<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381744#M244385</link>
    <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/108607"&gt;@JamesZhang&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I feel there are a lot of details missing here that may help you get a better response.&lt;BR /&gt;I see you added the "Apache NiFi" label, so assuming you are seeing this exception some how related to NiFi?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown&lt;/LI-CODE&gt;&lt;P&gt;Above is telling you that you have some TLS exchange&amp;nbsp; issue related to some certificates somewhere.&amp;nbsp; I am assuming the verbose output you shared is for the keystore configured in your NiFi's nifi.properties file?&lt;BR /&gt;&lt;BR /&gt;With and TLS exchange there is a client and a server side of that exchange and the keystore and truststores on both side of that exchange along with the type of TLS exchange (TLS or MutualTLS) matters.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Initial questions;&lt;BR /&gt;1. Where are you seeing this exception? What action is being performed when the exception occurs?&lt;BR /&gt;2. What TLS exchange is failing as a result of it?&lt;BR /&gt;&lt;BR /&gt;Thank you,&lt;BR /&gt;Matt&lt;/P&gt;</description>
    <pubDate>Mon, 08 Jan 2024 14:06:36 GMT</pubDate>
    <dc:creator>MattWho</dc:creator>
    <dc:date>2024-01-08T14:06:36Z</dc:date>
    <item>
      <title>javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown</title>
      <link>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381741#M244383</link>
      <description>&lt;P&gt;[begin_log]2024-01-08 18:57:00,406+0800|ERROR|pool-47-thread-1|o.s.s.s.TaskUtils$LoggingErrorHandler|Unexpected error occurred in scheduled task&lt;BR /&gt;org.springframework.web.client.HttpServerErrorException$InternalServerError: 500 Internal Server Error: "javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown"&lt;BR /&gt;at org.springframework.web.client.HttpServerErrorException.create(HttpServerErrorException.java:100)&lt;BR /&gt;at org.springframework.web.client.DefaultResponseErrorHandler.handleError(DefaultResponseErrorHandler.java:170)&lt;BR /&gt;at org.springframework.web.client.DefaultResponseErrorHandler.handleError(DefaultResponseErrorHandler.java:122)&lt;BR /&gt;at org.springframework.web.client.ResponseErrorHandler.handleError(ResponseErrorHandler.java:63)&lt;BR /&gt;at org.springframework.web.client.RestTemplate.handleResponse(RestTemplate.java:825)&lt;BR /&gt;at org.springframework.web.client.RestTemplate.doExecute(RestTemplate.java:783)&lt;BR /&gt;at org.springframework.web.client.RestTemplate.execute(RestTemplate.java:717)&lt;BR /&gt;at org.springframework.web.client.RestTemplate.exchange(RestTemplate.java:608)&lt;BR /&gt;at com.orchsym.trace.alerts.api.timer.Timer.getBulletinBoardDTO(Timer.java:162)&lt;BR /&gt;at com.orchsym.trace.alerts.api.timer.Timer.getBulletinBoard(Timer.java:97)&lt;BR /&gt;at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)&lt;BR /&gt;at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)&lt;BR /&gt;at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)&lt;BR /&gt;at java.lang.reflect.Method.invoke(Method.java:498)&lt;BR /&gt;at org.springframework.scheduling.support.ScheduledMethodRunnable.run(ScheduledMethodRunnable.java:84)&lt;BR /&gt;at org.springframework.scheduling.support.DelegatingErrorHandlingRunnable.run(DelegatingErrorHandlingRunnable.java:54)&lt;BR /&gt;at org.springframework.scheduling.concurrent.ReschedulingRunnable.run(ReschedulingRunnable.java:95)&lt;BR /&gt;at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511)&lt;BR /&gt;at java.util.concurrent.FutureTask.run(FutureTask.java:266)&lt;BR /&gt;at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.access$201(ScheduledThreadPoolExecutor.java:180)&lt;BR /&gt;at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:293)&lt;BR /&gt;at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)&lt;BR /&gt;at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)&lt;BR /&gt;at java.lang.Thread.run(Thread.java:748)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;[root@runtime-0 /opt/orchsym/runtime-ee/conf]# keytool -v -list -keystore /opt/orchsym/runtime/conf/keystore.jks&lt;/DIV&gt;&lt;DIV&gt;Enter keystore password:&lt;/DIV&gt;&lt;DIV&gt;Keystore type: jks&lt;/DIV&gt;&lt;DIV&gt;Keystore provider: SUN&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Your keystore contains 1 entry&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Alias name: runtime-0.runtime-statefulset.default.svc.cluster.local&lt;/DIV&gt;&lt;DIV&gt;Creation date: Jan 8, 2024&lt;/DIV&gt;&lt;DIV&gt;Entry type: PrivateKeyEntry&lt;/DIV&gt;&lt;DIV&gt;Certificate chain length: 2&lt;/DIV&gt;&lt;DIV&gt;Certificate[1]:&lt;/DIV&gt;&lt;DIV&gt;Owner: CN=runtime-0.runtime-statefulset.default.svc.cluster.local, OU=orchsym.com&lt;/DIV&gt;&lt;DIV&gt;Issuer: CN=ca, OU=orchsym.com&lt;/DIV&gt;&lt;DIV&gt;Serial number: 94c5135f0b3a7f0e&lt;/DIV&gt;&lt;DIV&gt;Valid from: Mon Jan 08 18:23:42 CST 2024 until: Thu May 25 18:23:42 CST 2051&lt;/DIV&gt;&lt;DIV&gt;Certificate fingerprints:&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;MD5:&amp;nbsp; E3:D3:83:10:FF:A2:56:CE:41:A5:8E:BF:66:B6:97:06&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;SHA1: 10:00:6B:63:E5:FB:C0:CE:79:B1:AD:BF:07:D7:A1:AD:C1:56:E2:2A&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;SHA256: C1:B1:5D:D1:EA:5A:1F:64:CB:5A:BE:31:D9:EC:4C:31:90:37:22:7B:9D:B1:CC:66:F6:B3:09:81:34:EB:1E:BD&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;Signature algorithm name: SHA256withRSA&lt;/DIV&gt;&lt;DIV&gt;Subject Public Key Algorithm: 2048-bit RSA key&lt;/DIV&gt;&lt;DIV&gt;Version: 3&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Extensions:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;#1: ObjectId: 2.5.29.37 Criticality=false&lt;/DIV&gt;&lt;DIV&gt;ExtendedKeyUsages [&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; serverAuth&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; clientAuth&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;#2: ObjectId: 2.5.29.17 Criticality=false&lt;/DIV&gt;&lt;DIV&gt;SubjectAlternativeName [&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; DNSName: runtime-0.runtime-statefulset.default.svc.cluster.local&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Certificate[2]:&lt;/DIV&gt;&lt;DIV&gt;Owner: CN=ca, OU=orchsym.com&lt;/DIV&gt;&lt;DIV&gt;Issuer: CN=ca, OU=orchsym.com&lt;/DIV&gt;&lt;DIV&gt;Serial number: ea7f96497446ec07&lt;/DIV&gt;&lt;DIV&gt;Valid from: Wed Dec 13 14:00:40 CST 2023 until: Sat Dec 10 14:00:40 CST 2033&lt;/DIV&gt;&lt;DIV&gt;Certificate fingerprints:&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;MD5:&amp;nbsp; D1:C7:A1:6A:A3:67:65:68:55:B5:6D:0E:74:21:80:71&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;SHA1: 64:60:26:22:94:08:24:BD:75:B7:23:B0:62:6C:3C:FF:A8:62:AB:47&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;SHA256: 37:45:27:2F:B9:A2:A4:40:FC:14:7B:82:CA:D6:57:9D:9D:11:D9:44:13:2F:CC:8D:33:BB:A9:C5:C6:FA:C0:57&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;Signature algorithm name: SHA256withRSA&lt;/DIV&gt;&lt;DIV&gt;Subject Public Key Algorithm: 2048-bit RSA key&lt;/DIV&gt;&lt;DIV&gt;Version: 1&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;*******************************************&lt;/DIV&gt;&lt;DIV&gt;*******************************************&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Warning:&lt;/DIV&gt;&lt;DIV&gt;The JKS keystore uses a proprietary format. It is recommended to migrate to PKCS12 which is an industry standard format using "keytool -importkeystore -srckeystore /opt/orchsym/runtime/conf/keystore.jks -destkeystore /opt/orchsym/runtime/conf/keystore.jks -deststoretype pkcs12".&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2024 11:51:55 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381741#M244383</guid>
      <dc:creator>JamesZhang</dc:creator>
      <dc:date>2024-01-08T11:51:55Z</dc:date>
    </item>
    <item>
      <title>Re: javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown</title>
      <link>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381744#M244385</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/108607"&gt;@JamesZhang&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I feel there are a lot of details missing here that may help you get a better response.&lt;BR /&gt;I see you added the "Apache NiFi" label, so assuming you are seeing this exception some how related to NiFi?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown&lt;/LI-CODE&gt;&lt;P&gt;Above is telling you that you have some TLS exchange&amp;nbsp; issue related to some certificates somewhere.&amp;nbsp; I am assuming the verbose output you shared is for the keystore configured in your NiFi's nifi.properties file?&lt;BR /&gt;&lt;BR /&gt;With and TLS exchange there is a client and a server side of that exchange and the keystore and truststores on both side of that exchange along with the type of TLS exchange (TLS or MutualTLS) matters.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Initial questions;&lt;BR /&gt;1. Where are you seeing this exception? What action is being performed when the exception occurs?&lt;BR /&gt;2. What TLS exchange is failing as a result of it?&lt;BR /&gt;&lt;BR /&gt;Thank you,&lt;BR /&gt;Matt&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2024 14:06:36 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381744#M244385</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2024-01-08T14:06:36Z</dc:date>
    </item>
    <item>
      <title>Re: javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown</title>
      <link>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381745#M244386</link>
      <description>&lt;P&gt;I set up a two node nifi cluster. and https and username and password authentication is enabled.&lt;/P&gt;&lt;P&gt;When I was accessing the nifi and cut the login he gave me Received fatal alert: certificate_unknown&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2024 14:55:16 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381745#M244386</guid>
      <dc:creator>JamesZhang</dc:creator>
      <dc:date>2024-01-08T14:55:16Z</dc:date>
    </item>
    <item>
      <title>Re: javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown</title>
      <link>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381746#M244387</link>
      <description>&lt;P&gt;When I was accessing the nifi and cut the login he gave me Received fatal alert: certificate_unknown&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2024 14:56:21 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381746#M244387</guid>
      <dc:creator>JamesZhang</dc:creator>
      <dc:date>2024-01-08T14:56:21Z</dc:date>
    </item>
    <item>
      <title>Re: javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown</title>
      <link>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381748#M244388</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JamesZhang_0-1704725872640.png" style="width: 400px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/39349i1F58DC9EDDAA723B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JamesZhang_0-1704725872640.png" alt="JamesZhang_0-1704725872640.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2024 14:58:03 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381748#M244388</guid>
      <dc:creator>JamesZhang</dc:creator>
      <dc:date>2024-01-08T14:58:03Z</dc:date>
    </item>
    <item>
      <title>Re: javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown</title>
      <link>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381749#M244389</link>
      <description>&lt;P&gt;2024-01-08 22:59:04,191 DEBUG [Replicate Request Thread-5] o.a.n.c.c.h.r.o.OkHttpReplicationClient Replicating request OkHttpPreparedRequest[method=GET, headers={sec-fetch-site=same-origin, X-Request-ID=cefa0de909293ecff62ec11a567a7bf5, purpose=prefetch, User-Agent=Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36, Accept-Encoding=gzip, deflate, br, locale=zh, sec-ch-ua-mobile=?0, X-ProxiedEntitiesChain=&amp;lt;admin@orchsym.com&amp;gt;, Content-Encoding=gzip, X-RequestTransactionId=46b8f4dd-346d-4969-b013-0318b425a5e8, X-Real-IP=172.18.153.98, sec-fetch-mode=cors, Cookie=INGRESSCOOKIE=1704456109.379.3262.11429|138638da7f02469ffa15ce137684f175; authMode=token; oidc-request-rfid=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJ1MHlDcUI4MlVQMV9NS3B3aUljLVhXQmNNUWxybkJPLUM4dmdJZnUxUmFvIn0.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.AXI1uDJV629yce--7C_hIeKUdpSjkIWaeqm4_Ove_IMz4oMroPIYCBvKiF_XZ1u46uSxhGMz0DN5zhx3UwgYjo7OcofW6HtNolAgaCcfQU2rK_rMtb1VX3DfUAe6spyg0RwU6o08-5bRtd8vfH9S7ASIMO6dA3wD_o9bXlWGI7i4V2_mm-rnvm7qmC1e10xefu7Qhcq3g6dHh0tJcY6jFDNTBGS3qG9lME4y0E6FgrxlIr9vNtEqOIVHAa2MDLtXnJJnn9SHTBERsx-2T7wWmLKr_d_p3Cj62MvJeFEPMaPlZ3DANWx32dip4R9Y55DlzivEyAxSAyMm__QEFNPiXg, Accept=*/*, X-Forwarded-Host=runtime.irybd.com, X-Forwarded-Proto=https, Referer=&lt;A href="https://runtime.irybd.com/runtime" target="_blank"&gt;https://runtime.irybd.com/runtime&lt;/A&gt;, X-Forwarded-Port=443, sec-ch-ua="Not_A Brand";v="8", "Chromium";v="120", "Google Chrome";v="120", X-ProxyHost=runtime.irybd.com, sec-ch-ua-platform="macOS", X-Forwarded-For=172.18.153.98, Accept-Language=en-US,en;q=0.9,zh-CN;q=0.8,zh;q=0.7, X-Forwarded-Scheme=https, X-Scheme=https, sec-purpose=prefetch;prerender, sec-fetch-dest=empty}] to &lt;A href="https://runtime-1.runtime-statefulset.default.svc.cluster.local:443/nifi-api/flow/current-user" target="_blank"&gt;https://runtime-1.runtime-statefulset.default.svc.cluster.local:443/nifi-api/flow/current-user&lt;/A&gt;&lt;BR /&gt;2024-01-08 22:59:04,219 WARN [Replicate Request Thread-5] o.a.n.c.c.h.r.ThreadPoolRequestReplicator Failed to replicate request GET /nifi-api/flow/current-user to runtime-1.runtime-statefulset.default.svc.cluster.local:443 due to javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown&lt;BR /&gt;2024-01-08 22:59:04,219 WARN [Replicate Request Thread-5] o.a.n.c.c.h.r.ThreadPoolRequestReplicator Failed to replicate request GET /nifi-api/flow/current-user to runtime-1.runtime-statefulset.default.svc.cluster.local:443 due to javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown&lt;BR /&gt;2024-01-08 22:59:04,219 WARN [Replicate Request Thread-5] o.a.n.c.c.h.r.ThreadPoolRequestReplicator&lt;BR /&gt;javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown&lt;BR /&gt;at sun.security.ssl.Alerts.getSSLException(Alerts.java:192)&lt;BR /&gt;at sun.security.ssl.Alerts.getSSLException(Alerts.java:154)&lt;BR /&gt;at sun.security.ssl.SSLSocketImpl.recvAlert(SSLSocketImpl.java:2038)&lt;BR /&gt;at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1135)&lt;BR /&gt;at sun.security.ssl.SSLSocketImpl.waitForClose(SSLSocketImpl.java:1779)&lt;BR /&gt;at sun.security.ssl.HandshakeOutStream.flush(HandshakeOutStream.java:124)&lt;BR /&gt;at sun.security.ssl.Handshaker.sendChangeCipherSpec(Handshaker.java:1156)&lt;BR /&gt;at sun.security.ssl.ClientHandshaker.sendChangeCipherAndFinish(ClientHandshaker.java:1266)&lt;BR /&gt;at sun.security.ssl.ClientHandshaker.serverHelloDone(ClientHandshaker.java:1178)&lt;BR /&gt;at sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:348)&lt;BR /&gt;at sun.security.ssl.Handshaker.processLoop(Handshaker.java:1052)&lt;BR /&gt;at sun.security.ssl.Handshaker.process_record(Handshaker.java:987)&lt;BR /&gt;at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1072)&lt;BR /&gt;at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1385)&lt;BR /&gt;at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1413)&lt;BR /&gt;at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1397)&lt;BR /&gt;at okhttp3.internal.connection.RealConnection.connectTls(RealConnection.java:336)&lt;BR /&gt;at okhttp3.internal.connection.RealConnection.establishProtocol(RealConnection.java:300)&lt;BR /&gt;at okhttp3.internal.connection.RealConnection.connect(RealConnection.java:185)&lt;BR /&gt;at okhttp3.internal.connection.ExchangeFinder.findConnection(ExchangeFinder.java:224)&lt;BR /&gt;at okhttp3.internal.connection.ExchangeFinder.findHealthyConnection(ExchangeFinder.java:108)&lt;BR /&gt;at okhttp3.internal.connection.ExchangeFinder.find(ExchangeFinder.java:88)&lt;BR /&gt;at okhttp3.internal.connection.Transmitter.newExchange(Transmitter.java:169)&lt;BR /&gt;at okhttp3.internal.connection.ConnectInterceptor.intercept(ConnectInterceptor.java:41)&lt;BR /&gt;at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:142)&lt;BR /&gt;at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:117)&lt;BR /&gt;at okhttp3.internal.cache.CacheInterceptor.intercept(CacheInterceptor.java:94)&lt;BR /&gt;at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:142)&lt;BR /&gt;at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:117)&lt;BR /&gt;at okhttp3.internal.http.BridgeInterceptor.intercept(BridgeInterceptor.java:93)&lt;BR /&gt;at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:142)&lt;BR /&gt;at okhttp3.internal.http.RetryAndFollowUpInterceptor.intercept(RetryAndFollowUpInterceptor.java:88)&lt;BR /&gt;at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:142)&lt;BR /&gt;at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:117)&lt;BR /&gt;at okhttp3.RealCall.getResponseWithInterceptorChain(RealCall.java:229)&lt;BR /&gt;at okhttp3.RealCall.execute(RealCall.java:81)&lt;BR /&gt;at org.apache.nifi.cluster.coordination.http.replication.okhttp.OkHttpReplicationClient.replicate(OkHttpReplicationClient.java:122)&lt;BR /&gt;at org.apache.nifi.cluster.coordination.http.replication.okhttp.OkHttpReplicationClient.replicate(OkHttpReplicationClient.java:116)&lt;BR /&gt;at org.apache.nifi.cluster.coordination.http.replication.ThreadPoolRequestReplicator.replicateRequest(ThreadPoolRequestReplicator.java:629)&lt;BR /&gt;at org.apache.nifi.cluster.coordination.http.replication.ThreadPoolRequestReplicator$NodeHttpRequest.run(ThreadPoolRequestReplicator.java:821)&lt;BR /&gt;at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511)&lt;BR /&gt;at java.util.concurrent.FutureTask.run(FutureTask.java:266)&lt;BR /&gt;at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)&lt;BR /&gt;at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)&lt;BR /&gt;at java.lang.Thread.run(Thread.java:748)&lt;BR /&gt;2024-01-08 22:59:04,219 WARN [Replicate Request Thread-5] o.a.n.c.c.h.r.ThreadPoolRequestReplicator&lt;BR /&gt;javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown&lt;BR /&gt;at sun.security.ssl.Alerts.getSSLException(Alerts.java:192)&lt;BR /&gt;at sun.security.ssl.Alerts.getSSLException(Alerts.java:154)&lt;BR /&gt;at sun.security.ssl.SSLSocketImpl.recvAlert(SSLSocketImpl.java:2038)&lt;BR /&gt;at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1135)&lt;BR /&gt;at sun.security.ssl.SSLSocketImpl.waitForClose(SSLSocketImpl.java:1779)&lt;BR /&gt;at sun.security.ssl.HandshakeOutStream.flush(HandshakeOutStream.java:124)&lt;BR /&gt;at sun.security.ssl.Handshaker.sendChangeCipherSpec(Handshaker.java:1156)&lt;BR /&gt;at sun.security.ssl.ClientHandshaker.sendChangeCipherAndFinish(ClientHandshaker.java:1266)&lt;BR /&gt;at sun.security.ssl.ClientHandshaker.serverHelloDone(ClientHandshaker.java:1178)&lt;BR /&gt;at sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:348)&lt;BR /&gt;at sun.security.ssl.Handshaker.processLoop(Handshaker.java:1052)&lt;BR /&gt;at sun.security.ssl.Handshaker.process_record(Handshaker.java:987)&lt;BR /&gt;at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1072)&lt;BR /&gt;at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1385)&lt;BR /&gt;at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1413)&lt;BR /&gt;at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1397)&lt;BR /&gt;at okhttp3.internal.connection.RealConnection.connectTls(RealConnection.java:336)&lt;BR /&gt;at okhttp3.internal.connection.RealConnection.establishProtocol(RealConnection.java:300)&lt;BR /&gt;at okhttp3.internal.connection.RealConnection.connect(RealConnection.java:185)&lt;BR /&gt;at okhttp3.internal.connection.ExchangeFinder.findConnection(ExchangeFinder.java:224)&lt;BR /&gt;at okhttp3.internal.connection.ExchangeFinder.findHealthyConnection(ExchangeFinder.java:108)&lt;BR /&gt;at okhttp3.internal.connection.ExchangeFinder.find(ExchangeFinder.java:88)&lt;BR /&gt;at okhttp3.internal.connection.Transmitter.newExchange(Transmitter.java:169)&lt;BR /&gt;at okhttp3.internal.connection.ConnectInterceptor.intercept(ConnectInterceptor.java:41)&lt;BR /&gt;at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:142)&lt;BR /&gt;at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:117)&lt;BR /&gt;at okhttp3.internal.cache.CacheInterceptor.intercept(CacheInterceptor.java:94)&lt;BR /&gt;at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:142)&lt;BR /&gt;at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:117)&lt;BR /&gt;at okhttp3.internal.http.BridgeInterceptor.intercept(BridgeInterceptor.java:93)&lt;BR /&gt;at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:142)&lt;BR /&gt;at okhttp3.internal.http.RetryAndFollowUpInterceptor.intercept(RetryAndFollowUpInterceptor.java:88)&lt;BR /&gt;at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:142)&lt;BR /&gt;at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:117)&lt;BR /&gt;at okhttp3.RealCall.getResponseWithInterceptorChain(RealCall.java:229)&lt;BR /&gt;at okhttp3.RealCall.execute(RealCall.java:81)&lt;BR /&gt;at org.apache.nifi.cluster.coordination.http.replication.okhttp.OkHttpReplicationClient.replicate(OkHttpReplicationClient.java:122)&lt;BR /&gt;at org.apache.nifi.cluster.coordination.http.replication.okhttp.OkHttpReplicationClient.replicate(OkHttpReplicationClient.java:116)&lt;BR /&gt;at org.apache.nifi.cluster.coordination.http.replication.ThreadPoolRequestReplicator.replicateRequest(ThreadPoolRequestReplicator.java:629)&lt;BR /&gt;at org.apache.nifi.cluster.coordination.http.replication.ThreadPoolRequestReplicator$NodeHttpRequest.run(ThreadPoolRequestReplicator.java:821)&lt;BR /&gt;at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511)&lt;BR /&gt;at java.util.concurrent.FutureTask.run(FutureTask.java:266)&lt;BR /&gt;at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)&lt;BR /&gt;at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)&lt;BR /&gt;at java.lang.Thread.run(Thread.java:748)&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2024 15:00:58 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381749#M244389</guid>
      <dc:creator>JamesZhang</dc:creator>
      <dc:date>2024-01-08T15:00:58Z</dc:date>
    </item>
    <item>
      <title>Re: javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown</title>
      <link>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381759#M244396</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/108607"&gt;@JamesZhang&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Not sure what "cut the login" means in your response.&lt;BR /&gt;&lt;BR /&gt;When you access the NiFI URL, are you being redirected to the NiFi login window or do you encounter the unknown certificate exception immediately?&lt;BR /&gt;&lt;BR /&gt;Where did you get the certificates you are using?&lt;BR /&gt;Did you add the Certificate Authority CA trust chain public certificates to the list of trusted authorities in the browser you are using to connect to NiFi?&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;&lt;SPAN&gt;Matt&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2024 17:19:33 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381759#M244396</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2024-01-08T17:19:33Z</dc:date>
    </item>
    <item>
      <title>Re: javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown</title>
      <link>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381766#M244397</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/108607"&gt;@JamesZhang&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;What is the verbose output for your configured truststore?&lt;BR /&gt;&lt;BR /&gt;Does it contain the TrustedCertEntry for your Certificate Authority (CA) that signed the PrivateKey in your keystore?&lt;BR /&gt;&lt;BR /&gt;The keystore you shared has:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;DNSName: runtime-0.runtime-statefulset.default.svc.cluster.local&lt;/LI-CODE&gt;&lt;P&gt;The log output you shared is failing on the mutualTLS handshake with another node in your NiFi cluster when the request to get current user is replicated to all nodes in your NiFi cluster.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;runtime-1.runtime-statefulset.default.svc.cluster.local&lt;/LI-CODE&gt;&lt;P&gt;All inter node communication require successful mutualTLS exchanges.&lt;BR /&gt;Did you create a separate certificate for the other node?&amp;nbsp; Is it signed by same CA?&lt;BR /&gt;&lt;BR /&gt;If you found any of the suggestions/solutions provided helped you with your issue, please take a moment to login and click "&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Accept as Solution&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/EM&gt;" on one or more of them that helped.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;BR /&gt;Matt&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2024 20:30:39 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381766#M244397</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2024-01-08T20:30:39Z</dc:date>
    </item>
    <item>
      <title>Re: javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown</title>
      <link>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381775#M244403</link>
      <description>&lt;P&gt;Yes, all other nodes are issued with the same CA certificate.&lt;/P&gt;&lt;P&gt;Here are the details of my certificate：&lt;/P&gt;&lt;P&gt;runtime-0 node：&lt;/P&gt;&lt;DIV&gt;[root@runtime-0 /opt/orchsym/runtime-ee/conf]# keytool -v -list -keystore keystore.jks&lt;/DIV&gt;&lt;DIV&gt;Enter keystore password:&lt;/DIV&gt;&lt;DIV&gt;Keystore type: jks&lt;/DIV&gt;&lt;DIV&gt;Keystore provider: SUN&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Your keystore contains 1 entry&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Alias name: runtime-0.runtime-statefulseheadless.default.svc.cluster.local&lt;/DIV&gt;&lt;DIV&gt;Creation date: Jan 9, 2024&lt;/DIV&gt;&lt;DIV&gt;Entry type: PrivateKeyEntry&lt;/DIV&gt;&lt;DIV&gt;Certificate chain length: 2&lt;/DIV&gt;&lt;DIV&gt;Certificate[1]:&lt;/DIV&gt;&lt;DIV&gt;Owner: CN=runtime-0.runtime-statefulseheadless.default.svc.cluster.local, OU=orchsym.com&lt;/DIV&gt;&lt;DIV&gt;Issuer: CN=ca, OU=orchsym.com&lt;/DIV&gt;&lt;DIV&gt;Serial number: 95a5fed51b7682f7&lt;/DIV&gt;&lt;DIV&gt;Valid from: Tue Jan 09 11:28:46 CST 2024 until: Fri May 26 11:28:46 CST 2051&lt;/DIV&gt;&lt;DIV&gt;Certificate fingerprints:&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;MD5:&amp;nbsp; F5:47:4A:ED:84:39:A6:CE:2E:3F:66:E2:9F:13:85:CF&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;SHA1: C4:B8:DB:86:AB:7C:7F:60:16:7B:02:64:67:E0:82:67:65:F9:C9:55&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;SHA256: 54:55:A1:C6:BE:5F:F4:2A:8B:AB:05:F1:23:A6:AF:62:3F:4C:1F:97:F7:86:CD:7F:44:27:82:AA:28:78:D6:B5&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;Signature algorithm name: SHA256withRSA&lt;/DIV&gt;&lt;DIV&gt;Subject Public Key Algorithm: 2048-bit RSA key&lt;/DIV&gt;&lt;DIV&gt;Version: 3&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Extensions:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;#1: ObjectId: 2.5.29.37 Criticality=false&lt;/DIV&gt;&lt;DIV&gt;ExtendedKeyUsages [&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; serverAuth&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; clientAuth&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;#2: ObjectId: 2.5.29.17 Criticality=false&lt;/DIV&gt;&lt;DIV&gt;SubjectAlternativeName [&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; DNSName: runtime-0.runtime-statefulseheadless.default.svc.cluster.local&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Certificate[2]:&lt;/DIV&gt;&lt;DIV&gt;Owner: CN=ca, OU=orchsym.com&lt;/DIV&gt;&lt;DIV&gt;Issuer: CN=ca, OU=orchsym.com&lt;/DIV&gt;&lt;DIV&gt;Serial number: d7621b97728d0ce0&lt;/DIV&gt;&lt;DIV&gt;Valid from: Mon Jan 08 23:50:34 CST 2024 until: Thu Jan 05 23:50:34 CST 2034&lt;/DIV&gt;&lt;DIV&gt;Certificate fingerprints:&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;MD5:&amp;nbsp; 66:8E:AA:A6:9B:66:E8:48:43:F0:AB:EF:7C:4A:28:09&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;SHA1: DD:EB:20:4E:D1:39:86:87:65:21:6D:BF:8A:FE:35:CB:EB:80:6D:75&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;SHA256: AE:F6:10:DE:50:D2:B2:08:A9:7E:BC:1F:21:89:B7:D4:AD:DB:02:C5:E3:C3:B4:38:FF:28:61:07:A9:EB:B9:4D&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;Signature algorithm name: SHA256withRSA&lt;/DIV&gt;&lt;DIV&gt;Subject Public Key Algorithm: 2048-bit RSA key&lt;/DIV&gt;&lt;DIV&gt;Version: 3&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Extensions:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;#1: ObjectId: 2.5.29.35 Criticality=false&lt;/DIV&gt;&lt;DIV&gt;AuthorityKeyIdentifier [&lt;/DIV&gt;&lt;DIV&gt;KeyIdentifier [&lt;/DIV&gt;&lt;DIV&gt;0000: 65 39 FC E5 58 02 CC 39&amp;nbsp; &amp;nbsp;56 0E 9B F4 A4 EE BB AC&amp;nbsp; e9..X..9V.......&lt;/DIV&gt;&lt;DIV&gt;0010: B9 FC E9 B3&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ....&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;#2: ObjectId: 2.5.29.19 Criticality=false&lt;/DIV&gt;&lt;DIV&gt;BasicConstraints:[&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; CA:true&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; PathLen:2147483647&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;#3: ObjectId: 2.5.29.14 Criticality=false&lt;/DIV&gt;&lt;DIV&gt;SubjectKeyIdentifier [&lt;/DIV&gt;&lt;DIV&gt;KeyIdentifier [&lt;/DIV&gt;&lt;DIV&gt;0000: 65 39 FC E5 58 02 CC 39&amp;nbsp; &amp;nbsp;56 0E 9B F4 A4 EE BB AC&amp;nbsp; e9..X..9V.......&lt;/DIV&gt;&lt;DIV&gt;0010: B9 FC E9 B3&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ....&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;*******************************************&lt;/DIV&gt;&lt;DIV&gt;*******************************************&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;[root@runtime-0 /opt/orchsym/runtime-ee/conf]# keytool -v -list -keystore truststore.jks&lt;/DIV&gt;&lt;DIV&gt;Enter keystore password:&lt;/DIV&gt;&lt;DIV&gt;Keystore type: jks&lt;/DIV&gt;&lt;DIV&gt;Keystore provider: SUN&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Your keystore contains 1 entry&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Alias name: ca&lt;/DIV&gt;&lt;DIV&gt;Creation date: Jan 9, 2024&lt;/DIV&gt;&lt;DIV&gt;Entry type: trustedCertEntry&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Owner: CN=ca, OU=orchsym.com&lt;/DIV&gt;&lt;DIV&gt;Issuer: CN=ca, OU=orchsym.com&lt;/DIV&gt;&lt;DIV&gt;Serial number: d7621b97728d0ce0&lt;/DIV&gt;&lt;DIV&gt;Valid from: Mon Jan 08 23:50:34 CST 2024 until: Thu Jan 05 23:50:34 CST 2034&lt;/DIV&gt;&lt;DIV&gt;Certificate fingerprints:&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;MD5:&amp;nbsp; 66:8E:AA:A6:9B:66:E8:48:43:F0:AB:EF:7C:4A:28:09&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;SHA1: DD:EB:20:4E:D1:39:86:87:65:21:6D:BF:8A:FE:35:CB:EB:80:6D:75&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;SHA256: AE:F6:10:DE:50:D2:B2:08:A9:7E:BC:1F:21:89:B7:D4:AD:DB:02:C5:E3:C3:B4:38:FF:28:61:07:A9:EB:B9:4D&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;Signature algorithm name: SHA256withRSA&lt;/DIV&gt;&lt;DIV&gt;Subject Public Key Algorithm: 2048-bit RSA key&lt;/DIV&gt;&lt;DIV&gt;Version: 3&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Extensions:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;#1: ObjectId: 2.5.29.35 Criticality=false&lt;/DIV&gt;&lt;DIV&gt;AuthorityKeyIdentifier [&lt;/DIV&gt;&lt;DIV&gt;KeyIdentifier [&lt;/DIV&gt;&lt;DIV&gt;0000: 65 39 FC E5 58 02 CC 39&amp;nbsp; &amp;nbsp;56 0E 9B F4 A4 EE BB AC&amp;nbsp; e9..X..9V.......&lt;/DIV&gt;&lt;DIV&gt;0010: B9 FC E9 B3&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ....&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;#2: ObjectId: 2.5.29.19 Criticality=false&lt;/DIV&gt;&lt;DIV&gt;BasicConstraints:[&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; CA:true&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; PathLen:2147483647&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;#3: ObjectId: 2.5.29.14 Criticality=false&lt;/DIV&gt;&lt;DIV&gt;SubjectKeyIdentifier [&lt;/DIV&gt;&lt;DIV&gt;KeyIdentifier [&lt;/DIV&gt;&lt;DIV&gt;0000: 65 39 FC E5 58 02 CC 39&amp;nbsp; &amp;nbsp;56 0E 9B F4 A4 EE BB AC&amp;nbsp; e9..X..9V.......&lt;/DIV&gt;&lt;DIV&gt;0010: B9 FC E9 B3&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ....&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;*******************************************&lt;/DIV&gt;&lt;DIV&gt;*******************************************&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;runtime-1 node：&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;[root@runtime-1 /opt/orchsym/runtime-ee/conf]# keytool -v -list -keystore keystore.jks&lt;/DIV&gt;&lt;DIV&gt;Enter keystore password:&lt;/DIV&gt;&lt;DIV&gt;Keystore type: jks&lt;/DIV&gt;&lt;DIV&gt;Keystore provider: SUN&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Your keystore contains 1 entry&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Alias name: runtime-1.runtime-statefulseheadless.default.svc.cluster.local&lt;/DIV&gt;&lt;DIV&gt;Creation date: Jan 9, 2024&lt;/DIV&gt;&lt;DIV&gt;Entry type: PrivateKeyEntry&lt;/DIV&gt;&lt;DIV&gt;Certificate chain length: 2&lt;/DIV&gt;&lt;DIV&gt;Certificate[1]:&lt;/DIV&gt;&lt;DIV&gt;Owner: CN=runtime-1.runtime-statefulseheadless.default.svc.cluster.local, OU=orchsym.com&lt;/DIV&gt;&lt;DIV&gt;Issuer: CN=ca, OU=orchsym.com&lt;/DIV&gt;&lt;DIV&gt;Serial number: daf0d7df943156cf&lt;/DIV&gt;&lt;DIV&gt;Valid from: Tue Jan 09 11:28:51 CST 2024 until: Fri May 26 11:28:51 CST 2051&lt;/DIV&gt;&lt;DIV&gt;Certificate fingerprints:&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;MD5:&amp;nbsp; 75:3E:10:50:EB:4E:47:CE:8C:0C:F2:D5:AE:9D:99:44&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;SHA1: 7D:A4:B0:07:CA:F1:D2:39:42:EE:91:A7:68:02:92:E1:5D:75:CF:D6&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;SHA256: 05:7E:8A:AC:0C:9B:EE:AE:F9:41:44:AF:69:66:50:8D:32:83:77:48:CC:2F:9D:91:35:33:B4:2D:2A:47:61:E2&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;Signature algorithm name: SHA256withRSA&lt;/DIV&gt;&lt;DIV&gt;Subject Public Key Algorithm: 2048-bit RSA key&lt;/DIV&gt;&lt;DIV&gt;Version: 3&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Extensions:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;#1: ObjectId: 2.5.29.37 Criticality=false&lt;/DIV&gt;&lt;DIV&gt;ExtendedKeyUsages [&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; serverAuth&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; clientAuth&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;#2: ObjectId: 2.5.29.17 Criticality=false&lt;/DIV&gt;&lt;DIV&gt;SubjectAlternativeName [&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; DNSName: runtime-1.runtime-statefulseheadless.default.svc.cluster.local&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Certificate[2]:&lt;/DIV&gt;&lt;DIV&gt;Owner: CN=ca, OU=orchsym.com&lt;/DIV&gt;&lt;DIV&gt;Issuer: CN=ca, OU=orchsym.com&lt;/DIV&gt;&lt;DIV&gt;Serial number: d7621b97728d0ce0&lt;/DIV&gt;&lt;DIV&gt;Valid from: Mon Jan 08 23:50:34 CST 2024 until: Thu Jan 05 23:50:34 CST 2034&lt;/DIV&gt;&lt;DIV&gt;Certificate fingerprints:&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;MD5:&amp;nbsp; 66:8E:AA:A6:9B:66:E8:48:43:F0:AB:EF:7C:4A:28:09&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;SHA1: DD:EB:20:4E:D1:39:86:87:65:21:6D:BF:8A:FE:35:CB:EB:80:6D:75&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;SHA256: AE:F6:10:DE:50:D2:B2:08:A9:7E:BC:1F:21:89:B7:D4:AD:DB:02:C5:E3:C3:B4:38:FF:28:61:07:A9:EB:B9:4D&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;Signature algorithm name: SHA256withRSA&lt;/DIV&gt;&lt;DIV&gt;Subject Public Key Algorithm: 2048-bit RSA key&lt;/DIV&gt;&lt;DIV&gt;Version: 3&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Extensions:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;#1: ObjectId: 2.5.29.35 Criticality=false&lt;/DIV&gt;&lt;DIV&gt;AuthorityKeyIdentifier [&lt;/DIV&gt;&lt;DIV&gt;KeyIdentifier [&lt;/DIV&gt;&lt;DIV&gt;0000: 65 39 FC E5 58 02 CC 39&amp;nbsp; &amp;nbsp;56 0E 9B F4 A4 EE BB AC&amp;nbsp; e9..X..9V.......&lt;/DIV&gt;&lt;DIV&gt;0010: B9 FC E9 B3&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ....&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;#2: ObjectId: 2.5.29.19 Criticality=false&lt;/DIV&gt;&lt;DIV&gt;BasicConstraints:[&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; CA:true&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; PathLen:2147483647&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;#3: ObjectId: 2.5.29.14 Criticality=false&lt;/DIV&gt;&lt;DIV&gt;SubjectKeyIdentifier [&lt;/DIV&gt;&lt;DIV&gt;KeyIdentifier [&lt;/DIV&gt;&lt;DIV&gt;0000: 65 39 FC E5 58 02 CC 39&amp;nbsp; &amp;nbsp;56 0E 9B F4 A4 EE BB AC&amp;nbsp; e9..X..9V.......&lt;/DIV&gt;&lt;DIV&gt;0010: B9 FC E9 B3&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ....&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;*******************************************&lt;/DIV&gt;&lt;DIV&gt;*******************************************&lt;/DIV&gt;&lt;DIV&gt;[root@runtime-1 /opt/orchsym/runtime-ee/conf]# keytool -v -list -keystore truststore.jks&lt;/DIV&gt;&lt;DIV&gt;Enter keystore password:&lt;/DIV&gt;&lt;DIV&gt;Keystore type: jks&lt;/DIV&gt;&lt;DIV&gt;Keystore provider: SUN&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Your keystore contains 1 entry&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Alias name: ca&lt;/DIV&gt;&lt;DIV&gt;Creation date: Jan 9, 2024&lt;/DIV&gt;&lt;DIV&gt;Entry type: trustedCertEntry&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Owner: CN=ca, OU=orchsym.com&lt;/DIV&gt;&lt;DIV&gt;Issuer: CN=ca, OU=orchsym.com&lt;/DIV&gt;&lt;DIV&gt;Serial number: d7621b97728d0ce0&lt;/DIV&gt;&lt;DIV&gt;Valid from: Mon Jan 08 23:50:34 CST 2024 until: Thu Jan 05 23:50:34 CST 2034&lt;/DIV&gt;&lt;DIV&gt;Certificate fingerprints:&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;MD5:&amp;nbsp; 66:8E:AA:A6:9B:66:E8:48:43:F0:AB:EF:7C:4A:28:09&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;SHA1: DD:EB:20:4E:D1:39:86:87:65:21:6D:BF:8A:FE:35:CB:EB:80:6D:75&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;SHA256: AE:F6:10:DE:50:D2:B2:08:A9:7E:BC:1F:21:89:B7:D4:AD:DB:02:C5:E3:C3:B4:38:FF:28:61:07:A9:EB:B9:4D&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;Signature algorithm name: SHA256withRSA&lt;/DIV&gt;&lt;DIV&gt;Subject Public Key Algorithm: 2048-bit RSA key&lt;/DIV&gt;&lt;DIV&gt;Version: 3&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Extensions:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;#1: ObjectId: 2.5.29.35 Criticality=false&lt;/DIV&gt;&lt;DIV&gt;AuthorityKeyIdentifier [&lt;/DIV&gt;&lt;DIV&gt;KeyIdentifier [&lt;/DIV&gt;&lt;DIV&gt;0000: 65 39 FC E5 58 02 CC 39&amp;nbsp; &amp;nbsp;56 0E 9B F4 A4 EE BB AC&amp;nbsp; e9..X..9V.......&lt;/DIV&gt;&lt;DIV&gt;0010: B9 FC E9 B3&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ....&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;#2: ObjectId: 2.5.29.19 Criticality=false&lt;/DIV&gt;&lt;DIV&gt;BasicConstraints:[&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; CA:true&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; PathLen:2147483647&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;#3: ObjectId: 2.5.29.14 Criticality=false&lt;/DIV&gt;&lt;DIV&gt;SubjectKeyIdentifier [&lt;/DIV&gt;&lt;DIV&gt;KeyIdentifier [&lt;/DIV&gt;&lt;DIV&gt;0000: 65 39 FC E5 58 02 CC 39&amp;nbsp; &amp;nbsp;56 0E 9B F4 A4 EE BB AC&amp;nbsp; e9..X..9V.......&lt;/DIV&gt;&lt;DIV&gt;0010: B9 FC E9 B3&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ....&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;]&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;*******************************************&lt;/DIV&gt;&lt;DIV&gt;*******************************************&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 09 Jan 2024 03:31:06 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381775#M244403</guid>
      <dc:creator>JamesZhang</dc:creator>
      <dc:date>2024-01-09T03:31:06Z</dc:date>
    </item>
    <item>
      <title>Re: javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown</title>
      <link>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381776#M244404</link>
      <description>&lt;P&gt;Ignore the difference between runtime-0.runtime-statefulset.default.svc.cluster.local and runtime-0.runtime-statefulseheadless.default.svc.cluster.local, because I'm putting the dns of the current cluster node from the former to the latter.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 03:33:38 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381776#M244404</guid>
      <dc:creator>JamesZhang</dc:creator>
      <dc:date>2024-01-09T03:33:38Z</dc:date>
    </item>
    <item>
      <title>Re: javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown</title>
      <link>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381777#M244405</link>
      <description>&lt;P&gt;It was after I logged in that the problem occurred.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 03:34:16 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381777#M244405</guid>
      <dc:creator>JamesZhang</dc:creator>
      <dc:date>2024-01-09T03:34:16Z</dc:date>
    </item>
    <item>
      <title>Re: javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown</title>
      <link>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381806#M244419</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/108607"&gt;@JamesZhang&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The logs shared indicate a TLS exchange issue.&lt;BR /&gt;&lt;BR /&gt;Have you looked at the output of openssl to see what your running NiFi responds with:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;openssl s_client -connect runtime-0.runtime-statefulset.default.svc.cluster.local:443 -showcerts&lt;/LI-CODE&gt;&lt;P&gt;and&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;openssl s_client -connect runtime-1.runtime-statefulset.default.svc.cluster.local:443 -showcerts&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 15:03:40 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381806#M244419</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2024-01-09T15:03:40Z</dc:date>
    </item>
    <item>
      <title>Re: javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown</title>
      <link>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381820#M244427</link>
      <description>&lt;P&gt;[root@runtime-1 /opt/orchsym/runtime-ee]# openssl s_client -connect runtime-0.runtime-statefulset.default.svc.cluster.local:443 -showcerts&lt;BR /&gt;CONNECTED(00000003)&lt;BR /&gt;depth=1 OU = orchsym.com, CN = ca&lt;BR /&gt;verify error:num=19:self signed certificate in certificate chain&lt;BR /&gt;---&lt;BR /&gt;Certificate chain&lt;BR /&gt;0 s:/OU=orchsym.com/CN=runtime-0.runtime-statefulset.default.svc.cluster.local&lt;BR /&gt;i:/OU=orchsym.com/CN=ca&lt;BR /&gt;-----BEGIN CERTIFICATE-----&lt;BR /&gt;MIIDZTCCAk2gAwIBAgIJAMjrw8P09eTSMA0GCSqGSIb3DQEBCwUAMCMxFDASBgNV&lt;BR /&gt;BAsMC29yY2hzeW0uY29tMQswCQYDVQQDDAJjYTAgFw0yNDAxMDkxNzAwMzVaGA8y&lt;BR /&gt;MDUxMDUyNjE3MDAzNVowWDEUMBIGA1UECwwLb3JjaHN5bS5jb20xQDA+BgNVBAMM&lt;BR /&gt;N3J1bnRpbWUtMC5ydW50aW1lLXN0YXRlZnVsc2V0LmRlZmF1bHQuc3ZjLmNsdXN0&lt;BR /&gt;ZXIubG9jYWwwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCYDBOx7r3e&lt;BR /&gt;33zFDM8VilMZU4J/oWYKUe0eesd9gWsqIMUm26/ImQVN0aQIrOylLOLftcEXkQp8&lt;BR /&gt;BAkuo+IgbBzoQBEqDmHsktwcLld+04tRQMijL7RbieqN0sMqoHs/XRdB7bhfel73&lt;BR /&gt;ffnBQ2nctZCynuTQ7aem5ubzKMm5oQRPXPB5jJ3A5FwKy/F4lpdJsEZRVVohl0xt&lt;BR /&gt;kTIxpxvEu8OpuElajh34Lhn59yVNS4qkubsOE7ll+RPzHve0YeuUZXEjK41N3zLI&lt;BR /&gt;zNe5HDVGYpI6sQdGinY/u+2lP5Vm7LDFm67PjT/LfrQ/g5CRzo1dHxyniN0zuSg2&lt;BR /&gt;VTIV94Z8takhAgMBAAGjZTBjMEIGA1UdEQQ7MDmCN3J1bnRpbWUtMC5ydW50aW1l&lt;BR /&gt;LXN0YXRlZnVsc2V0LmRlZmF1bHQuc3ZjLmNsdXN0ZXIubG9jYWwwHQYDVR0lBBYw&lt;BR /&gt;FAYIKwYBBQUHAwEGCCsGAQUFBwMCMA0GCSqGSIb3DQEBCwUAA4IBAQDFAmP0YLbN&lt;BR /&gt;Cy0d/QPiXYhbOLWEGC+/Y1xMMIxfo6uxlhThp97IU0AFk9Q9sC/DTZ092+Mccp3w&lt;BR /&gt;eImOswQWiHjT+CKYpwpgnD5lQLf1l/6WNT/ffnRoCVH/iq6kkRp38KUI0l205kAw&lt;BR /&gt;2ZKlbS8AC1GC6U4ZEETgUjN1kSbgo3iA6oq9RKd0vi9gC3OfZg9NeSUGbil1rFrt&lt;BR /&gt;9jtGQgqu0WGe/mVFJ6wqS4yXvSavAVCpm7AQh00CwgtCGTIZ/zZmO9YtW/LwdTfC&lt;BR /&gt;h80ypeUVyekzpFANNPSjMp2JgP4PuwUX+RITq86n2biIQAgPf5KgGvvOgd4cEY2w&lt;BR /&gt;E6m0oHH8zgY0&lt;BR /&gt;-----END CERTIFICATE-----&lt;BR /&gt;1 s:/OU=orchsym.com/CN=ca&lt;BR /&gt;i:/OU=orchsym.com/CN=ca&lt;BR /&gt;-----BEGIN CERTIFICATE-----&lt;BR /&gt;MIIDGTCCAgGgAwIBAgIJANdiG5dyjQzgMA0GCSqGSIb3DQEBCwUAMCMxFDASBgNV&lt;BR /&gt;BAsMC29yY2hzeW0uY29tMQswCQYDVQQDDAJjYTAeFw0yNDAxMDgxNTUwMzRaFw0z&lt;BR /&gt;NDAxMDUxNTUwMzRaMCMxFDASBgNVBAsMC29yY2hzeW0uY29tMQswCQYDVQQDDAJj&lt;BR /&gt;YTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANsBJ0dfZkk1efw2EgKt&lt;BR /&gt;3b8AynVDq3B/UKRmtkVJmvH+Ja4lfqlpcZMO8L4cCNOHJzEPHFSitlQoagTmiBL0&lt;BR /&gt;axnrd5upk3UlM/JctZOCBVwR9d2t0RE6Z7P7HAaFyxJXGj7oYC7xjYxuVVuN56B9&lt;BR /&gt;BTZWX6X9k2Dz659cTsLsQGc0Uf69chuUvN0kycm3DpKBRVSg2kc8e9Rbnn+w69J6&lt;BR /&gt;fE6goEixE5ysZAwzDTUHnx9GiRI0l8BEOqki8yoGahRZzEBw3OpWfvStqfXROMN/&lt;BR /&gt;+mPzN9EHAowyNGLbjbusmDAsJ7ojB39klxm8qvUDY71sVY7stGoCUxXLvTRgXAct&lt;BR /&gt;xo0CAwEAAaNQME4wHQYDVR0OBBYEFGU5/OVYAsw5Vg6b9KTuu6y5/OmzMB8GA1Ud&lt;BR /&gt;IwQYMBaAFGU5/OVYAsw5Vg6b9KTuu6y5/OmzMAwGA1UdEwQFMAMBAf8wDQYJKoZI&lt;BR /&gt;hvcNAQELBQADggEBAKnim+IdTeDy7KmWZxAyj2qGyz/cSK2dqkYU1iLcc492mXFU&lt;BR /&gt;RtD+ZTI7zGOFfZ1i7TIX7+Or2SjJ1EeCBUJLVt0nHnESWQR7TlTn03wFwLyf95Bd&lt;BR /&gt;3e+OqDUdj3DhWp1bfb0JIbWBA6nLBNLOjgCjpV/X8m9o0+3E6FV/zjbjUNlpZXra&lt;BR /&gt;Gwmi839Ko+9KX/44tTgLMQKB34H28k4HBnunnD/GUImXYchzeSnlmFpheKQ0/MVM&lt;BR /&gt;LVDSX3BZFPpImmmaqithUOT+MRRfQL/MRpVqLy1oja5RVpP+kKPZxo2p9wn3heyP&lt;BR /&gt;PjaC4NSkV6E4hdddOkVIz01jO9Bxse9aCpfPo34=&lt;BR /&gt;-----END CERTIFICATE-----&lt;BR /&gt;---&lt;BR /&gt;Server certificate&lt;BR /&gt;subject=/OU=orchsym.com/CN=runtime-0.runtime-statefulset.default.svc.cluster.local&lt;BR /&gt;issuer=/OU=orchsym.com/CN=ca&lt;BR /&gt;---&lt;BR /&gt;Acceptable client certificate CA names&lt;BR /&gt;/OU=orchsym.com/CN=ca&lt;BR /&gt;Client Certificate Types: RSA sign, DSA sign, ECDSA sign&lt;BR /&gt;Requested Signature Algorithms: ECDSA+SHA512:RSA+SHA512:ECDSA+SHA384:RSA+SHA384:ECDSA+SHA256:RSA+SHA256:DSA+SHA256:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:ECDSA+SHA1:RSA+SHA1:DSA+SHA1&lt;BR /&gt;Shared Requested Signature Algorithms: ECDSA+SHA512:RSA+SHA512:ECDSA+SHA384:RSA+SHA384:ECDSA+SHA256:RSA+SHA256:DSA+SHA256:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:ECDSA+SHA1:RSA+SHA1:DSA+SHA1&lt;BR /&gt;Peer signing digest: SHA512&lt;BR /&gt;Server Temp Key: ECDH, P-256, 256 bits&lt;BR /&gt;---&lt;BR /&gt;SSL handshake has read 2290 bytes and written 483 bytes&lt;BR /&gt;---&lt;BR /&gt;New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-SHA384&lt;BR /&gt;Server public key is 2048 bit&lt;BR /&gt;Secure Renegotiation IS supported&lt;BR /&gt;Compression: NONE&lt;BR /&gt;Expansion: NONE&lt;BR /&gt;No ALPN negotiated&lt;BR /&gt;SSL-Session:&lt;BR /&gt;Protocol : TLSv1.2&lt;BR /&gt;Cipher : ECDHE-RSA-AES256-SHA384&lt;BR /&gt;Session-ID: 659D7F10CB1256340096AE6B793A0EF99256807F5742D7B70EC637F0C1C8B5B6&lt;BR /&gt;Session-ID-ctx:&lt;BR /&gt;Master-Key: 3954CAAFF578E3D28D47394B42DBD2CE432D0D86C1D2C1D560BB2AF1E6AF982E812B40AD0D6142A2990622726C4B5399&lt;BR /&gt;Key-Arg : None&lt;BR /&gt;Krb5 Principal: None&lt;BR /&gt;PSK identity: None&lt;BR /&gt;PSK identity hint: None&lt;BR /&gt;Start Time: 1704820496&lt;BR /&gt;Timeout : 300 (sec)&lt;BR /&gt;Verify return code: 19 (self signed certificate in certificate chain)&lt;BR /&gt;---&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 17:15:20 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381820#M244427</guid>
      <dc:creator>JamesZhang</dc:creator>
      <dc:date>2024-01-09T17:15:20Z</dc:date>
    </item>
    <item>
      <title>Re: javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown</title>
      <link>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381821#M244428</link>
      <description>&lt;P&gt;[root@runtime-1 /opt/orchsym/runtime-ee]# openssl s_client -connect runtime-1.runtime-statefulset.default.svc.cluster.local:443 -showcerts&lt;BR /&gt;CONNECTED(00000003)&lt;BR /&gt;depth=1 OU = orchsym.com, CN = ca&lt;BR /&gt;verify error:num=19:self signed certificate in certificate chain&lt;BR /&gt;---&lt;BR /&gt;Certificate chain&lt;BR /&gt;0 s:/OU=orchsym.com/CN=runtime-1.runtime-statefulset.default.svc.cluster.local&lt;BR /&gt;i:/OU=orchsym.com/CN=ca&lt;BR /&gt;-----BEGIN CERTIFICATE-----&lt;BR /&gt;MIIDZTCCAk2gAwIBAgIJAOda8vSMjty7MA0GCSqGSIb3DQEBCwUAMCMxFDASBgNV&lt;BR /&gt;BAsMC29yY2hzeW0uY29tMQswCQYDVQQDDAJjYTAgFw0yNDAxMDkxNjU5NTlaGA8y&lt;BR /&gt;MDUxMDUyNjE2NTk1OVowWDEUMBIGA1UECwwLb3JjaHN5bS5jb20xQDA+BgNVBAMM&lt;BR /&gt;N3J1bnRpbWUtMS5ydW50aW1lLXN0YXRlZnVsc2V0LmRlZmF1bHQuc3ZjLmNsdXN0&lt;BR /&gt;ZXIubG9jYWwwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCiqFVT+BcV&lt;BR /&gt;L/7RdRz26cXeUw8ifP3omnTm3f4MzRHOOvlJMqQaoUdsDTooReYl4uF07vPmewGG&lt;BR /&gt;iOKhU4R4veucf9WNIzCY52PaDlcnPDcQhJisytHK+L+Cca5kNZ+eUzk8ywe5zR1a&lt;BR /&gt;t760THdweuHNeh9UaKkXgjDu0XdWh80VQ2rWOrbsJzikyUlAZ7olV/boGXD05EtX&lt;BR /&gt;mUG0a5K9KOccPn7HLOv3nOas0fqWDj2bYhxhCU8dwT2LaiNbsIyph7INZGp8ZxzT&lt;BR /&gt;T70ZpDJKguzGOSZwRTEyvCC3CjqjS4CWPB5RPQEYKHrPc0t5bXuixToITySgIX1/&lt;BR /&gt;BPL8RxftkpDFAgMBAAGjZTBjMEIGA1UdEQQ7MDmCN3J1bnRpbWUtMS5ydW50aW1l&lt;BR /&gt;LXN0YXRlZnVsc2V0LmRlZmF1bHQuc3ZjLmNsdXN0ZXIubG9jYWwwHQYDVR0lBBYw&lt;BR /&gt;FAYIKwYBBQUHAwEGCCsGAQUFBwMCMA0GCSqGSIb3DQEBCwUAA4IBAQCS1zXSEU72&lt;BR /&gt;GF7K9L6Cjdc9dTB8/+d31IDPzQBPwtBTjHODz3PSYCaXnf08CZzEcM4KrzXrBfeM&lt;BR /&gt;LFjRnfD7tpM06hfRAqnACfAF5I9M6P6tXopaTQ5YOHerDnJJgvStdYd0yAh19/zu&lt;BR /&gt;8+Qvmjd5bdZ1h9adA1wXbvWfL1hEbJUHs/Zjx0qDYP4R06pM+TR6SbjCNxqvsJDJ&lt;BR /&gt;8ELpNp8Ykda7ht0vFqILAhJgNK4OV6Akklfv/Tkk0KXTMmws/tLfhz+MuLu/uj2f&lt;BR /&gt;p0BHlwUniIo2IthM0DAOSBJblZhGdCbMeNh2SiLMQ1Xg2QX3L0g5CZK84TRnnuKH&lt;BR /&gt;MNWaCMfYo6Yv&lt;BR /&gt;-----END CERTIFICATE-----&lt;BR /&gt;1 s:/OU=orchsym.com/CN=ca&lt;BR /&gt;i:/OU=orchsym.com/CN=ca&lt;BR /&gt;-----BEGIN CERTIFICATE-----&lt;BR /&gt;MIIDGTCCAgGgAwIBAgIJANdiG5dyjQzgMA0GCSqGSIb3DQEBCwUAMCMxFDASBgNV&lt;BR /&gt;BAsMC29yY2hzeW0uY29tMQswCQYDVQQDDAJjYTAeFw0yNDAxMDgxNTUwMzRaFw0z&lt;BR /&gt;NDAxMDUxNTUwMzRaMCMxFDASBgNVBAsMC29yY2hzeW0uY29tMQswCQYDVQQDDAJj&lt;BR /&gt;YTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANsBJ0dfZkk1efw2EgKt&lt;BR /&gt;3b8AynVDq3B/UKRmtkVJmvH+Ja4lfqlpcZMO8L4cCNOHJzEPHFSitlQoagTmiBL0&lt;BR /&gt;axnrd5upk3UlM/JctZOCBVwR9d2t0RE6Z7P7HAaFyxJXGj7oYC7xjYxuVVuN56B9&lt;BR /&gt;BTZWX6X9k2Dz659cTsLsQGc0Uf69chuUvN0kycm3DpKBRVSg2kc8e9Rbnn+w69J6&lt;BR /&gt;fE6goEixE5ysZAwzDTUHnx9GiRI0l8BEOqki8yoGahRZzEBw3OpWfvStqfXROMN/&lt;BR /&gt;+mPzN9EHAowyNGLbjbusmDAsJ7ojB39klxm8qvUDY71sVY7stGoCUxXLvTRgXAct&lt;BR /&gt;xo0CAwEAAaNQME4wHQYDVR0OBBYEFGU5/OVYAsw5Vg6b9KTuu6y5/OmzMB8GA1Ud&lt;BR /&gt;IwQYMBaAFGU5/OVYAsw5Vg6b9KTuu6y5/OmzMAwGA1UdEwQFMAMBAf8wDQYJKoZI&lt;BR /&gt;hvcNAQELBQADggEBAKnim+IdTeDy7KmWZxAyj2qGyz/cSK2dqkYU1iLcc492mXFU&lt;BR /&gt;RtD+ZTI7zGOFfZ1i7TIX7+Or2SjJ1EeCBUJLVt0nHnESWQR7TlTn03wFwLyf95Bd&lt;BR /&gt;3e+OqDUdj3DhWp1bfb0JIbWBA6nLBNLOjgCjpV/X8m9o0+3E6FV/zjbjUNlpZXra&lt;BR /&gt;Gwmi839Ko+9KX/44tTgLMQKB34H28k4HBnunnD/GUImXYchzeSnlmFpheKQ0/MVM&lt;BR /&gt;LVDSX3BZFPpImmmaqithUOT+MRRfQL/MRpVqLy1oja5RVpP+kKPZxo2p9wn3heyP&lt;BR /&gt;PjaC4NSkV6E4hdddOkVIz01jO9Bxse9aCpfPo34=&lt;BR /&gt;-----END CERTIFICATE-----&lt;BR /&gt;---&lt;BR /&gt;Server certificate&lt;BR /&gt;subject=/OU=orchsym.com/CN=runtime-1.runtime-statefulset.default.svc.cluster.local&lt;BR /&gt;issuer=/OU=orchsym.com/CN=ca&lt;BR /&gt;---&lt;BR /&gt;Acceptable client certificate CA names&lt;BR /&gt;/OU=orchsym.com/CN=ca&lt;BR /&gt;Client Certificate Types: RSA sign, DSA sign, ECDSA sign&lt;BR /&gt;Requested Signature Algorithms: ECDSA+SHA512:RSA+SHA512:ECDSA+SHA384:RSA+SHA384:ECDSA+SHA256:RSA+SHA256:DSA+SHA256:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:ECDSA+SHA1:RSA+SHA1:DSA+SHA1&lt;BR /&gt;Shared Requested Signature Algorithms: ECDSA+SHA512:RSA+SHA512:ECDSA+SHA384:RSA+SHA384:ECDSA+SHA256:RSA+SHA256:DSA+SHA256:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:ECDSA+SHA1:RSA+SHA1:DSA+SHA1&lt;BR /&gt;Peer signing digest: SHA512&lt;BR /&gt;Server Temp Key: ECDH, P-256, 256 bits&lt;BR /&gt;---&lt;BR /&gt;SSL handshake has read 2290 bytes and written 483 bytes&lt;BR /&gt;---&lt;BR /&gt;New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-SHA384&lt;BR /&gt;Server public key is 2048 bit&lt;BR /&gt;Secure Renegotiation IS supported&lt;BR /&gt;Compression: NONE&lt;BR /&gt;Expansion: NONE&lt;BR /&gt;No ALPN negotiated&lt;BR /&gt;SSL-Session:&lt;BR /&gt;Protocol : TLSv1.2&lt;BR /&gt;Cipher : ECDHE-RSA-AES256-SHA384&lt;BR /&gt;Session-ID: 659D7F31DA4A0985B0E70BC8EBF9000310D5D5959F18ADB88E42283E98010508&lt;BR /&gt;Session-ID-ctx:&lt;BR /&gt;Master-Key: 0E9CE0E6F358A489908FA748D77876B1A66B6D8FDF9BC906BEC55442700D0A59EBF62AED6A88D42FD4FF4A375BBE1438&lt;BR /&gt;Key-Arg : None&lt;BR /&gt;Krb5 Principal: None&lt;BR /&gt;PSK identity: None&lt;BR /&gt;PSK identity hint: None&lt;BR /&gt;Start Time: 1704820529&lt;BR /&gt;Timeout : 300 (sec)&lt;BR /&gt;Verify return code: 19 (self signed certificate in certificate chain)&lt;BR /&gt;---&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 17:15:43 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381821#M244428</guid>
      <dc:creator>JamesZhang</dc:creator>
      <dc:date>2024-01-09T17:15:43Z</dc:date>
    </item>
    <item>
      <title>Re: javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown</title>
      <link>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381822#M244429</link>
      <description>&lt;P&gt;I've looked at its output via openssl and it indicates a self-signed certificate for the grant.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The output I fed back above. I don't know if you have viewed any errors that I haven't noticed.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 17:17:25 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/381822#M244429</guid>
      <dc:creator>JamesZhang</dc:creator>
      <dc:date>2024-01-09T17:17:25Z</dc:date>
    </item>
    <item>
      <title>Re: javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown</title>
      <link>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/382042#M244471</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/108607"&gt;@JamesZhang&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Certainly a challenging issue you have here.&amp;nbsp; The shared output all points to good certificates, but gets you no closer to why the mutualTLS exchange between your two Nifi nodes is no yielding a successful mutual TLS handshake.&lt;BR /&gt;&lt;BR /&gt;I guess I would start by looking at the configuration of NiFi on both nodes to make sure configurations in the nifi.properties files on both nodes match.&amp;nbsp; Verify that both nodes NiFi's are using same Java version. You may need to look at the network traffic between both nodes as well.&amp;nbsp; Is there some device (load balancer, firewall, etc) between those nodes on the network that may be interfering with the certificate exchange.&lt;BR /&gt;&lt;BR /&gt;Matt&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2024 21:22:53 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/javax-net-ssl-SSLHandshakeException-Received-fatal-alert/m-p/382042#M244471</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2024-01-11T21:22:53Z</dc:date>
    </item>
  </channel>
</rss>

