating TLS as I'm running command:&lt;/P&gt;&lt;P&gt;"sudo -u cloudera-scm openssl s_client -connect masterofanalytics.hemanuniverse.com:7182 -CAfile /var/lib/cloudera-scm-agent/agent-cert/cm-auto-in_cluster_ca_cert.pem -cert /var/lib/cloudera-scm-agent/agent-cert/cm-auto-host_cert_chain.pem -key /var/lib/cloudera-scm-agent/agent-cert/cm-auto-host_key.pem -servername $(hostname -f) -pass file:/var/lib/cloudera-scm-agent/agent-cert/cm-auto-host_key.pw"&lt;BR /&gt;this gives me error int STDER "140509671278480:error:14094416:SSL routines:ssl3_read_bytes:sslv3 alert certificate unknown:s3_pkt.c:1493:SSL alert number 46&lt;BR /&gt;140509671278480:error:140790E5:SSL routines:ssl23_write:ssl handshake failure:s23_lib.c:177:&lt;BR /&gt;CONNECTED(00000003)"&lt;/P&gt;&lt;P&gt;[azureuser@masterofanalytics ~]$ for i in `grep 10.0.0 /etc/hosts | awk '{print $2}'`; do ssh $i "python -c 'import socket; print socket.getfqdn(), socket.gethostbyname(socket.getfqdn())'"; ssh $i sudo openssl rsa -noout -modulus -in /var/lib/cloudera-scm-agent/agent-cert/cm-auto-host_key.pem -passin file:/var/lib/cloudera-scm-agent/agent-cert/cm-auto-host_key.pw | openssl md5; ssh $i openssl x509 -noout -modulus -in /var/lib/cloudera-scm-agent/agent-cert/cm-auto-host_cert_chain.pem | openssl md5; ssh $i keytool -printcert -file /var/lib/cloudera-scm-agent/agent-cert/cm-auto-host_cert_chain.pem | grep -e 'Owner:\|Issuer:' | paste -d " " - -; ssh $i sudo -u cloudera-scm openssl s_client -connect masterofanalytics.hemanuniverse.com:7182 -CAfile /var/lib/cloudera-scm-agent/agent-cert/cm-auto-in_cluster_ca_cert.pem -cert /var/lib/cloudera-scm-agent/agent-cert/cm-auto-host_cert_chain.pem -key /var/lib/cloudera-scm-agent/agent-cert/cm-auto-host_key.pem -servername $(hostname -f) -pass file:/var/lib/cloudera-scm-agent/agent-cert/cm-auto-host_key.pw; done&lt;BR /&gt;masterofanalytics.hemanuniverse.com 10.0.0.4&lt;BR /&gt;(stdin)= 1fa4d9fdd951bc5afb3c4f56d99546dd&lt;BR /&gt;(stdin)= 1fa4d9fdd951bc5afb3c4f56d99546dd&lt;BR /&gt;Owner: CN=masterofanalytics.hemanuniverse.com, OU=LINUX, O=hemanuniverse.com, L=Palo Alto, ST=California, C=US Issuer: CN=hemanuniverse-Hulk-CA, DC=hemanuniverse, DC=com&lt;BR /&gt;depth=1 DC = com, DC = hemanuniverse, CN = hemanuniverse-Hulk-CA&lt;BR /&gt;verify return:1&lt;BR /&gt;depth=0 C = US, ST = California, L = Palo Alto, O = hemanuniverse.com, OU = LINUX, CN = masterofanalytics.hemanuniverse.com&lt;BR /&gt;verify return:1&lt;BR /&gt;CONNECTED(00000003)&lt;BR /&gt;---&lt;BR /&gt;Certificate chain&lt;BR /&gt;0 s:/C=US/ST=California/L=Palo Alto/O=hemanuniverse.com/OU=LINUX/CN=masterofanalytics.hemanuniverse.com&lt;BR /&gt;i:/DC=com/DC=hemanuniverse/CN=hemanuniverse-Hulk-CA&lt;BR /&gt;1 s:/DC=com/DC=hemanuniverse/CN=hemanuniverse-Hulk-CA&lt;BR /&gt;i:/DC=com/DC=hemanuniverse/CN=hemanuniverse-Hulk-CA&lt;BR /&gt;---&lt;BR /&gt;Server certificate&lt;BR /&gt;-----BEGIN CERTIFICATE-----&lt;BR /&gt;-----END CERTIFICATE-----&lt;BR /&gt;subject=/C=US/ST=California/L=Palo Alto/O=hemanuniverse.com/OU=LINUX/CN=masterofanalytics.hemanuniverse.com&lt;BR /&gt;issuer=/DC=com/DC=hemanuniverse/CN=hemanuniverse-Hulk-CA&lt;BR /&gt;---&lt;BR /&gt;Acceptable client certificate CA names&lt;BR /&gt;/DC=com/DC=hemanuniverse/CN=hemanuniverse-Hulk-CA&lt;BR /&gt;/C=US/ST=California/L=Palo Alto/O=hemanuniverse.com/OU=LINUX/CN=masterofanalytics.hemanuniverse.com&lt;BR /&gt;Client Certificate Types: RSA sign, DSA sign, ECDSA sign&lt;BR /&gt;Requested Signature Algorithms: ECDSA+SHA512:RSA+SHA512:ECDSA+SHA384:RSA+SHA384:ECDSA+SHA256:RSA+SHA256:DSA+SHA256:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:ECDSA+SHA1:RSA+SHA1:DSA+SHA1&lt;BR /&gt;Shared Requested Signature Algorithms: ECDSA+SHA512:RSA+SHA512:ECDSA+SHA384:RSA+SHA384:ECDSA+SHA256:RSA+SHA256:DSA+SHA256:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:ECDSA+SHA1:RSA+SHA1:DSA+SHA1&lt;BR /&gt;Peer signing digest: SHA512&lt;BR /&gt;Server Temp Key: ECDH, P-256, 256 bits&lt;BR /&gt;---&lt;BR /&gt;SSL handshake has read 3170 bytes and written 3150 bytes&lt;BR /&gt;---&lt;BR /&gt;New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;Server public key is 2048 bit&lt;BR /&gt;Secure Renegotiation IS supported&lt;BR /&gt;Compression: NONE&lt;BR /&gt;Expansion: NONE&lt;BR /&gt;No ALPN negotiated&lt;BR /&gt;SSL-Session:&lt;BR /&gt;Protocol : TLSv1.2&lt;BR /&gt;Cipher : ECDHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;Session-ID: 5FA4FE04A84481F20A6F71ED898FAC8C659163E89F2D4E7DAFC20C4476D352DF&lt;BR /&gt;Session-ID-ctx:&lt;BR /&gt;Master-Key: 2F0994587F48D1CFFA08BF3BD8F751C5DEA990911B72785FA4AF5AF3F5DED70A7CBC73BA45F0F81411973AE3622A3972&lt;BR /&gt;Key-Arg : None&lt;BR /&gt;Krb5 Principal: None&lt;BR /&gt;PSK identity: None&lt;BR /&gt;PSK identity hint: None&lt;BR /&gt;Start Time: 1604648452&lt;BR /&gt;Timeout : 300 (sec)&lt;BR /&gt;Verify return code: 0 (ok)&lt;BR /&gt;---&lt;/P&gt;&lt;P&gt;HTTP/1.1 400 Illegal character SPACE=' '&lt;BR /&gt;Content-Type: text/html;charset=iso-8859-1&lt;BR /&gt;Content-Length: 70&lt;BR /&gt;Connection: close&lt;BR /&gt;Server: Jetty(9.4.14.v20181114)&lt;/P&gt;&lt;P&gt;&amp;lt;h1&amp;gt;Bad Message 400&amp;lt;/h1&amp;gt;&amp;lt;pre&amp;gt;reason: Illegal character SPACE=' '&amp;lt;/pre&amp;gt;closed&lt;BR /&gt;skeletor.hemanuniverse.com 10.0.0.6&lt;BR /&gt;(stdin)= 61c35563b5b41fc7e4ac7c4a14dfaf1e&lt;BR /&gt;(stdin)= 61c35563b5b41fc7e4ac7c4a14dfaf1e&lt;BR /&gt;Owner: CN=skeletor.hemanuniverse.com, OU=LINUX, O=hemanuniverse.com, L=Palo Alto, ST=California, C=US Issuer: CN=hemanuniverse-Hulk-CA, DC=hemanuniverse, DC=com&lt;BR /&gt;depth=1 DC = com, DC = hemanuniverse, CN = hemanuniverse-Hulk-CA&lt;BR /&gt;verify return:1&lt;BR /&gt;depth=0 C = US, ST = California, L = Palo Alto, O = hemanuniverse.com, OU = LINUX, CN = masterofanalytics.hemanuniverse.com&lt;BR /&gt;verify return:1&lt;BR /&gt;140509671278480:error:14094416:SSL routines:ssl3_read_bytes:sslv3 alert certificate unknown:s3_pkt.c:1493:SSL alert number 46&lt;BR /&gt;140509671278480:error:140790E5:SSL routines:ssl23_write:ssl handshake failure:s23_lib.c:177:&lt;BR /&gt;CONNECTED(00000003)&lt;BR /&gt;---&lt;BR /&gt;Certificate chain&lt;BR /&gt;0 s:/C=US/ST=California/L=Palo Alto/O=hemanuniverse.com/OU=LINUX/CN=masterofanalytics.hemanuniverse.com&lt;BR /&gt;i:/DC=com/DC=hemanuniverse/CN=hemanuniverse-Hulk-CA&lt;BR /&gt;1 s:/DC=com/DC=hemanuniverse/CN=hemanuniverse-Hulk-CA&lt;BR /&gt;i:/DC=com/DC=hemanuniverse/CN=hemanuniverse-Hulk-CA&lt;BR /&gt;---&lt;BR /&gt;Server certificate&lt;BR /&gt;-----BEGIN CERTIFICATE-----&lt;BR /&gt;-----END CERTIFICATE-----&lt;BR /&gt;subject=/C=US/ST=California/L=Palo Alto/O=hemanuniverse.com/OU=LINUX/CN=masterofanalytics.hemanuniverse.com&lt;BR /&gt;issuer=/DC=com/DC=hemanuniverse/CN=hemanuniverse-Hulk-CA&lt;BR /&gt;---&lt;BR /&gt;Acceptable client certificate CA names&lt;BR /&gt;/DC=com/DC=hemanuniverse/CN=hemanuniverse-Hulk-CA&lt;BR /&gt;/C=US/ST=California/L=Palo Alto/O=hemanuniverse.com/OU=LINUX/CN=masterofanalytics.hemanuniverse.com&lt;BR /&gt;Client Certificate Types: RSA sign, DSA sign, ECDSA sign&lt;BR /&gt;Requested Signature Algorithms: ECDSA+SHA512:RSA+SHA512:ECDSA+SHA384:RSA+SHA384:ECDSA+SHA256:RSA+SHA256:DSA+SHA256:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:ECDSA+SHA1:RSA+SHA1:DSA+SHA1&lt;BR /&gt;Shared Requested Signature Algorithms: ECDSA+SHA512:RSA+SHA512:ECDSA+SHA384:RSA+SHA384:ECDSA+SHA256:RSA+SHA256:DSA+SHA256:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:ECDSA+SHA1:RSA+SHA1:DSA+SHA1&lt;BR /&gt;Peer signing digest: SHA512&lt;BR /&gt;Server Temp Key: ECDH, P-256, 256 bits&lt;BR /&gt;---&lt;BR /&gt;SSL handshake has read 3126 bytes and written 2799 bytes&lt;BR /&gt;---&lt;BR /&gt;New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;Server public key is 2048 bit&lt;BR /&gt;Secure Renegotiation IS supported&lt;BR /&gt;Compression: NONE&lt;BR /&gt;Expansion: NONE&lt;BR /&gt;No ALPN negotiated&lt;BR /&gt;SSL-Session:&lt;BR /&gt;Protocol : TLSv1.2&lt;BR /&gt;Cipher : ECDHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;Session-ID: 5FA4FE086ADB544867E55A118D5D86F678FDE2919FE89CEB92D9A173E4FA5C23&lt;BR /&gt;Session-ID-ctx:&lt;BR /&gt;Master-Key: 60C95476C76E930A0CAA84735504E7EA567E94BACE9C1AEC4F49151FF9B4DA2679578E8F2381897D106425AB366C7EBD&lt;BR /&gt;Key-Arg : None&lt;BR /&gt;Krb5 Principal: None&lt;BR /&gt;PSK identity: None&lt;BR /&gt;PSK identity hint: None&lt;BR /&gt;Start Time: 1604648456&lt;BR /&gt;Timeout : 300 (sec)&lt;BR /&gt;Verify return code: 0 (ok)&lt;BR /&gt;---&lt;BR /&gt;hordeprime.hemanuniverse.com 10.0.0.7&lt;BR /&gt;(stdin)= 68d65855b5080169c75bd312d397cd16&lt;BR /&gt;(stdin)= 68d65855b5080169c75bd312d397cd16&lt;BR /&gt;Owner: CN=hordeprime.hemanuniverse.com, OU=LINUX, O=hemanuniverse.com, L=Palo Alto, ST=California, C=US Issuer: CN=hemanuniverse-Hulk-CA, DC=hemanuniverse, DC=com&lt;BR /&gt;depth=1 DC = com, DC = hemanuniverse, CN = hemanuniverse-Hulk-CA&lt;BR /&gt;verify return:1&lt;BR /&gt;depth=0 C = US, ST = California, L = Palo Alto, O = hemanuniverse.com, OU = LINUX, CN = masterofanalytics.hemanuniverse.com&lt;BR /&gt;verify return:1&lt;BR /&gt;139973905454992:error:14094416:SSL routines:ssl3_read_bytes:sslv3 alert certificate unknown:s3_pkt.c:1493:SSL alert number 46&lt;BR /&gt;139973905454992:error:140790E5:SSL routines:ssl23_write:ssl handshake failure:s23_lib.c:177:&lt;BR /&gt;CONNECTED(00000003)&lt;BR /&gt;---&lt;BR /&gt;Certificate chain&lt;BR /&gt;0 s:/C=US/ST=California/L=Palo Alto/O=hemanuniverse.com/OU=LINUX/CN=masterofanalytics.hemanuniverse.com&lt;BR /&gt;i:/DC=com/DC=hemanuniverse/CN=hemanuniverse-Hulk-CA&lt;BR /&gt;1 s:/DC=com/DC=hemanuniverse/CN=hemanuniverse-Hulk-CA&lt;BR /&gt;i:/DC=com/DC=hemanuniverse/CN=hemanuniverse-Hulk-CA&lt;BR /&gt;---&lt;BR /&gt;Server certificate&lt;BR /&gt;-----BEGIN CERTIFICATE-----&lt;BR /&gt;-----END CERTIFICATE-----&lt;BR /&gt;subject=/C=US/ST=California/L=Palo Alto/O=hemanuniverse.com/OU=LINUX/CN=masterofanalytics.hemanuniverse.com&lt;BR /&gt;issuer=/DC=com/DC=hemanuniverse/CN=hemanuniverse-Hulk-CA&lt;BR /&gt;---&lt;BR /&gt;Acceptable client certificate CA names&lt;BR /&gt;/DC=com/DC=hemanuniverse/CN=hemanuniverse-Hulk-CA&lt;BR /&gt;/C=US/ST=California/L=Palo Alto/O=hemanuniverse.com/OU=LINUX/CN=masterofanalytics.hemanuniverse.com&lt;BR /&gt;Client Certificate Types: RSA sign, DSA sign, ECDSA sign&lt;BR /&gt;Requested Signature Algorithms: ECDSA+SHA512:RSA+SHA512:ECDSA+SHA384:RSA+SHA384:ECDSA+SHA256:RSA+SHA256:DSA+SHA256:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:ECDSA+SHA1:RSA+SHA1:DSA+SHA1&lt;BR /&gt;Shared Requested Signature Algorithms: ECDSA+SHA512:RSA+SHA512:ECDSA+SHA384:RSA+SHA384:ECDSA+SHA256:RSA+SHA256:DSA+SHA256:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:ECDSA+SHA1:RSA+SHA1:DSA+SHA1&lt;BR /&gt;Peer signing digest: SHA512&lt;BR /&gt;Server Temp Key: ECDH, P-256, 256 bits&lt;BR /&gt;---&lt;BR /&gt;SSL handshake has read 3126 bytes and written 2803 bytes&lt;BR /&gt;---&lt;BR /&gt;New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;Server public key is 2048 bit&lt;BR /&gt;Secure Renegotiation IS supported&lt;BR /&gt;Compression: NONE&lt;BR /&gt;Expansion: NONE&lt;BR /&gt;No ALPN negotiated&lt;BR /&gt;SSL-Session:&lt;BR /&gt;Protocol : TLSv1.2&lt;BR /&gt;Cipher : ECDHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;Session-ID: 5FA4FE09116871B4C37F4981A8D2E59186C2E219BF67895DC168FBCDF6BC915D&lt;BR /&gt;Session-ID-ctx:&lt;BR /&gt;Master-Key: DF3033C1A66881A7C42AF6692A011771C8C472109B2D6184E80DABDB6AC0FF9B4C12DEAAF716DF4643533F63DBA42522&lt;BR /&gt;Key-Arg : None&lt;BR /&gt;Krb5 Principal: None&lt;BR /&gt;PSK identity: None&lt;BR /&gt;PSK identity hint: None&lt;BR /&gt;Start Time: 1604648457&lt;BR /&gt;Timeout : 300 (sec)&lt;BR /&gt;Verify return code: 0 (ok)&lt;BR /&gt;---&lt;BR /&gt;horlak.hemanuniverse.com 10.0.0.8&lt;BR /&gt;(stdin)= 42de4a2a447c9dd5ad4be2f5949c2c0f&lt;BR /&gt;(stdin)= 42de4a2a447c9dd5ad4be2f5949c2c0f&lt;BR /&gt;Owner: CN=horlak.hemanuniverse.com, OU=LINUX, O=hemanuniverse.com, L=Palo Alto, ST=California, C=US Issuer: CN=hemanuniverse-Hulk-CA, DC=hemanuniverse, DC=com&lt;BR /&gt;depth=1 DC = com, DC = hemanuniverse, CN = hemanuniverse-Hulk-CA&lt;BR /&gt;verify return:1&lt;BR /&gt;depth=0 C = US, ST = California, L = Palo Alto, O = hemanuniverse.com, OU = LINUX, CN = masterofanalytics.hemanuniverse.com&lt;BR /&gt;verify return:1&lt;BR /&gt;CONNECTED(00000003)&lt;BR /&gt;---&lt;BR /&gt;Certificate chain&lt;BR /&gt;0 s:/C=US/ST=California/L=Palo Alto/O=hemanuniverse.com/OU=LINUX/CN=masterofanalytics.hemanuniverse.com&lt;BR /&gt;i:/DC=com/DC=hemanuniverse/CN=hemanuniverse-Hulk-CA&lt;BR /&gt;1 s:/DC=com/DC=hemanuniverse/CN=hemanuniverse-Hulk-CA&lt;BR /&gt;i:/DC=com/DC=hemanuniverse/CN=hemanuniverse-Hulk-CA&lt;BR /&gt;---&lt;BR /&gt;Server certificate&lt;BR /&gt;-----BEGIN CERTIFICATE-----&lt;BR /&gt;-----END CERTIFICATE-----&lt;BR /&gt;subject=/C=US/ST=California/L=Palo Alto/O=hemanuniverse.com/OU=LINUX/CN=masterofanalytics.hemanuniverse.com&lt;BR /&gt;issuer=/DC=com/DC=hemanuniverse/CN=hemanuniverse-Hulk-CA&lt;BR /&gt;---&lt;BR /&gt;Acceptable client certificate CA names&lt;BR /&gt;/DC=com/DC=hemanuniverse/CN=hemanuniverse-Hulk-CA&lt;BR /&gt;/C=US/ST=California/L=Palo Alto/O=hemanuniverse.com/OU=LINUX/CN=masterofanalytics.hemanuniverse.com&lt;BR /&gt;Client Certificate Types: RSA sign, DSA sign, ECDSA sign&lt;BR /&gt;Requested Signature Algorithms: ECDSA+SHA512:RSA+SHA512:ECDSA+SHA384:RSA+SHA384:ECDSA+SHA256:RSA+SHA256:DSA+SHA256:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:ECDSA+SHA1:RSA+SHA1:DSA+SHA1&lt;BR /&gt;Shared Requested Signature Algorithms: ECDSA+SHA512:RSA+SHA512:ECDSA+SHA384:RSA+SHA384:ECDSA+SHA256:RSA+SHA256:DSA+SHA256:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:ECDSA+SHA1:RSA+SHA1:DSA+SHA1&lt;BR /&gt;Peer signing digest: SHA512&lt;BR /&gt;Server Temp Key: ECDH, P-256, 256 bits&lt;BR /&gt;---&lt;BR /&gt;SSL handshake has read 3126 bytes and written 2795 bytes&lt;BR /&gt;---&lt;BR /&gt;New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;Server public key is 2048 bit&lt;BR /&gt;Secure Renegotiation IS supported&lt;BR /&gt;Compression: NONE&lt;BR /&gt;Expansion: NONE&lt;BR /&gt;No ALPN negotiated&lt;BR /&gt;SSL-Session:&lt;BR /&gt;Protocol : TLSv1.2&lt;BR /&gt;Cipher : ECDHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;Session-ID: 5FA4FE0B83BEC694F742FA3FE854478CA59F9F27EC738D22961412EC9590404D&lt;BR /&gt;Session-ID-ctx:&lt;BR /&gt;Master-Key: 5147A7A68B36E29321783F165644AA5716736FAE8752C3C136E8751F39148974DBF22879AFE66A273ACD2B77F4192F0A&lt;BR /&gt;Key-Arg : None&lt;BR /&gt;Krb5 Principal: None&lt;BR /&gt;PSK identity: None&lt;BR /&gt;PSK identity hint: None&lt;BR /&gt;Start Time: 1604648459&lt;BR /&gt;Timeout : 300 (sec)&lt;BR /&gt;Verify return code: 0 (ok)&lt;BR /&gt;---&lt;BR /&gt;140231002048400:error:14094416:SSL routines:ssl3_read_bytes:sslv3 alert certificate unknown:s3_pkt.c:1493:SSL alert number 46&lt;BR /&gt;140231002048400:error:140790E5:SSL routines:ssl23_write:ssl handshake failure:s23_lib.c:177:&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 11:23:28 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Agent-heartbeat-failing-after-enabling-Auto-TLS-on-existing/m-p/305516#M222475</guid>
      <dc:creator>OlliT</dc:creator>
      <dc:date>2026-04-21T11:23:28Z</dc:date>
    </item>
    <item>
      <title>Re: Agent heartbeat failing after enabling Auto-TLS on existing cluster (SSLError: sslv3 alert certificate unknown)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Agent-heartbeat-failing-after-enabling-Auto-TLS-on-existing/m-p/305635#M222527</link>
      <description>&lt;P&gt;I needed to add the hosts to &lt;SPAN&gt;Cloudera Manager TLS/SSL Client Trust Store File. After adding host certificates there heartbeat resumed. Not sure if this is expected behaviour or if Auto-TLS should cover the truststore entries also.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 08:05:15 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Agent-heartbeat-failing-after-enabling-Auto-TLS-on-existing/m-p/305635#M222527</guid>
      <dc:creator>OlliT</dc:creator>
      <dc:date>2020-11-09T08:05:15Z</dc:date>
    </item>
    <item>
      <title>Re: Agent heartbeat failing after enabling Auto-TLS on existing cluster (SSLError: sslv3 alert certificate unknown)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Agent-heartbeat-failing-after-enabling-Auto-TLS-on-existing/m-p/305960#M222603</link>
      <description>&lt;P&gt;Talking to myself but found out that my internal CA signed certificate lacked TLS Web Agent Authentication. After signing the CSR with&amp;nbsp;TLS Web Agent Authentication and&amp;nbsp;TLS Web Server Authentication and rerunning the wizard I was able to proceed.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Nov 2020 12:56:02 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Agent-heartbeat-failing-after-enabling-Auto-TLS-on-existing/m-p/305960#M222603</guid>
      <dc:creator>OlliT</dc:creator>
      <dc:date>2020-11-13T12:56:02Z</dc:date>
    </item>
    <item>
      <title>Re: Agent heartbeat failing after enabling Auto-TLS on existing cluster (SSLError: sslv3 alert certificate unknown)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Agent-heartbeat-failing-after-enabling-Auto-TLS-on-existing/m-p/319344#M227765</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/82722"&gt;@OlliT&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since you added the hosts to the Client Trust Store File, I have the same problem, however in my certificate if the TLS Web Client Authentication, TLS Web Server Authentication options are found&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jun 2021 14:15:44 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Agent-heartbeat-failing-after-enabling-Auto-TLS-on-existing/m-p/319344#M227765</guid>
      <dc:creator>sdlfjfldgj</dc:creator>
      <dc:date>2021-06-25T14:15:44Z</dc:date>
    </item>
  </channel>
</rss>

