<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: SSL handshake error when configuring SSL for Cloudera Navigator (cloudera-navigator.properties) in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/SSL-handshake-error-when-configuring-SSL-for-Cloudera/m-p/26587#M32252</link>
    <description>&lt;P&gt;&lt;EM&gt;"Trust" is established differently between the two implementations, Navigator, being Java based, will derive trust through the default JDK mechanisms I pointed out&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are looking into whether we need to use keytool utility to generate those or use our FreeIPA server to generate certs for Navigator...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 16 Apr 2015 19:23:12 GMT</pubDate>
    <dc:creator>nataliaking_csc</dc:creator>
    <dc:date>2015-04-16T19:23:12Z</dc:date>
    <item>
      <title>SSL handshake error when configuring SSL for Cloudera Navigator (cloudera-navigator.properties)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/SSL-handshake-error-when-configuring-SSL-for-Cloudera/m-p/26551#M32246</link>
      <description>&lt;P&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;After having succesfully enabled TLS encryption between Server and Agents, I am unable to load Cloudera Navigator UI. The log is pointing at issues with SSL handshake.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;I understand I need to configure SSL for Cloudera Navigator in addition to this, so I followed guidelines from Cloudera documentation:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;Open the Cloudera Manager Admin Console and navigate to the Cloudera Management Service.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;Click Configuration.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;Go to the Navigator Metadata Server Default Group &amp;gt; Advanced category, and add the following strings to the Navigator Metadata Server Advanced Configuration Snippet (Safety Valve) for cloudera-navigator.properties property.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;nav.http.enable_ssl=true&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;nav.ssl.keyStore=&amp;lt;path to jks keystore with signed server certificate installed&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;nav.ssl.keyStorePassword=&amp;lt;password&amp;gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;Click Save Changes.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;Restart the Navigator Metadata server.&lt;/FONT&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;After I added cloudera-navigator.properties to Safety Valve and restarted, Cloudera Management Services became unhealthy and I had to revert my change. &lt;/FONT&gt;&lt;FONT size="2"&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;I would like to clarify what values exactly go into nav.ssl.keyStore and nav.ssl.keyStorePassword. I have set nav.ssl.keyStore to same&lt;/FONT&gt; &lt;FONT face="arial,helvetica,sans-serif"&gt;value as &lt;/FONT&gt;&lt;/FONT&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&lt;SPAN&gt;&lt;FONT color="#000000"&gt;ssl.client.truststore.location, since this is where my keystore file lives&lt;/FONT&gt;.&amp;nbsp; &lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;2015-04-15 17:54:02,572 WARN com.cloudera.enterprise.EnterpriseService: Exception in scheduled runnable.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;javax.ws.rs.client.ClientException: org.apache.cxf.interceptor.Fault: Could not send Message.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at org.apache.cxf.jaxrs.client.AbstractClient.checkClientException(AbstractClient.java:548)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at org.apache.cxf.jaxrs.client.AbstractClient.preProcessResult(AbstractClient.java:534)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at org.apache.cxf.jaxrs.client.ClientProxyImpl.doChainedInvocation(ClientProxyImpl.java:545)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at org.apache.cxf.jaxrs.client.ClientProxyImpl.invoke(ClientProxyImpl.java:206)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at com.sun.proxy.$Proxy35.readRoles(Unknown Source)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at com.cloudera.nav.cm.CmApiClient.getMgmtRoleByType(CmApiClient.java:224)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at com.cloudera.navigator.ActivityPollingService.getAmonNozzle(ActivityPollingService.java:189)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at com.cloudera.navigator.ActivityPollingService.run(ActivityPollingService.java:108)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at com.cloudera.enterprise.PeriodicEnterpriseService$UnexceptionablePeriodicRunnable.run(PeriodicEnterpriseService.java:67)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at java.lang.Thread.run(Thread.java:745)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;Caused by: org.apache.cxf.interceptor.Fault: Could not send Message.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at org.apache.cxf.interceptor.MessageSenderInterceptor$MessageSenderEndingInterceptor.handleMessage(MessageSenderInterceptor.java:64)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:271)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at org.apache.cxf.jaxrs.client.AbstractClient.doRunInterceptorChain(AbstractClient.java:607)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at org.apache.cxf.jaxrs.client.ClientProxyImpl.doChainedInvocation(ClientProxyImpl.java:543)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;... 7 more&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;Caused by: javax.net.ssl.SSLHandshakeException: SSLHandshakeException invoking https://{HOSTNAME}:7183/api/v4/cm/service/roles: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.reflect.GeneratedConstructorAccessor51.newInstance(Unknown Source)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:45)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at java.lang.reflect.Constructor.newInstance(Constructor.java:526)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.mapException(HTTPConduit.java:1338)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.close(HTTPConduit.java:1322)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at org.apache.cxf.transport.AbstractConduit.close(AbstractConduit.java:56)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at org.apache.cxf.transport.http.HTTPConduit.close(HTTPConduit.java:622)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at org.apache.cxf.interceptor.MessageSenderInterceptor$MessageSenderEndingInterceptor.handleMessage(MessageSenderInterceptor.java:62)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;... 10 more&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;Caused by: javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.security.ssl.Alerts.getSSLException(Alerts.java:192)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1884)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:276)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:270)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1341)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:153)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.security.ssl.Handshaker.processLoop(Handshaker.java:868)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.security.ssl.Handshaker.process_record(Handshaker.java:804)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1016)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1312)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1339)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1323)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.net.&lt;A target="_blank" href="http://www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:563)"&gt;www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:563)&lt;/A&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.net.&lt;A target="_blank" href="http://www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:185)"&gt;www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:185)&lt;/A&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.net.&lt;A target="_blank" href="http://www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1300)"&gt;www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1300)&lt;/A&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at java.net.HttpURLConnection.getResponseCode(HttpURLConnection.java:468)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.net.&lt;A target="_blank" href="http://www.protocol.https.HttpsURLConnectionImpl.getResponseCode(HttpsURLConnectionImpl.java:338)"&gt;www.protocol.https.HttpsURLConnectionImpl.getResponseCode(HttpsURLConnectionImpl.java:338)&lt;/A&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at org.apache.cxf.transport.http.URLConnectionHTTPConduit$URLConnectionWrappedOutputStream.getResponseCode(URLConnectionHTTPConduit.java:260)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.handleResponseInternal(HTTPConduit.java:1517)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.handleResponse(HTTPConduit.java:1490)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at org.apache.cxf.transport.http.HTTPConduit$WrappedOutputStream.close(HTTPConduit.java:1309)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;... 13 more&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:385)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:292)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.security.validator.Validator.validate(Validator.java:260)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:326)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:231)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:126)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1323)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;... 29 more&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:196)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at java.security.cert.CertPathBuilder.build(CertPathBuilder.java:268)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;at sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:380)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;... 35 more&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2022 09:26:34 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/SSL-handshake-error-when-configuring-SSL-for-Cloudera/m-p/26551#M32246</guid>
      <dc:creator>nataliaking_csc</dc:creator>
      <dc:date>2022-09-16T09:26:34Z</dc:date>
    </item>
    <item>
      <title>Re: SSL handshake error when configuring SSL for Cloudera Navigator (cloudera-navigator.properties)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/SSL-handshake-error-when-configuring-SSL-for-Cloudera/m-p/26552#M32247</link>
      <description>&lt;P&gt;Troubleshooting SSL/TLS Connectivity. Verified connectivity.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;**{HOSTNAME} refers to the hostname listed in the logs, where Cloudera Manager Server lives&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;# openssl s_client -connect {HOSTNAME}:7183&lt;BR /&gt;CONNECTED(00000003)&lt;BR /&gt;depth=1 O = PLATFORM.{OUR_DOMAIN], CN = Certificate Authority&lt;BR /&gt;verify error:num=19:self signed certificate in certificate chain&lt;BR /&gt;verify return:0&lt;BR /&gt;---&lt;BR /&gt;Certificate chain&lt;BR /&gt;&amp;nbsp;0 s:/O=PLATFORM.{OUR_DOMAIN]/CN={HOSTNAME}&lt;BR /&gt;&amp;nbsp;&amp;nbsp; i:/O=PLATFORM.{OUR_DOMAIN]/CN=Certificate Authority&lt;BR /&gt;&amp;nbsp;1 s:/O=PLATFORM.{OUR_DOMAIN]/CN=Certificate Authority&lt;BR /&gt;&amp;nbsp;&amp;nbsp; i:/O=PLATFORM.{OUR_DOMAIN]/CN=Certificate Authority&lt;BR /&gt;---&lt;BR /&gt;Server certificate&lt;BR /&gt;-----BEGIN CERTIFICATE-----&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;...here goes our certificate&lt;BR /&gt;&lt;BR /&gt;-----END CERTIFICATE-----&lt;BR /&gt;subject=/O=PLATFORM.{OUR_DOMAIN]/CN={HOSTNAME}&lt;BR /&gt;issuer=/O=PLATFORM.{OUR_DOMAIN]/CN=Certificate Authority&lt;BR /&gt;---&lt;BR /&gt;No client certificate CA names sent&lt;BR /&gt;Server Temp Key: ECDH, ___, 521 bits&lt;BR /&gt;---&lt;BR /&gt;SSL handshake has read 2508 bytes and written 511 bytes&lt;BR /&gt;---&lt;BR /&gt;New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-SHA384&lt;BR /&gt;Server public key is 2048 bit&lt;BR /&gt;Secure Renegotiation IS supported&lt;BR /&gt;Compression: NONE&lt;BR /&gt;Expansion: NONE&lt;BR /&gt;SSL-Session:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol&amp;nbsp; : TLSv1.2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cipher&amp;nbsp;&amp;nbsp;&amp;nbsp; : ___&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session-ID: ___&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session-ID-ctx:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Master-Key: ___&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Key-Arg&amp;nbsp;&amp;nbsp; : None&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Krb5 Principal: None&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; PSK identity: None&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; PSK identity hint: None&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Start Time: 1429155044&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Timeout&amp;nbsp;&amp;nbsp; : 300 (sec)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Verify return code: 19 (self signed certificate in certificate chain)&lt;BR /&gt;---&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jun 2015 15:32:43 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/SSL-handshake-error-when-configuring-SSL-for-Cloudera/m-p/26552#M32247</guid>
      <dc:creator>nataliaking_csc</dc:creator>
      <dc:date>2015-06-18T15:32:43Z</dc:date>
    </item>
    <item>
      <title>Re: SSL handshake error when configuring SSL for Cloudera Navigator (cloudera-navigator.properties)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/SSL-handshake-error-when-configuring-SSL-for-Cloudera/m-p/26553#M32248</link>
      <description>&lt;P&gt;I was looking some more to confirm that the issue is between Cloudera Navigator host and Cloudera Manager host:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2015-04-15 23:20:50,677 WARN 236787520@scm-web-23643:org.mortbay.log: SSL renegotiate denied: java.nio.channels.SocketChannel[connected local=/{CM_SERVER_HOST}:7183 remote=/{NAVIGATOR_HOST}:50359]&lt;/P&gt;&lt;P&gt;2015-04-15 23:20:57,174 WARN 236787520@scm-web-23643:org.mortbay.log: javax.net.ssl.SSLException: Received fatal alert: certificate_unknown&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2015 04:03:18 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/SSL-handshake-error-when-configuring-SSL-for-Cloudera/m-p/26553#M32248</guid>
      <dc:creator>nataliaking_csc</dc:creator>
      <dc:date>2015-04-16T04:03:18Z</dc:date>
    </item>
    <item>
      <title>Re: SSL handshake error when configuring SSL for Cloudera Navigator (cloudera-navigator.properties)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/SSL-handshake-error-when-configuring-SSL-for-Cloudera/m-p/26554#M32249</link>
      <description>&lt;P&gt;Have you established implicit trust for your private CA in the JDK layer as discussed in our documentation on encryption for the platform, as laid out here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A target="_blank" href="http://www.cloudera.com/content/cloudera/en/documentation/core/latest/topics/cm_sg_create_key_trust.html"&gt;http://www.cloudera.com/content/cloudera/en/documentation/core/latest/topics/cm_sg_create_key_trust.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can import the CA's certificate into the [JAVA_HOME]/jre/lib/security path, using cacerts or jssecacerts as you see fit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Trust in the JDK is documented in detail here as well&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A target="_blank" href="http://docs.oracle.com/javase/7/docs/technotes/guides/security/jsse/JSSERefGuide.html#X509TrustManager"&gt;http://docs.oracle.com/javase/7/docs/technotes/guides/security/jsse/JSSERefGuide.html#X509TrustManager&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2015 04:54:05 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/SSL-handshake-error-when-configuring-SSL-for-Cloudera/m-p/26554#M32249</guid>
      <dc:creator>Grizzly</dc:creator>
      <dc:date>2015-04-16T04:54:05Z</dc:date>
    </item>
    <item>
      <title>Re: SSL handshake error when configuring SSL for Cloudera Navigator (cloudera-navigator.properties)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/SSL-handshake-error-when-configuring-SSL-for-Cloudera/m-p/26556#M32250</link>
      <description>&lt;P&gt;So far it appears that only Navigator is unhappy with the keystore. So I believe TLS/SSL was set up correctly, otherwise. We are using FreeIPA as certificate authority and below is a quick overview of steps taken to set it up, since there is a somewhat deviation from standard protocol.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the Namenode (same host the Cloudera Manager lives on), I generated a certificate and key to be used by Cloudera Manager&lt;/P&gt;&lt;P&gt;# kinit -kt /etc/krb5.keytab&lt;/P&gt;&lt;P&gt;# ipa-getcert request -f cmhost.pem -k cmhost.key -r&lt;/P&gt;&lt;P&gt;# chmod 600 cmhost*&lt;/P&gt;&lt;P&gt;Then I copied the newly created cm-keys directory to each host.&lt;/P&gt;&lt;P&gt;$ for x in {LIST_OF_CDH_HOSTS}; do scp -r cm-keys $x:; done&lt;/P&gt;&lt;P&gt;$ for x in {LIST_OF_CDH_HOSTS}; do ssh -tty $x sudo bash -c "'mkdir -p /opt/cloudera/security/x509; mv cm-keys/* /opt/cloudera/security/x509; chown cloudera /opt/cloudera/security/x509/*'"; done&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Next, I set up Puppet to configure Cloudera to use TLS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2015 05:45:31 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/SSL-handshake-error-when-configuring-SSL-for-Cloudera/m-p/26556#M32250</guid>
      <dc:creator>nataliaking_csc</dc:creator>
      <dc:date>2015-04-16T05:45:31Z</dc:date>
    </item>
    <item>
      <title>Re: SSL handshake error when configuring SSL for Cloudera Navigator (cloudera-navigator.properties)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/SSL-handshake-error-when-configuring-SSL-for-Cloudera/m-p/26575#M32251</link>
      <description>&lt;P&gt;Ok so you have 2 paradigims that you are configuring for, the JDK, and OpenSSL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"Trust" is established differently between the two implementations, Navigator, being Java based, will derive trust through the default JDK mechanisims I pointed out&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the Agents, Hue, and Implala the implementation is based on OpenSSL. Trust can be established for a root CA by directly configuring path to a CA pem file, or if there is a complex intermediary chain through providing the path to where the files are and running the c_rehash tool to generate the necessary base64 encoded symlinks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Navigator is expecting you to configure a jks with private key and installed cert, but then as navigator attempts to connect to other cluster services that are using SSL/TLS, it needs to trust the CA that issued the server cert...&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2015 14:58:59 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/SSL-handshake-error-when-configuring-SSL-for-Cloudera/m-p/26575#M32251</guid>
      <dc:creator>Grizzly</dc:creator>
      <dc:date>2015-04-16T14:58:59Z</dc:date>
    </item>
    <item>
      <title>Re: SSL handshake error when configuring SSL for Cloudera Navigator (cloudera-navigator.properties)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/SSL-handshake-error-when-configuring-SSL-for-Cloudera/m-p/26587#M32252</link>
      <description>&lt;P&gt;&lt;EM&gt;"Trust" is established differently between the two implementations, Navigator, being Java based, will derive trust through the default JDK mechanisms I pointed out&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are looking into whether we need to use keytool utility to generate those or use our FreeIPA server to generate certs for Navigator...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2015 19:23:12 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/SSL-handshake-error-when-configuring-SSL-for-Cloudera/m-p/26587#M32252</guid>
      <dc:creator>nataliaking_csc</dc:creator>
      <dc:date>2015-04-16T19:23:12Z</dc:date>
    </item>
    <item>
      <title>Re: SSL handshake error when configuring SSL for Cloudera Navigator (cloudera-navigator.properties)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/SSL-handshake-error-when-configuring-SSL-for-Cloudera/m-p/26591#M32253</link>
      <description>&lt;P&gt;And we cover import/export scenarios between the two implementations here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A target="_blank" href="http://www.cloudera.com/content/cloudera/en/documentation/core/latest/topics/cm_sg_openssl_jks.html"&gt;http://www.cloudera.com/content/cloudera/en/documentation/core/latest/topics/cm_sg_openssl_jks.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So you need to consider that you have a private key component, and a issued certificate component... the combination of the two in a JKS (private key and certificate) allow you to start up a java based service that will support SSL/TLS connections.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can use your IPA based appoach as long as you have access to the private key and certificate it issues, to combine them and then import into a JKS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The the CA certificate that issued the certificate, imported into the truststores I've discussed already, establishes inherent trust within java services, for SSL certificates created by that CA.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2015 20:48:05 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/SSL-handshake-error-when-configuring-SSL-for-Cloudera/m-p/26591#M32253</guid>
      <dc:creator>Grizzly</dc:creator>
      <dc:date>2015-04-16T20:48:05Z</dc:date>
    </item>
    <item>
      <title>Re: SSL handshake error when configuring SSL for Cloudera Navigator (cloudera-navigator.properties)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/SSL-handshake-error-when-configuring-SSL-for-Cloudera/m-p/26595#M32254</link>
      <description>&lt;P&gt;&lt;EM&gt;The the CA certificate that issued the certificate, imported into the truststores I've discussed already, establishes inherent trust within java services, for SSL certificates created by that CA.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have already created a truststore on Namenode (node where Cloudera Manager is installed), when TLS was set up for all agents, that's what was used - /etc/cloudera-scm-server/keystore - and this file was copied to all nodes in Cloudera Hadoop cluster, including Navigator.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2015 22:40:09 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/SSL-handshake-error-when-configuring-SSL-for-Cloudera/m-p/26595#M32254</guid>
      <dc:creator>nataliaking_csc</dc:creator>
      <dc:date>2015-04-16T22:40:09Z</dc:date>
    </item>
    <item>
      <title>Re: SSL handshake error when configuring SSL for Cloudera Navigator (cloudera-navigator.properties)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/SSL-handshake-error-when-configuring-SSL-for-Cloudera/m-p/26596#M32255</link>
      <description>&lt;P&gt;Sorry,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So the term "truststore" is over-loaded. &amp;nbsp;Are you saying a JKS file that you configure from the CM UI as a truststore for each service in the cluster, including management services? &amp;nbsp;Or a "default" truststore like [JAVA_HOME]/jre/lib/security/cacerts (or jssecacerts) that establishes inherent trust as we have been discussing...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You have a number of configuration changes to make, one for each service, to recognize that trust store file (as opposed to instrumenting the JDK for trust).&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2015 23:02:35 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/SSL-handshake-error-when-configuring-SSL-for-Cloudera/m-p/26596#M32255</guid>
      <dc:creator>Grizzly</dc:creator>
      <dc:date>2015-04-16T23:02:35Z</dc:date>
    </item>
    <item>
      <title>Re: SSL handshake error when configuring SSL for Cloudera Navigator (cloudera-navigator.properties)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/SSL-handshake-error-when-configuring-SSL-for-Cloudera/m-p/26612#M32256</link>
      <description>&lt;P&gt;Thank you! We got this to work finally. Now just need to wire to LDAP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It looks like the keystore passed by following the instructions on Cloudera's site wasn't used for some reason. Following instructions here: &lt;A target="_blank" href="http://www.cloudera.com/content/cloudera/en/documentation/core/latest/topics/cm_sg_create_key_trust.html#concept_u35_w2m_l4_unique_1"&gt;http://www.cloudera.com/content/cloudera/en/documentation/core/latest/topics/cm_sg_create_key_trust.html#concept_u35_w2m_l4_unique_1&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;The upshot is that the keystore at /usr/java/jdk1.7.0_67-cloudera/jre/lib/security/jssecacerts (or ${JAVA_HOME}/lib/security/jssecacerts, where $JAVA_HOME is the home of the version of Java used by Cloudera Navigator, we used "ps" to find out where) should contain the root certificate. We then restarted both Cloudera Navigator services, and able to navigate to &lt;A target="_blank" href="https://cdh-rm.platform.infochimps:7187/login.html"&gt;https://&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Integration with FreeIPA was sort of confusing initially. Thanks for your help in understanding the mechnisms of this functionality.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jun 2015 15:34:32 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/SSL-handshake-error-when-configuring-SSL-for-Cloudera/m-p/26612#M32256</guid>
      <dc:creator>nataliaking_csc</dc:creator>
      <dc:date>2015-06-18T15:34:32Z</dc:date>
    </item>
  </channel>
</rss>

