Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 25 Nov 2019 17:36:39 +0000
From:      bugzilla-noreply@freebsd.org
To:        elastic@FreeBSD.org
Subject:   [Bug 241312] sysutils/logstash6 Cipher Error
Message-ID:  <bug-241312-37421-U4DnhTNgDI@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-241312-37421@https.bugs.freebsd.org/bugzilla/>
References:  <bug-241312-37421@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D241312

--- Comment #26 from Wallace <incin@incin.me> ---
I think we have progress, I created a new FreeBSD 11.3 server and SSL certs,
installed logstash 6.8.3 from our tree and got it to run on port 5044 with =
my
certs. See log below, some are snips from the log file since I turned on su=
per
debug and it spammed the screen and log file.

[2019-11-25T16:54:31,180][DEBUG][io.netty.util.internal.NativeLibraryLoader]
Unable to load the library 'netty_tcnative_freebsd_x86_64', trying other
loading mechanism.
[2019-11-25T16:54:31,181][DEBUG][io.netty.util.internal.NativeLibraryLoader]
netty_tcnative_freebsd_x86_64 cannot be loaded from java.libary.path, now
trying export to -Dio.netty.native.workdir: /tmp
[2019-11-25T16:54:31,187][DEBUG][io.netty.util.internal.NativeLibraryLoader]
Successfully loaded the library
/tmp/libnetty_tcnative_freebsd_x86_647758890754716951252.so
[2019-11-25T16:54:31,187][DEBUG][io.netty.handler.ssl.OpenSsl] Initialize
netty-tcnative using engine: 'default'
[2019-11-25T16:54:31,189][DEBUG][io.netty.handler.ssl.OpenSsl] netty-tcnati=
ve
using native library: OpenSSL 1.0.2s-freebsd  28 May 2019
...

[2019-11-25T16:54:31,354][DEBUG][io.netty.handler.ssl.ReferenceCountedOpenS=
slContext]
ReferenceCountedOpenSslContext supports -Djdk.tls.ephemeralDHKeySize=3D{int=
}, but
got: matched
...

[2019-11-25T16:54:31,379][DEBUG][io.netty.handler.ssl.CipherSuiteConverter]
Cipher suite mapping: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 =3D>
ECDHE-RSA-AES256-GCM-SHA384
[2019-11-25T16:54:31,379][DEBUG][io.netty.handler.ssl.CipherSuiteConverter]
Cipher suite mapping: SSL_ECDHE_RSA_WITH_AES_256_GCM_SHA384 =3D>
ECDHE-RSA-AES256-GCM-SHA384
[2019-11-25T16:54:31,380][DEBUG][io.netty.handler.ssl.CipherSuiteConverter]
Cipher suite mapping: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 =3D>
ECDHE-ECDSA-AES256-GCM-SHA384
[2019-11-25T16:54:31,380][DEBUG][io.netty.handler.ssl.CipherSuiteConverter]
Cipher suite mapping: SSL_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 =3D>
ECDHE-ECDSA-AES256-GCM-SHA384
[2019-11-25T16:54:31,380][DEBUG][io.netty.handler.ssl.CipherSuiteConverter]
Cipher suite mapping: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 =3D>
ECDHE-RSA-AES256-SHA384
[2019-11-25T16:54:31,380][DEBUG][io.netty.handler.ssl.CipherSuiteConverter]
Cipher suite mapping: SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA384 =3D>
ECDHE-RSA-AES256-SHA384
... (This above section mapped all the SSL suites and was very long in the =
log
file)

[2019-11-25T16:54:31,404][DEBUG][io.netty.handler.ssl.OpenSsl] Supported
protocols (OpenSSL): [SSLv2Hello, SSLv3, TLSv1, TLSv1.1, TLSv1.2]
[2019-11-25T16:54:31,404][DEBUG][io.netty.handler.ssl.OpenSsl] Default ciph=
er
suites (OpenSSL): [TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA=
256,
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA,
TLS_RSA_WITH_AES_256_CBC_SHA]
[2019-11-25T16:54:31,411][INFO ][logstash.inputs.beats    ] Beats inputs:
Starting input listener {:address=3D>"0.0.0.0:5044"}
...

I haven't got this far before, Logstash doesn't crash. It seems to be worki=
ng
but would like to test and view the logs a bit more, this is huge progress.
Will report back after the holiday.

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-241312-37421-U4DnhTNgDI>