amareshmad commented on issue #114:
URL: 
https://github.com/apache/pulsar-dotpulsar/issues/114#issuecomment-1279135449

   tried with setting VerifyCertificateAuthority ,VerifyCertificateName it 
didn't help.
   
   tried with setting registry as well didn't help.
   [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727]
         "SystemDefaultTlsVersions" = dword:00000001
         "SchUseStrongCrypto" = dword:00000001
   [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319]
         "SystemDefaultTlsVersions" = dword:00000001
         "SchUseStrongCrypto" = dword:00000001
   
   Product code was in 4.5, migrated to 4.8 & verified existing messaging 
system (active mq ) started working then after I started migrating to pulsar.
   
   
   I can see from Wireshark log for both. from product we are getting 
connection is terminating.
   
   Test .net framework console app connection 
   DNS       93                 Standard query 0x9e7c A xxxxxx.com
   DNS       141                Standard query response 0x9e7c A xxxxxx.com A 
xx.xxx.xxx.xxx A xx.xxx.xxx.xxx
   TCP        66           60427 → 6651 [SYN, ECE, CWR] Seq=0 Win=8192 Len=0 
MSS=1460 WS=256 SACK_PERM
   TCP        66           58908 → 799 [ACK] Seq=13933 Ack=793324 Win=6523 
Len=0 TSval=2310068914 TSecr=341545951
   TCP        66           6651 → 60427 [SYN, ACK] Seq=0 Ack=1 Win=26883 Len=0 
MSS=1460 SACK_PERM WS=128
   TCP        54           60427 → 6651 [ACK] Seq=1 Ack=1 Win=262656 Len=0
   TCP        56           6651 → 60427 [ACK] Seq=1 Ack=202 Win=28032 Len=0
   TLSv1.2 1514         Server Hello
   TLSv1.2 1160         Certificate, Server Key Exchange, Certificate Request, 
Server Hello Done
   TCP        54           60427 → 6651 [ACK] Seq=202 Ack=2567 Win=262656 Len=0
   TLSv1.2 187          Certificate, Client Key Exchange, Change Cipher Spec, 
Encrypted Handshake Message
   TLSv1.2 255          Client Hello
   
   From actual product code log
   DNS       93                 Standard query 0xb556 A 
   DNS       141                Standard query response 0xb556 A xxxxxx.com A 
xx.xxx.xxx.xxx A xx.xxx.xxx.xxx
   TCP        66           57823 → 6651 [SYN, ECE, CWR] Seq=0 Win=8192 Len=0 
MSS=1460 WS=256 SACK_PERM
   TCP        66           6651 → 57823 [SYN, ACK] Seq=0 Ack=1 Win=26883 Len=0 
MSS=1460 SACK_PERM WS=128
   TCP        54           57823 → 6651 [ACK] Seq=1 Ack=1 Win=262656 Len=0
   TCP        54           57823 → 6651 [FIN, ACK] Seq=1 Ack=1 Win=262656 Len=0
   TCP        56           6651 → 57823 [FIN, ACK] Seq=1 Ack=2 Win=27008 Len=0
   TCP        54           57823 → 6651 [ACK] Seq=2 Ack=2 Win=262656 Len=0
   
   I don't have any idea on how to procced (validate 
TrustedCertificateAuthority, VerifyCertificateAuthority and 
VerifyCertificateName) now onwards.
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscr...@pulsar.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to