Hi, Today, there was an upgrade of the AIO "puppet-agent" package from 1.2.2 to 1.2.4. Before the upgrade, the ssl connections of nodes with the Rabbitmq middleware worked fine. But after, the ssl connections worked no longer and the link between the nodes (mcollective servers) and the middleware was broken.
Before the upgrade: ---------------------------------------------------- root@client-trusty:~# dpkg -l puppet-agent | grep puppet-agent | awk '{print $1" "$2" "$3" "$4}' ii puppet-agent 1.2.2-1trusty amd64 # The middleware is a rabbitmq server in another host. root@client-trusty:~# MIDDLEWARE_SRV=172.31.14.7:61614 root@client-trusty:~# cert=/etc/puppetlabs/puppet/ssl/certs/client-trusty.athome.priv.pem root@client-trusty:~# key=/etc/puppetlabs/puppet/ssl/private_keys/client-trusty.athome.priv.pem root@client-trusty:~# cacert=/etc/puppetlabs/puppet/ssl/certs/ca.pem # Try a ssl handshake. All is OK. root@client-trusty:~# /opt/puppetlabs/puppet/bin/openssl s_client -connect $MIDDLEWARE_SRV -cert $cert -key $key -CAfile $cacert && echo ALL IS OK CONNECTED(00000003) depth=1 CN = Puppet CA: puppet4.athome.priv verify return:1 depth=0 CN = middleware.athome.priv verify return:1 --- Certificate chain 0 s:/CN=middleware.athome.priv i:/CN=Puppet CA: puppet4.athome.priv 1 s:/CN=Puppet CA: puppet4.athome.priv i:/CN=Puppet CA: puppet4.athome.priv --- Server certificate -----BEGIN CERTIFICATE----- MIIFgjCCA2qgAwIBAgIBBzANBgkqhkiG9w0BAQsFADApMScwJQYDVQQDDB5QdXBw ZXQgQ0E6IHB1cHBldDQuYXRob21lLnByaXYwHhcNMTUwOTEyMTYxNzE5WhcNMjAw OTExMTYxNzE5WjAhMR8wHQYDVQQDDBZtaWRkbGV3YXJlLmF0aG9tZS5wcml2MIIC IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAu2En9wplbcqTW6qzZXFEmGIf /NgvjWHxuNAOA5szcYZ4f3wwAfq25kp6hjDaIRYsgzny6FY7AZ4SDiSTtS8kNMFn jBJy/81RQKtqP97X+6y84q8EtA/4i4p1g9U7GOZ6LWTFa2h4sd7zl2ahM02szgBX CIqZjrpm9M1ucTd2ZlqZ80CEKNKxbe+UaTufrGI9+ZxHo+wyxD9TW1Cuvw+Ke9OJ rir5bCD2RvNbNE/89pRWr1J3jbxnSZNVqwiaRZWg7c7R4qjrauLgftM8d1PzUM32 Mx+17tbF4m6xOldg26c8FGQ5kTW8BXC2mGtffI/0zEYmMhKYnoUIQ7HFyuGc4Krp V1ikql7R995b2elWHIZYaXvoaWg9048y+ueGSNKPbGBReY8FLO8SZgxbvkGXsear cKW+eCMnUhGY/J34ComNs6jownXvpq4AKED8KP+dRzs6Z9QDFeXO6qEcyS4AD4zm 2zFsztRtwI9cjbViiSEuTo0vFo1n31RYU4augiyfSQ7gfZaRR0EodkdUxTbDSwPK ym4+t9G2cloG8WI/+njxom86KfJEp2nHG6F0zbZuFMYyfqUzL2PNKp2ZO7MYrCVM d1ljyLp/jIP/8Ymu16EFnX7LA8F+a7Vvb3e3dmWjBS+vixKXnRl/cUhZ+T84+o1k 3LuFr7PHOE62Otxgbc8CAwEAAaOBvDCBuTA3BglghkgBhvhCAQ0EKgwoUHVwcGV0 IFJ1YnkvT3BlblNTTCBJbnRlcm5hbCBDZXJ0aWZpY2F0ZTAOBgNVHQ8BAf8EBAMC BaAwIAYDVR0lAQH/BBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC MAAwHQYDVR0OBBYEFBxwJMjotqyQKrEXYSMi4wrjI2irMB8GA1UdIwQYMBaAFN2R YjtfzoMYH0wUkn7uel8YjeHrMA0GCSqGSIb3DQEBCwUAA4ICAQCi6ysJ4Virm3x8 Emq19JnvF/9oOcoT1DmR+qhIF0hNmTPeje5C2o72d4UrxL7nJ1rDyF5dvzQ50Ku5 eza40x/zK2lAv4AB+amCPiXsiPdKLQDGYKyz0SexhQ5Kwl+IpPAqQbBSZHuMUQTA VIdQglLUgTTaSmo39VvHC9DMiI55TcpBvsqDJ2DhCTJKuCkWwsBBlbl1DyWvCczt vE8NAlFpXXDHZpvEzP3kDDB66wXwi9MihGu4a+LFiSleCktNkFMwGb3T3pVIKNQg FzjH1Q15LSPgIvALnfSfphC6A6NwdAiAKJGSxrA9n1Kd9Iz3HZ9huxAnQjrAh68/ vxwokyaSWq0vFmKGAPATKNHm2aEExpSB6Dh6l1E3+YANJRa/lxzl6PB2k4G1OfmY SybvvL1D1vy1fohem4gB5eErBnV9pjzkiXeBpoCH0YLtRti4Ru/YJATDDbsoXEd3 xN/o0ZCRe6djxy9Kr3y3X+fUbAgOcBrF9UHWuz4JMUAizJWEPQv3y8MTR4KifSXK wvVQsZvqeHwpp4GDyNB/tUFJYeF4G2xRSu72ES26g08s0YR3DMLMzzf3MHngJTQn XV9BNYAitOheIq80yHbq0ErLK1aHzW5ovg/gp3qdG/I48DTSN3UYf+zCbNsneoxo 2QR6gvFfAtJqxySNtcvtfEFhLhN4TQ== -----END CERTIFICATE----- subject=/CN=middleware.athome.priv issuer=/CN=Puppet CA: puppet4.athome.priv --- Acceptable client certificate CA names /CN=Puppet CA: puppet4.athome.priv --- SSL handshake has read 3656 bytes and written 3699 bytes --- New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-SHA Server public key is 4096 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE SSL-Session: Protocol : TLSv1 Cipher : ECDHE-RSA-AES256-SHA Session-ID: 85F7EADC8638B92FB19C5E2FB6005EA50B95FB63AC4D0B514A15FA70D9F70D63 Session-ID-ctx: Master-Key: 561B8C015947AEEB117EAD92E57C2A99429F5A7D434C6094CC89987C774C3F2F565C467CC322547DBEBC0359B411A8C3 Key-Arg : None PSK identity: None PSK identity hint: None Start Time: 1442425360 Timeout : 300 (sec) Verify return code: 0 (ok) --- Q DONE ALL IS OK ---------------------------------------------------- Now, I upgrade the "puppet-agent" package : ---------------------------------------------------- root@client-trusty:~# apt-get install puppet-agent Reading package lists... Done Building dependency tree Reading state information... Done The following packages will be upgraded: puppet-agent 1 upgraded, 0 newly installed, 0 to remove and 7 not upgraded. Need to get 9,901 kB of archives. After this operation, 1,188 kB of additional disk space will be used. Get:1 http://apt.puppetlabs.com/ trusty/PC1 puppet-agent amd64 1.2.4-1trusty [9,901 kB] Fetched 9,901 kB in 0s (19.4 MB/s) (Reading database ... 89683 files and directories currently installed.) Preparing to unpack .../puppet-agent_1.2.4-1trusty_amd64.deb ... Unpacking puppet-agent (1.2.4-1trusty) over (1.2.2-1trusty) ... Processing triggers for ureadahead (0.100.0-16) ... ureadahead will be reprofiled on next reboot Setting up puppet-agent (1.2.4-1trusty) ... Restarting daemon: mcollective Stopping daemon: mcollective Starting daemon: mcollective mcollective restarted root@client-trusty:~# # And I retry an ssl hanshake root@client-trusty:~# /opt/puppetlabs/puppet/bin/openssl s_client -connect $MIDDLEWARE_SRV -cert $cert -key $key -CAfile $cacert && echo ALL IS OK CONNECTED(00000003) 140467911059104:error:140790E5:SSL routines:ssl23_write:ssl handshake failure:s23_lib.c:177: --- no peer certificate available --- No client certificate CA names sent --- SSL handshake has read 0 bytes and written 285 bytes --- New, (NONE), Cipher is (NONE) Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated --- root@client-trusty:~# echo $? 1 root@client-trusty:~# ---------------------------------------------------- No ssl handshake possible and my mcollective service is down. Except the solution to stay on 1.2.2 version, do you have an idea to solve my problem ? My rabbitmq server is on a Ubuntu Tusty version 3.2.4-1 (from the ubuntu repositories). I have tried rabbitmq from the rabbitmq repository (version 3.5.4) but there is no improvement. Maybe it's useful, so here is my rabbitmq configuration: ---------------------------------------------------- [ {rabbitmq_stomp, [ { tcp_listeners, [] }, { ssl_listeners, [{"0.0.0.0", 61614} ] } ] }, { rabbit, [ { tcp_listeners, [] }, { ssl_listeners, [] }, { ssl_options, [ { cacertfile, "/etc/rabbitmq/ssl/cacert.pem"}, { certfile, "/etc/rabbitmq/ssl/cert.pem"}, { keyfile, "/etc/rabbitmq/ssl/key.pem"}, { verify, verify_peer}, {fail_if_no_peer_cert, true} ] } ] }, { rabbitmq_management, [ { listener, [ { ip, "127.0.0.1"}, {port, 15672} ] }, { redirect_old_port, false } ] } ]. ---------------------------------------------------- Thanks in advance for your help. -- You received this message because you are subscribed to the Google Groups "Puppet Users" group. To unsubscribe from this group and stop receiving emails from it, send an email to puppet-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/puppet-users/55F9ADDE.7010500%40gmail.com. For more options, visit https://groups.google.com/d/optout.