Article - CS348225

SSL Exceptions in Zookeeper logs after installing ThingWorx Analytics Server

Modified: 02-Jul-2021   


Applies To

  • ThingWorx Analytics 9.1

Description

  • Error in log file /opt/ptc/ThingWorxAnalyticsServer/zookeeper/logs/zookeeper-twxanalytics-server-ip-10-1-3-11.ec2.internal.out
  • 2021-06-30 19:35:29,576 [myid:] - ERROR [nioEventLoopGroup-4-4:NettyServerCnxnFactory$CertificateVerifier@363] - Unsuccessful handshake with session 0x0
    2021-06-30 19:35:29,577 [myid:] - WARN  [nioEventLoopGroup-4-4:NettyServerCnxnFactory$CnxnChannelHandler@220] - Exception caught
    io.netty.handler.codec.DecoderException: javax.net.ssl.SSLHandshakeException: Extended key usage does not permit use for TLS client authentication
            at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:468)
            at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:276)
            at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)
            at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)
            at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)
            at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410)
            at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)
            at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)
            at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919)
            at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:163)
            at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714)
            at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650)
            at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576)
            at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493)
            at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989)
            at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74)
            at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30)
            at java.base/java.lang.Thread.run(Thread.java:829)
    Caused by: javax.net.ssl.SSLHandshakeException: Extended key usage does not permit use for TLS client authentication
            at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
            at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:349)
            at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:292)
            at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:287)
            at java.base/sun.security.ssl.CertificateMessage$T12CertificateConsumer.checkClientCerts(CertificateMessage.java:700)
            at java.base/sun.security.ssl.CertificateMessage$T12CertificateConsumer.onCertificate(CertificateMessage.java:411)
            at java.base/sun.security.ssl.CertificateMessage$T12CertificateConsumer.consume(CertificateMessage.java:375)
            at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
            at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
            at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
            at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
            at java.base/java.security.AccessController.doPrivileged(Native Method)
            at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
            at io.netty.handler.ssl.SslHandler.runAllDelegatedTasks(SslHandler.java:1510)
            at io.netty.handler.ssl.SslHandler.runDelegatedTasks(SslHandler.java:1524)
            at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1408)
            at io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1235)
            at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1282)
            at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:498)
            at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:437)
            ... 17 more
    Caused by: sun.security.validator.ValidatorException: Extended key usage does not permit use for TLS client authentication
            at java.base/sun.security.validator.EndEntityChecker.checkTLSClient(EndEntityChecker.java:245)
            at java.base/sun.security.validator.EndEntityChecker.check(EndEntityChecker.java:146)
            at java.base/sun.security.validator.Validator.validate(Validator.java:277)
            at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
            at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
            at java.base/sun.security.ssl.X509TrustManagerImpl.checkClientTrusted(X509TrustManagerImpl.java:135)
            at org.apache.zookeeper.common.ZKTrustManager.checkClientTrusted(ZKTrustManager.java:88)
            at java.base/sun.security.ssl.CertificateMessage$T12CertificateConsumer.checkClientCerts(CertificateMessage.java:682)
            ... 32 more

     
This is a printer-friendly version of Article 348225 and may be out of date. For the latest version click CS348225