> I just defined sslProvider=openssl...

You should be using this as noted in the documentation [1]:

    sslProvider=OPENSSL

> Is there any log or other indication that now SSL process has moved from
JDK to OPENSSL?

I couldn't find anything that logs which sslProvider is in use for an
acceptor.

> Unfortunately, I could not find any article on using OPENSSL with Artemis.

I'm not aware of any specific articles. However, this documentation [1]
should be sufficient. Let me know if more details are required.

> ...regarding connectionsAllowed on acceptor, will it protect against
misbehaving producer/consumer? I understood that it is only good enough to
restrict good connections.

I'm not really sure what you're asking here.

Technically speaking you can only create a producer or consumer once a
connection is established so if an application creates a connection and
then uses that connection to spam create a bunch of producers and/or
consumers then connectionsAllowed will not prevent that. However, if an
application is spamming connections in the process of producing and/or
consuming messages then connectionsAllowed will stop that.


Justin

[1]
https://activemq.apache.org/components/artemis/documentation/latest/configuring-transports.html#configuring-netty-ssl?:~:text=sslProvider

On Thu, Apr 10, 2025 at 11:57 AM Shiv Kumar Dixit
<shivkumar.di...@it.eurofinseu.com.invalid> wrote:

> Hi Justin,
> While moving from JDK to OPENSSL, I just defined sslProvider=openssl on
> the acceptor and broker seems to start fine. Is there any log or other
> indication that now SSL process has moved from JDK to OPENSSL?
> Unfortunately, I could not find any article on using OPENSSL with Artemis.
> Any input will be useful here.
>
> Secondly regarding, "first line of defense would actually be in the
> network exposure rather than in the broker configuration", we have network
> segregation but all of the misbehaving clients come from trusted network.
> One same VM, we could have 2 listeners - one has correctly configured the
> certificate details while another has wrong configuration. Second one is
> causing " javax.net.ssl.SSLHandshakeException: Empty server certificate
> chain" error on the broker. Given we have dozens of VMs connecting to
> broker cluster and each VM hosting many producers/consumers where both good
> and bad configuration can co-exist, we are defenceless against this kind of
> issue. Here only option is to find IP and scan producer/consumer
> configuration and see if they have any misconfiguration causing trouble to
> brokers.
>
> Thirdly, regarding connectionsAllowed on acceptor, will it protect against
> misbehaving producer/consumer? I understood that it is only good enough to
> restrict good connections.
>
> Best Regards
> Shiv
>
> -----Original Message-----
> From: Justin Bertram <jbert...@apache.org>
> Sent: 09 April 2025 07:28 PM
> To: users@activemq.apache.org
> Subject: Re: Additional Info on certificate based authentication errors
>
>
>
> Unverified Sender: The sender of this email has not been verified. Review
> the content of the message carefully and verify the identity of the sender
> before acting on this email: replying, opening attachments or clicking
> links.
>
>
> > ...any article or whitepaper from community on how to handle (D)DoS
> attack on Artemis broker?
>
> I'm not aware of any such whitepaper.
>
> That said, I think the first line of defense would actually be in the
> network exposure rather than in the broker configuration. In other words,
> only expose your broker to the segment of the network where legitimate
> clients are located. You could even potentially use a firewall to narrow
> exposure down to a set of specific IP addresses.
>
> As far as broker configuration is concerned I recommend you look at
> setting connectionsAllowed [1] on the relevant acceptors in broker.xml and
> take a look at resource-limits-settings [2].
>
> And of course enforce security so that only legitimate clients can connect.
>
> Hope that helps!
>
>
> Justin
>
> [1]
>
> https://activemq.apache.org/components/artemis/documentation/latest/configuring-transports.html#configuring-netty-tcp
> [2]
>
> https://activemq.apache.org/components/artemis/documentation/latest/resource-limits.html#resource-limits
>
> On Wed, Apr 9, 2025 at 8:20 AM Shiv Kumar Dixit
> <shivkumar.di...@it.eurofinseu.com.invalid> wrote:
>
> > Thanks Justin for input.
> >
> > I am trying with OpenSSL and handshake-timeout=30 changes for now.  I
> > will update how it goes. Post that I will collect thread dumps and
> > share for further analysis.
> >
> > On the side note - if there any article or whitepaper from community
> > on how to handle (D)DoS attack on Artemis broker?
> >
> > Best Regards
> > Shiv
> >
> > -----Original Message-----
> > From: Justin Bertram <jbert...@apache.org>
> > Sent: 08 April 2025 11:38 PM
> > To: users@activemq.apache.org
> > Subject: Re: Additional Info on certificate based authentication
> > errors
> >
> >
> >
> > Unverified Sender: The sender of this email has not been verified.
> > Review the content of the message carefully and verify the identity of
> > the sender before acting on this email: replying, opening attachments
> > or clicking links.
> >
> >
> > > If JDK handles these handshakes as part of heap or native memory?
> >
> > I believe it would be part of the heap, but Netty uses direct buffers
> > so perhaps that is related.
> >
> > > Here broker became unresponsive after lot of SSL handshake errors as
> > > we
> > could see lot of 'AMQ224088: Timeout (10 seconds)...
> >
> > A high volume of SSL connections can overwhelm the hardware on which
> > the broker is running due to the CPU intensive nature of the
> > cryptographic operations as well as memory requirements. This is one
> > reason why folks use OpenSSL rather than the JDK. OpenSSL is typically
> > faster and more efficient with hardware resources. It's impossible to
> > say what's really happening based on the available evidence but you
> > may simply be hitting hardware/OS limits. All the SSL connection work
> > is being done before the broker is really involved.
> >
> > In order to deal with the AMQ224088 errors you might try setting
> > "handshake-timeout=30" on the relevant acceptor in broker.xml. The
> > default timeout is 10 seconds.
> >
> > If you want to investigate further I suggest getting a handful of
> > thread dumps during your test. Monitoring CPU utilization might be
> > helpful as well. Also, if you're exporting metrics [1] (highly
> > recommended!) you can enable optional metrics for Netty [2] to see
> > details about direct and heap memory usage.
> >
> >
> > Justin
> >
> > [1]
> >
> > https://acti/
> > vemq.apache.org%2Fcomponents%2Fartemis%2Fdocumentation%2Flatest%2Fmetr
> > ics.html%23metrics&data=05%7C02%7C%7Cfb52ba57391b458763f208dd776e9fda%
> > 7C1a1dce2021b14beaa9d2130e9f1f6e2f%7C0%7C0%7C638798039227600972%7CUnkn
> > own%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJX
> > aW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=nT41PGvqOe
> > rhYBh9VfodoTIFZerwDDE0cWp79YSX5OU%3D&reserved=0
> > [2]
> >
> > https://acti/
> > vemq.apache.org%2Fcomponents%2Fartemis%2Fdocumentation%2Flatest%2Fmetr
> > ics.html%23optional-metrics&data=05%7C02%7C%7Cfb52ba57391b458763f208dd
> > 776e9fda%7C1a1dce2021b14beaa9d2130e9f1f6e2f%7C0%7C0%7C6387980392276138
> > 53%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCI
> > sIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=C
> > cTlTKQ%2B%2F6MIGiZRIrBa3pUPD75E4phfF5vbIJD9tcE%3D&reserved=0
> >
> > On Tue, Apr 8, 2025 at 4:14 AM Shiv Kumar Dixit
> > <shivkumar.di...@it.eurofinseu.com.invalid> wrote:
> >
> > > Hi Justin,
> > > Yes, we are getting exception in broker log
> > > (javax.net.ssl.SSLHandshakeException: Empty server certificate
> > > chain) and we are looking for more information along with just client
> IP.
> > >
> > > If JDK handles these handshakes as part of heap or native memory?
> > > Our brokers are running in K8s (6 GB heap and 10 GB to pod) and as
> > > per observations, pod is getting killed with OOM. We have OOM dump
> > > instruction in artemis.profile but it is not happening which means
> > > broker process was still running while pod was killed and restarted
> > > by K8s. If the large native memory usage caused by SSL handshake can
> > > cause pod to OOM and get killed?
> > >
> > > We tried to simulate similar case in VM based broker. Here broker
> > > became unresponsive after lot of SSL handshake errors as we could
> > > see lot of
> > > 'AMQ224088: Timeout (10 seconds) on acceptor "artemis-ssl-customer"
> > > during protocol handshake with /1.2.3.4:62403 has occurred.' Where
> > > clients are trying to connect back. After some time it got restarted
> > with OOM.
> > >
> > > Best Regards
> > > Shiv
> > >
> > > -----Original Message-----
> > > From: Justin Bertram <jbert...@apache.org>
> > > Sent: 04 April 2025 09:26 PM
> > > To: users@activemq.apache.org
> > > Subject: Re: Additional Info on certificate based authentication
> > > errors
> > >
> > >
> > >
> > > Unverified Sender: The sender of this email has not been verified.
> > > Review the content of the message carefully and verify the identity
> > > of the sender before acting on this email: replying, opening
> > > attachments or clicking links.
> > >
> > >
> > > > How can we find out when a client connects to broker using invalid
> > > certificate...
> > >
> > > According to the information you've provided so far you're already
> > > being notified about this in the broker log. Is that not the case? I
> > > was under the impression that you simply wanted more details about
> > > the
> > failure.
> > >
> > > > ...SSL handshake is terminated at what stage like client hello,
> > > > server
> > > hello or anything further?
> > >
> > > I'm not an SSL expert by any means, but I believe the failure comes
> > > several steps after the client and server hello (i.e. the very first
> > > steps in the handshake). After the broker sends its certificate to
> > > the client and the client verifies it the broker then requests the
> > > client's
> > certificate.
> > > When the client sends its certificate the broker verifies it. I
> > > believe this is where the failure is happening.
> > >
> > > As noted previously, this handshake is being done by the JDK (or
> > > potentially OpenSSL if you've chosen OPENSSL for the sslProvider [1]).
> > > The broker doesn't control what information is available when a
> > > failure
> > occurs.
> > > As far as I'm aware the broker is already providing all the
> > > information available regarding an SSL handshake failure.
> > >
> > >
> > > Justin
> > >
> > > [1]
> > >
> > > https://acti/
> > > vemq.apache.org%2Fcomponents%2Fartemis%2Fdocumentation%2Flatest%2Fco
> > > nf
> > > iguring-transports.html%23configuring-netty-ssl&data=05%7C02%7C%7C49
> > > f8
> > > 42368dc64754902208dd76c85945%7C1a1dce2021b14beaa9d2130e9f1f6e2f%7C0%
> > > 7C
> > > 0%7C638797325066726960%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRyd
> > > WU
> > > sIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3
> > > D%
> > > 7C0%7C%7C%7C&sdata=esE%2FGWoSZocxz93n%2Fs8rye3Vhk%2BNFPLbtFEwhRQvSOg
> > > %3
> > > D&reserved=0
> > >
> > > On Thu, Apr 3, 2025 at 9:58 AM Shiv Kumar Dixit
> > > <shivkumar.di...@it.eurofinseu.com.invalid> wrote:
> > >
> > > > Hi Justin,
> > > > We have defined our acceptors with needClientAuth=true as we want
> > > > 2-way SSL. How can we find out when a client connects to broker
> > > > using invalid certificate, SSL handshake is terminated at what
> > > > stage like client hello, server hello or anything further? In our
> > > > case, we have a .net client which connects using URL like
> > > > ssl://host:port?transport.clientCertSubject=CN=ABC1. If ABC1 cert
> > > > is install on the client, it works fine but if actual CN is ABC
> > > > and someone misconfigured CN as ABC1 then we get
> > > javax.net.ssl.SSLHandshakeException:
> > > > Empty server certificate chain error at broker.
> > > >
> > > > As per my understanding, client hello should go well as it has no
> > > > client cert details but info like TLS version, cipher details etc.
> > > > Server hello should also be fine and now server should be
> > > > expecting client certificate details along with passing server
> certificate.
> > > > Now when client responds, it should be passing its certificate,
> > > > and this validation should be failing at server side resulting in
> > > > error
> > like:
> > > > AMQ222208: SSL handshake failed for client from /1.2.3.4:53838:
> > > > javax.net.ssl.SSLHandshakeException: Empty server certificate chain.
> > > >
> > > > Best Regards
> > > > Shiv
> > > >
> > > > -----Original Message-----
> > > > From: Justin Bertram <jbert...@apache.org>
> > > > Sent: 03 April 2025 08:05 PM
> > > > To: users@activemq.apache.org
> > > > Subject: Re: Additional Info on certificate based authentication
> > > > errors
> > > >
> > > >
> > > >
> > > > Unverified Sender: The sender of this email has not been verified.
> > > > Review the content of the message carefully and verify the
> > > > identity of the sender before acting on this email: replying,
> > > > opening attachments or clicking links.
> > > >
> > > >
> > > > Are you wanting to extract cert data on the client or the broker?
> > > > The broker already uses code like this to get cert data [1]. The
> > > > problem in your case is that the SSL handshake fails so the broker
> > > > has no chance to inspect the cert data on the connection.
> > > >
> > > >
> > > > Justin
> > > >
> > > > [1]
> > > >
> > > > https://gith/
> > > > ub.com%2Fapache%2Factivemq-artemis%2Fblob%2Fmain%2Fartemis-core-cl
> > > > ie
> > > > nt
> > > > %2Fsrc%2Fmain%2Fjava%2Forg%2Fapache%2Factivemq%2Fartemis%2Fcore%2F
> > > > re
> > > > mo
> > > > ting%2FCertificateUtil.java&data=05%7C02%7C%7C04b98fbbd31044310c05
> > > > 08
> > > > dd
> > > > 73915e0f%7C1a1dce2021b14beaa9d2130e9f1f6e2f%7C0%7C0%7C638793790428
> > > > 19
> > > > 81
> > > > 82%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDA
> > > > wM
> > > > CI
> > > > sIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sda
> > > > ta
> > > > =%
> > > > 2BRmolH7RtdgtR0JDo6le65BYsJhxyCPXDBUxbNEPnSo%3D&reserved=0
> > > >
> > > > On Thu, Apr 3, 2025 at 2:16 AM Shiv Kumar Dixit
> > > > <shivkumar.di...@it.eurofinseu.com.invalid> wrote:
> > > >
> > > > > Hi Justin,
> > > > > Thanks for input.
> > > > >
> > > > > Also, we came across this link
> > > > > https://stac/
> > > > > koverflow.com%2Fquestions%2F9777864%2Fhow-can-i-get-the-client-c
> > > > > er
> > > > > ti
> > > > > fi
> > > > > cate-in-netty-handler-to-identify-user&data=05%7C02%7C%7Cee4e7ef
> > > > > 7f
> > > > > 3c
> > > > > 84
> > > > > c0dd87208dd72bccbc9%7C1a1dce2021b14beaa9d2130e9f1f6e2f%7C0%7C0%7
> > > > > C6
> > > > > 38
> > > > > 79
> > > > > 2877389315248%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIl
> > > > > Yi
> > > > > Oi
> > > > > Iw
> > > > > LjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0
> > > > > %7
> > > > > C%
> > > > > 7C
> > > > > %7C&sdata=M0a4HbeUymmwbtVFCOGPQRp5ZH%2Fmq7eLebjNuQT%2FVKk%3D&res
> > > > > er
> > > > > ve
> > > > > d=
> > > > > 0 where it seems we can extract SSL information from
> > > > > ChannelHandlerContext ctx object. Do you see if it is feasible?
> > > > >
> > > > > ChannelHandlerContext ctx = ...
> > > > > SslHandler sslhandler = (SslHandler)
> > > > > ctx.channel().pipeline().get("ssl");
> > > > >
> > > > > sslhandler.engine().getSession().getPeerCertificateChain()[0].ge
> > > > > tS
> > > > > ub
> > > > > je
> > > > > ctDN());
> > > > >
> > > > > Best Regards
> > > > > Shiv
> > > > >
> > > > > -----Original Message-----
> > > > > From: Justin Bertram <jbert...@apache.org>
> > > > > Sent: 28 March 2025 10:42 PM
> > > > > To: users@activemq.apache.org
> > > > > Subject: Re: Additional Info on certificate based authentication
> > > > > errors
> > > > >
> > > > >
> > > > >
> > > > > Unverified Sender: The sender of this email has not been verified.
> > > > > Review the content of the message carefully and verify the
> > > > > identity of the sender before acting on this email: replying,
> > > > > opening attachments or clicking links.
> > > > >
> > > > >
> > > > > One option to improve this situation for Core [1] and OpenWire
> > > > > [2] clients is to specify the "local" port which will then be
> > > > > printed on in broker log along with the IP address. By default
> > > > > both clients use a random, available port which makes
> > > > > correlation difficult, if not impossible, in my circumstances.
> > > > > Of course, every client which does this will need to use a
> > > > > unique port to ensure there are no conflicts if they are all
> > > > > running on the same
> > machine.
> > > > >
> > > > > Let me know where you reached out to the Netty community and
> > > > > I'll follow along.
> > > > >
> > > > >
> > > > > Justin
> > > > >
> > > > > [1]
> > > > >
> > > > > https://acti/
> > > > > vemq.apache.org%2Fcomponents%2Fartemis%2Fdocumentation%2Flatest%
> > > > > 2F
> > > > > co
> > > > > nf
> > > > > iguring-transports.html%23configuring-the-transport%23%3A~%3Atex
> > > > > t%
> > > > > 3D
> > > > > lo
> > > > > calPort&data=05%7C02%7C%7Cee4e7ef7f3c84c0dd87208dd72bccbc9%7C1a1
> > > > > dc
> > > > > e2
> > > > > 02
> > > > > 1b14beaa9d2130e9f1f6e2f%7C0%7C0%7C638792877389342921%7CUnknown%7
> > > > > CT
> > > > > WF
> > > > > pb
> > > > > GZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zM
> > > > > iI
> > > > > sI
> > > > > kF
> > > > > OIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=3wj4B1Un%2FUrPl
> > > > > sk
> > > > > Lh
> > > > > OE
> > > > > yDo7SQ%2FN0ou2OGnTgPvfp4nk%3D&reserved=0
> > > > > [2]
> > > > >
> > > > > https://acti/
> > > > > vemq.apache.org%2Fcomponents%2Fclassic%2Fdocumentation%2Fhow-do-
> > > > > i-
> > > > > de
> > > > > fi
> > > > > ne-a-local-address-and-local-port-for-tcp-or-ssl&data=05%7C02%7C
> > > > > %7
> > > > > Ce
> > > > > e4
> > > > > e7ef7f3c84c0dd87208dd72bccbc9%7C1a1dce2021b14beaa9d2130e9f1f6e2f
> > > > > %7
> > > > > C0
> > > > > %7
> > > > > C0%7C638792877389363848%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGki
> > > > > On
> > > > > Ry
> > > > > dW
> > > > > UsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ
> > > > > %3
> > > > > D%
> > > > > 3D
> > > > > %7C0%7C%7C%7C&sdata=juvStcSQ%2BDcKH%2F14xA%2BdHuAUQUzrKHV0PK3mM9
> > > > > A9
> > > > > ue
> > > > > 4%
> > > > > 3D&reserved=0
> > > > >
> > > > > On Fri, Mar 28, 2025 at 10:12 AM Shiv Kumar Dixit
> > > > > <shivkumar.di...@it.eurofinseu.com.invalid> wrote:
> > > > >
> > > > > > Hello Justin,
> > > > > > Thanks for the response.
> > > > > >
> > > > > > We have clients using Core/AMQP/OpenWire with certificates.
> > > > > >
> > > > > > Passing SSL debugging flag is good idea but given we have many
> > > > > > clients using broker concurrently, I fear we will have lot of
> > > > > > logs and it will be difficult to analyse. I am also checking
> > > > > > with netty community if they can provide some input.
> > > > > >
> > > > > > Best Regards
> > > > > > Shiv
> > > > > >
> > > > > > -----Original Message-----
> > > > > > From: Justin Bertram <jbert...@apache.org>
> > > > > > Sent: 28 March 2025 08:33 AM
> > > > > > To: users@activemq.apache.org
> > > > > > Subject: Re: Additional Info on certificate based
> > > > > > authentication errors
> > > > > >
> > > > > >
> > > > > >
> > > > > > Unverified Sender: The sender of this email has not been
> verified.
> > > > > > Review the content of the message carefully and verify the
> > > > > > identity of the sender before acting on this email: replying,
> > > > > > opening attachments or clicking links.
> > > > > >
> > > > > >
> > > > > > Unfortunately I don't think the broker itself will be able to
> > > > > > provide additional information because it simply doesn't have it.
> > > > > > The SSL handshake is delegated by Netty to the JDK (or
> > > > > > potentially to OpenSSL) and it's the first thing done when the
> > client connects.
> > > > > > It happens before the messaging protocol handshake takes place
> > > > > > so there's definitely no way to get the client ID because it
> > > > > > hasn't been sent yet. Netty only provides a Throwable [1] and
> > > > > > we print the relevant
> > > > > information from it.
> > > > > >
> > > > > > It's possible you could get some relevant information from
> > > > > > Java's SSL debug logging by passing something like
> > > > > > -Djavax.net.debug=ssl:handshake to the JVM at startup.
> > > > > >
> > > > > > What kind of client are you using to connect to the broker in
> > > > > > this
> > > > case?
> > > > > >
> > > > > >
> > > > > > Justin
> > > > > >
> > > > > > [1]
> > > > > >
> > > > > > https://gith/
> > > > > > ub.com%2Fapache%2Factivemq-artemis%2Fblob%2Fc4b315ba0c1fafbe2d
> > > > > > 2c
> > > > > > 3e
> > > > > > bf
> > > > > > 0c
> > > > > > dd84f921f42b5a%2Fartemis-server%2Fsrc%2Fmain%2Fjava%2Forg%2Fap
> > > > > > ac
> > > > > > he
> > > > > > %2
> > > > > > Fa
> > > > > > ctivemq%2Fartemis%2Fcore%2Fremoting%2Fimpl%2Fnetty%2FNettyAcce
> > > > > > pt
> > > > > > or
> > > > > > .j
> > > > > > av
> > > > > > a%23L1014&data=05%7C02%7C%7C2d25dad5c33e4432379808dd6e1bbbe3%7
> > > > > > C1
> > > > > > a1
> > > > > > dc
> > > > > > e2
> > > > > > 021b14beaa9d2130e9f1f6e2f%7C0%7C0%7C638787787610427088%7CUnkno
> > > > > > wn
> > > > > > %7
> > > > > > CT
> > > > > > WF
> > > > > > pbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXa
> > > > > > W4
> > > > > > zM
> > > > > > iI
> > > > > > sI
> > > > > > kFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=nJBF0dMqmOi
> > > > > > PJ
> > > > > > dl
> > > > > > UM
> > > > > > Bj
> > > > > > 3q3Ia01NII0ykmP6XQisV%2Bao%3D&reserved=0
> > > > > >
> > > > > > On Thu, Mar 27, 2025 at 2:03 AM Shiv Kumar Dixit
> > > > > > <shivkumar.di...@it.eurofinseu.com.invalid> wrote:
> > > > > >
> > > > > > > Hi team,
> > > > > > > Currently we are using Apache Artemis 2.37.0. We have
> > > > > > > certificate-based customers. Many times, we see errors like
> > > > > > > below in
> > > > > > broker log:
> > > > > > >
> > > > > > > AMQ222208: SSL handshake failed for client from /a.b.c.d:53838:
> > > > > > > javax.net.ssl.SSLHandshakeException: Empty server
> > > > > > > certificate
> > > chain.
> > > > > > >
> > > > > > > AMQ222208: SSL handshake failed for client from /a.b.c.d:59132:
> > > > > > > java.security.cert.CertificateExpiredException: NotAfter:
> > > > > > > Tue Mar
> > > > > > > 25
> > > > > > > 00:00:11 IST 2025
> > > > > > >
> > > > > > > AMQ224088: Timeout (10 seconds) on acceptor "artemis" during
> > > > > > > protocol handshake with /a.b.c.d:62403 has occurred.
> > > > > > >
> > > > > > > Here we only get customer IP along with error message. In
> > > > > > > real world, we have many customer applications running from
> > > > > > > same IP but not all use expired certificate or invalid
> > > > > > > certificate. We may have only of such misbehaving client.
> > > > > > > Troubleshooting such cases require validating all customer
> > > > > > > applications on single IP to trace the issue. It is very
> > > > > > > time consuming as we need to check customer configuration,
> > > > > > > start/stop applications to see how it impacts the
> > > > > broker error etc.
> > > > > > >
> > > > > > > Can we get some additional information such as client id,
> > > > > > > certificate CN details or any other certificate information
> > > > > > > which can help us in identifying the erring client faster?
> > > > > > > If there is any log level change which can enable to put
> > > > > > > such information in broker
> > > > > log will be helpful.
> > > > > > >
> > > > > > > Thanks
> > > > > > > Shiv
> > > > > > >
> > > > > > >
> > > > > >
> > > > > > --------------------------------------------------------------
> > > > > > --
> > > > > > --
> > > > > > --
> > > > > > - To unsubscribe, e-mail:
> > > > > > users-unsubscr...@activemq.apache.org
> > > > > > For additional commands, e-mail:
> > > > > > users-h...@activemq.apache.org For further information, visit:
> > > > > > https://acti/
> > > > > > vemq.apache.org%2Fcontact&data=05%7C02%7C%7C2d25dad5c33e443237
> > > > > > 98
> > > > > > 08
> > > > > > dd
> > > > > > 6e
> > > > > > 1bbbe3%7C1a1dce2021b14beaa9d2130e9f1f6e2f%7C0%7C0%7C6387877876
> > > > > > 10
> > > > > > 43
> > > > > > 97
> > > > > > 97
> > > > > > %7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuM
> > > > > > DA
> > > > > > wM
> > > > > > CI
> > > > > > sI
> > > > > > lAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&s
> > > > > > da
> > > > > > ta
> > > > > > =X
> > > > > > Rb
> > > > > > daTuyVGNgBH%2FDdvihBuYzv%2BiATnFUfURp8IU2L%2B4%3D&reserved=0
> > > > > >
> > > > > >
> > > > >
> > > > > ----------------------------------------------------------------
> > > > > --
> > > > > --
> > > > > - To unsubscribe, e-mail: users-unsubscr...@activemq.apache.org
> > > > > For additional commands, e-mail: users-h...@activemq.apache.org
> > > > > For further information, visit:
> > > > > https://acti/
> > > > > vemq.apache.org%2Fcontact&data=05%7C02%7C%7Cee4e7ef7f3c84c0dd872
> > > > > 08
> > > > > dd
> > > > > 72
> > > > > bccbc9%7C1a1dce2021b14beaa9d2130e9f1f6e2f%7C0%7C0%7C638792877389
> > > > > 38
> > > > > 52
> > > > > 94
> > > > > %7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDA
> > > > > wM
> > > > > CI
> > > > > sI
> > > > > lAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sda
> > > > > ta
> > > > > =P
> > > > > Uy
> > > > > z3W9mbHPKRghYMO58s5HWPMCKuIyITGbbJMIy%2BY0%3D&reserved=0
> > > > >
> > > > >
> > > >
> > > > ------------------------------------------------------------------
> > > > --
> > > > - To unsubscribe, e-mail: users-unsubscr...@activemq.apache.org
> > > > For additional commands, e-mail: users-h...@activemq.apache.org
> > > > For further information, visit:
> > > > https://acti/
> > > > vemq.apache.org%2Fcontact&data=05%7C02%7C%7C04b98fbbd31044310c0508
> > > > dd
> > > > 73
> > > > 915e0f%7C1a1dce2021b14beaa9d2130e9f1f6e2f%7C0%7C0%7C63879379042822
> > > > 95
> > > > 91
> > > > %7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwM
> > > > CI
> > > > sI
> > > > lAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata
> > > > =k
> > > > aL
> > > > FLEBaBPzcqcq%2BJYRMJ4UbXRKaKHQzQthxEdfNHPw%3D&reserved=0
> > > >
> > > >
> > >
> > > --------------------------------------------------------------------
> > > - To unsubscribe, e-mail: users-unsubscr...@activemq.apache.org
> > > For additional commands, e-mail: users-h...@activemq.apache.org For
> > > further information, visit:
> > > https://acti/
> > > vemq.apache.org%2Fcontact&data=05%7C02%7C%7C49f842368dc64754902208dd
> > > 76
> > > c85945%7C1a1dce2021b14beaa9d2130e9f1f6e2f%7C0%7C0%7C6387973250667396
> > > 57
> > > %7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCI
> > > sI
> > > lAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=H
> > > 7m
> > > 8XMqQ5GLVSPXcp25%2FyBx%2F3XdkKBQ6bM%2BkeloHL5U%3D&reserved=0
> > >
> > >
> >
> > ---------------------------------------------------------------------
> > To unsubscribe, e-mail: users-unsubscr...@activemq.apache.org
> > For additional commands, e-mail: users-h...@activemq.apache.org For
> > further information, visit:
> > https://acti/
> > vemq.apache.org%2Fcontact&data=05%7C02%7C%7Cfb52ba57391b458763f208dd77
> > 6e9fda%7C1a1dce2021b14beaa9d2130e9f1f6e2f%7C0%7C0%7C638798039227626834
> > %7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsI
> > lAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=OSm
> > JsMP3PS2rdYtqvDI34HvFvG2zztpNv%2FU2ZDoNUTs%3D&reserved=0
> >
> >
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@activemq.apache.org
> For additional commands, e-mail: users-h...@activemq.apache.org
> For further information, visit: https://activemq.apache.org/contact
>
>

Reply via email to