shovel plugin's TLS client fails with "Handshake Failure\n {bad_cert,hostname_check_failed}" when server sends a wildcard certificate #8622
Unanswered
andreas-luik
asked this question in
Other
Replies: 1 comment
-
If this is indeed the same issue as #2805, it would require adding URI options for Shovel, Federation, and the AMQP 0-9-1 Erlang client they use, then adding support for a customized hostname verification It's a real shame that in Erlang's TLS client, hostname verification is lumped together with x.509 certificate chain verification. Those steps are separate and can be enabled or disabled separately in some other TLS clients. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Describe the bug
The shovel plugin fails to connect to a TLS Server when the server uses a wildcard certificate, the error message is:
2023-06-20 13:00:22.689769+02:00 [error] <0.1604.0> Shovel 'XXX' failed to connect (URI: amqps://server.example.com:5671/service): {tls_alert,{handshake_failure,"TLS client: In state wait_cert_cr at ssl_handshake.erl:2113 generated CLIENT ALERT: Fatal - Handshake Failure\n {bad_cert,hostname_check_failed}"}}
I have followed the https://www.rabbitmq.com/troubleshooting-ssl.html guide and openssl s_client works.
This is on Rocky Linux 8.7 with these RPMs:
rabbitmq-server-3.11.18-1.el8.noarch
erlang-25.3.2.2-1.el8.x86_64
Note: a similar problem has been reported (and fixed) for the Rabbitmq LDAP client in #2805.
Reproduction steps
Expected behavior
The TLS connection shall succeed (as it does with "openssl s_client").
Additional context
No response
Beta Was this translation helpful? Give feedback.
All reactions