[chef] Re: Re: Re: Fw: SSL error running workstation/client commands to hosted server


Chronological Thread 
  • From: phil helm < >
  • To: " " < >, " " < >
  • Subject: [chef] Re: Re: Re: Fw: SSL error running workstation/client commands to hosted server
  • Date: Fri, 16 Aug 2013 07:15:44 -0700 (PDT)
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=AEsO53bPW7OPtck6wmra6WzhHB3GcVB17SGW5OHBotpqIg8Rh3HzxWFpLS09WM6Lu7L3cw1B/wIYZfDk0bG1HqxRf+pHUvJ4zq2mpUJwEhIh1iQ4a2BB2vO0NxI467ud9FpYAnJCeBucZw6LSqNJOI36yRCMqWQktB9+vtAvgJ8=;

Thanks Steven. Here is what I got:

:~# openssl s_client -connect api.opscode.com:443
CONNECTED(00000003)
depth=1 C = US, O = DigiCert Inc, CN = DigiCert Secure Server CA
verify error:num=20:unable to get local issuer certificate
verify return:0
---
Certificate chain
 0 s:/C=US/ST=Washington/L=Seattle/O=Opscode, Inc/CN=*.opscode.com
   i:/C=US/O=DigiCert Inc/CN=DigiCert Secure Server CA
 1 s:/C=US/O=DigiCert Inc/CN=DigiCert Secure Server CA
   i:/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Global Root CA
---
Server certificate
-----BEGIN CERTIFICATE-----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 Rl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 20wQgYIKwYBBQUHMAKGNmh0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
bS9EaWdpQ2VydFNlY3VyZVNlcnZlckNBLmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG
SIb3DQEBBQUAA4IBAQCNk1+7l+VlAZrKov7ugP7WuKS7IEUZRk8CVAFPtIrp+jFB
6W0ta1qMpYyItp5enTBCGOkTfPly06hZnFRQw3ZnkSsWDKIvCRks4kZt3oHLd3nO
G671JGRJI/qbs6F5l6c96kotlZkolYIPMhyK8Ex4LjMW6UrPWdpJrXTWPvLq4c85
ZaN52yKu6tsLrBTPwPmK9t+zQ2drb1g8Eq9B+cuwD3Row6njsDQ1Ltry+KCnivki
E/ptgwyCkS4brkhjHMz5l5Co0KMsHylAb2XcBxFVFSl0aJIqK5Gr0nTlg26pNG7O
qxv6ncOHl3tmArETi36TQbTYvFc+6cNb8CqdWe95
-----END CERTIFICATE-----
subject=/C=US/ST=Washington/L=Seattle/O=Opscode, Inc/CN=*.opscode.com
issuer=/C=US/O=DigiCert Inc/CN=DigiCert Secure Server CA
---
No client certificate CA names sent
---
SSL handshake has read 3200 bytes and written 551 bytes
---
New, TLSv1/SSLv3, Cipher is AES256-SHA
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
    Protocol  : TLSv1
    Cipher    : AES256-SHA
    Session-ID: B94A987CC3FA802C4E3DD3B73D5729BE64E6B92A162CBED07D05FF5961B845B9
    Session-ID-ctx:
    Master-Key: 78C115130D5200670C802993846B6118B140328E1E5B4BA327861F92CB84803ACADFE7F7D00D5372CDFDFB0CAA9974B3
    Key-Arg   : None
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket:
    0000 - a1 7a e9 60 26 23 b0 54-8c 0e 78 09 00 5f 60 39   .z.`&#.T..x.._`9
    0010 - d8 20 df cb bf 27 59 d2-5c 47 e5 63 65 1a 81 54   . ...'Y.\G.ce..T
    0020 - 4b d4 82 6c 4e f1 09 c5-6b 47 0f 7c bd 0a f4 23   K..lN...kG.|...#
    0030 - d7 27 3f c6 8d 36 08 f5-74 53 8a 73 52 7f a5 f3   .'?..6..tS.sR...
    0040 - f8 40 f0 52 5d 3d cb eb-64 c7 53 3b 21 da bc 0c   ;!...
    0050 - a8 7f 79 1c b9 4f c2 7f-e4 42 83 e5 12 36 32 8b   ..y..O...B...62.
    0060 - d2 4f 68 d7 e4 7f 42 fc-64 d2 d0 8e c4 ce c3 08   .Oh...B.d.......
    0070 - a9 a5 2d b7 4c 7e 45 01-ef ca be 80 3f 2b 51 0b   ..-.L~E.....?+Q.
    0080 - 90 ee 8a 7e 9e 8c e7 86-7e 65 b5 85 b6 04 58 61   ...~....~e....Xa
    0090 - e2 60 a8 69 86 de 36 77-90 19 bd 4f ed 74 b5 86   .`.i..6w...O.t..

    Start Time: 1376662318
    Timeout   : 300 (sec)
    Verify return code: 20 (unable to get local issuer certificate)
---
read:errno=0

...and for the omnibus ssl (looks the same to me):

:~# /opt/chef/embedded/bin/openssl s_client -connect api.opscode.com:443
CONNECTED(00000003)
depth=1 C = US, O = DigiCert Inc, CN = DigiCert Secure Server CA
verify error:num=20:unable to get local issuer certificate
verify return:0
---
Certificate chain
 0 s:/C=US/ST=Washington/L=Seattle/O=Opscode, Inc/CN=*.opscode.com
   i:/C=US/O=DigiCert Inc/CN=DigiCert Secure Server CA
 1 s:/C=US/O=DigiCert Inc/CN=DigiCert Secure Server CA
   i:/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Global Root CA
---
Server certificate
-----BEGIN CERTIFICATE-----
MIIGqjCCBZKgAwIBAgIQCJlQhNSTz1z3zHZb972KvDANBgkqhkiG9w0BAQUFADBI
MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMSIwIAYDVQQDExlE
aWdpQ2VydCBTZWN1cmUgU2VydmVyIENBMB4XDTEzMDQxMjAwMDAwMFoXDTE0MDYx
NjEyMDAwMFowYzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
BgNVBAcTB1NlYXR0bGUxFTATBgNVBAoTDE9wc2NvZGUsIEluYzEWMBQGA1UEAwwN
Ki5vcHNjb2RlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAN+U
HLAzObPRlmchlkJ2JFeReJRPXj5F27HuX8SXT+5WhVGunQf1swjASJ0utk1x9wGT
f9tnF8fYiwJIqWJopaPiwzNw1cD6CnIfhM3z4T3EzLAWWu2ZhfuaQk9Z6jhItkm7
upO4CsFq1xw7IjqOq09PCAklYC/Y/8Qq5Qj8VoTp0ldVv6hbqTNkezhWcKU/07si
jAX1O+DYN6dlVNezfl4Xt5ccsu8Mp0s92IMVYLgY6bpb1b91ez9+XBE1v7zjaR0V
EP7Ix9av/pXjqMqHgjlsg46UpLa30f4FEi2xmXpCBpOP94rCrT7g+u8UlIrJ/QK/
/lHyKBpCm0R9ftDbppsCAwEAAaOCA3MwggNvMB8GA1UdIwQYMBaAFJBx2zfrc8jv
3NUeErY0uitaoKaSMB0GA1UdDgQWBBTdhCU7MvQblxtWHlfHG4jPUTuh5DBLBgNV
HREERDBCgg0qLm9wc2NvZGUuY29tggtvcHNjb2RlLmNvbYIQY29ycC5vcHNjb2 Rl
LmNvbYISKi5jb3JwLm9wc2NvZGUuY29tMA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUE
FjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwYQYDVR0fBFowWDAqoCigJoYkaHR0cDov
L2NybDMuZGlnaWNlcnQuY29tL3NzY2EtZzEuY3JsMCqgKKAmhiRodHRwOi8vY3Js
NC5kaWdpY2VydC5jb20vc3NjYS1nMS5jcmwwggHEBgNVHSAEggG7MIIBtzCCAbMG
CWCGSAGG/WwBATCCAaQwOgYIKwYBBQUHAgEWLmh0dHA6Ly93d3cuZGlnaWNlcnQu
Y29tL3NzbC1jcHMtcmVwb3NpdG9yeS5odG0wggFkBggrBgEFBQcCAjCCAVYeggFS
AEEAbgB5ACAAdQBzAGUAIABvAGYAIAB0AGgAaQBzACAAQwBlAHIAdABpAGYAaQBj
AGEAdABlACAAYwBvAG4AcwB0AGkAdAB1AHQAZQBzACAAYQBjAGMAZQBwAHQAYQBu
AGMAZQAgAG8AZgAgAHQAaABlACAARABpAGcAaQBDAGUAcgB0ACAAQwBQAC8AQwBQ
AFMAIABhAG4AZAAgAHQAaABlACAAUgBlAGwAeQBpAG4AZwAgAFAAYQByAHQAeQAg
AEEAZwByAGUAZQBtAGUAbgB0ACAAdwBoAGkAYwBoACAAbABpAG0AaQB0ACAAbABp
AGEAYgBpAGwAaQB0AHkAIABhAG4AZAAgAGEAcgBlACAAaQBuAGMAbwByAHAAbwBy
AGEAdABlAGQAIABoAGUAcgBlAGkAbgAgAGIAeQAgAHIAZQBmAGUAcgBlAG4AYwBl
AC4weAYIKwYBBQUHAQEEbDBqMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
Y2VydC5jb 20wQgYIKwYBBQUHMAKGNmh0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
bS9EaWdpQ2VydFNlY3VyZVNlcnZlckNBLmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG
SIb3DQEBBQUAA4IBAQCNk1+7l+VlAZrKov7ugP7WuKS7IEUZRk8CVAFPtIrp+jFB
6W0ta1qMpYyItp5enTBCGOkTfPly06hZnFRQw3ZnkSsWDKIvCRks4kZt3oHLd3nO
G671JGRJI/qbs6F5l6c96kotlZkolYIPMhyK8Ex4LjMW6UrPWdpJrXTWPvLq4c85
ZaN52yKu6tsLrBTPwPmK9t+zQ2drb1g8Eq9B+cuwD3Row6njsDQ1Ltry+KCnivki
E/ptgwyCkS4brkhjHMz5l5Co0KMsHylAb2XcBxFVFSl0aJIqK5Gr0nTlg26pNG7O
qxv6ncOHl3tmArETi36TQbTYvFc+6cNb8CqdWe95
-----END CERTIFICATE-----
subject=/C=US/ST=Washington/L=Seattle/O=Opscode, Inc/CN=*.opscode.com
issuer=/C=US/O=DigiCert Inc/CN=DigiCert Secure Server CA
---
No client certificate CA names sent
---
SSL handshake has read 3200 bytes and written 646 bytes
---
New, TLSv1/SSLv3, Cipher is AES256-SHA
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
    Protocol  : TLSv1
    Cipher    : AES256-SHA
    Session-ID: 7D0EE4FCCC25A6F3CF90CE624B76638DC14ED39B26A492FE6742F669DA043AF8
    Session-ID-ctx:
    Master-Key: 2BBD641AF694F157C6F141295E54E1CA9274EE21589BEB1536F468C513F580F4B76CF5B60F3083AAE3DFF46D71AF22D6
    Key-Arg   : None
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket:
    0000 - e4 dd 32 4d e8 ba fa ba-d3 b0 f9 b9 96 de 7e b8   ..2M..........~.
    0010 - 9b 6c bf d7 2e 93 f9 27-03 9e b8 a3 5f 19 cf 6d   .l.....'...._..m
    0020 - 19 51 8c a9 16 83 f9 01-1d 82 45 be 80 0c 1c 56   .Q........E....V
    0030 - 4a b6 67 8c 88 15 16 a4-c0 db c5 e7 42 2f a5 72   J.g.........B/.r
    0040 - 3c db b2 ed 34 13 8b 71-41 8d 69 07 70 95 3d 6b   <...4..qA.i.p.=k
    0050 - 0b 93 7d 51 47 c1 50 85-03 5a 8a cb 54 0d 7a 9c   ..}QG.P..Z..T.z.
    0060 - dd b5 33 c5 9f 38 31 a1-a2 96 eb f3 fe 15 6a 14   ..3..81.......j.
    0070 - e9 84 c3 d2 6b c6 e7 3a-30 b6 1a 23 55 1c 67 60   ....k..:0..#U.g`
    0080 - bf 36 39 7d 48 7e 58 b6-31 ad bd 48 bc 80 0d ce   .69}H~X.1..H....
    0090 - d7 e6 68 4c 9a f2 c0 7a-59 a3 fd 1d 94 99 2e 78   ..hL...zY......x

    Start Time: 1376662447
    Timeout   : 300 (sec)
    Verify return code: 20 (unable to get local issuer certificate)
---
read:errno=0

I think this is telling me that straight ssl works ok?


From: Steven Danna < >
To:
Sent: Thursday, August 15, 2013 2:30 PM
Subject: [chef] Re: Re: Fw: SSL error running workstation/client commands to hosted server

Hi,

On 8/15/13 11:16 AM, phil helm wrote:
> I never got a follow up so resending in case anyone has any other
> thoughts or ideas...

Can you try directly connecting to api.opscode.com using SSL to confirm
that it works outside of Chef:

    openssl s_client -connect api.opscode.com:443

Is the result any different with the omnibus-packaged openssl?

    /opt/chef/embedded/bin/openssl s_client -connect api.opscode.com:443

Cheers,

Steven

>
> Sent from Yahoo! Mail on Android
>
>
> ------------------------------------------------------------------------
> *From: * phil helm < " href="mailto: "> >;
> *To: * " href="mailto: "> < " href="mailto: "> >; Lamont Granquist
> < " href="mailto: "> >;
> *Subject: * Fw: [chef] SSL error running workstation/client commands to
> hosted server
> *Sent: * Mon, Aug 12, 2013 12:22:32 PM
>
> meant to send this to your direct email addresses..
>
> ----- Forwarded Message -----
> *From:* phil helm < " href="mailto: "> >
> *To:*
> *Cc:* " " href="mailto: "> " < " href="mailto: "> >
> *Sent:* Friday, August 9, 2013 4:29 PM
> *Subject:* Re: [chef] SSL error running workstation/client commands to
> hosted server
>
> Daniel,
>
>>Does this happen consistently?
> Yes. Its a hard failure.
>
>>Can you re-run this with `-VV` ?
> " href="mailto: "> :/opt/chef/chef-repo/.chef# knife client list -V -V
> DEBUG: Signing the request as philhelm
> DEBUG: Sending HTTP Request via GET to
> api.opscode.com:443/organizations/phils_hosted_chef_server/clients
> /opt/chef/embedded/lib/ruby/1.9.1/net/http.rb:800:in `connect':
> Connection reset by peer - SSL_connect (Errno::ECONNRESET)
>        from /opt/chef/embedded/lib/ruby/1.9.1/net/http.rb:800:in `block
> in connect'
>        from /opt/chef/embedded/lib/ruby/1.9.1/timeout.rb:55:in `timeout'
>        from /opt/chef/embedded/lib/ruby/1.9.1/timeout.rb:100:in `timeout'
>        from /opt/chef/embedded/lib/ruby/1.9.1/net/http.rb:800:in `connect'
>        from /opt/chef/embedded/lib/ruby/1.9.1/net/http.rb:756:in `do_start'
>        from /opt/chef/embedded/lib/ruby/1.9.1/net/http.rb:745:in `start'
>        from /opt/chef/embedded/lib/ruby/1.9.1/net/http.rb:1285:in `request'
>        from
> /opt/chef/embedded/lib/ruby/gems/1.9.1/gems/rest-client-1.6.7/lib/restclient/net_http_ext.rb:51:in
> `request'
>        from
> /opt/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-11.6.0/lib/chef/rest/rest_request.rb:99:in
> `block in call'
>        from
> /opt/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-11.6.0/lib/chef/rest/rest_request.rb:114:in
> `hide_net_http_bug'
>        from
> /opt/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-11.6.0/lib/chef/rest/rest_request.rb:98:in
> `call'
>        from
> /opt/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-11.6.0/lib/chef/rest.rb:169:in
> `block in raw_http_request'
>        from
> /opt/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-11.6.0/lib/chef/rest.rb:289:in
> `retriable_rest_request'
>        from
> /opt/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-11.6.0/lib/chef/rest.rb:167:in
> `raw_http_request'
>        from
> /opt/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-11.6.0/lib/chef/rest.rb:161:in
> `api_request'
>        from
> /opt/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-11.6.0/lib/chef/rest.rb:102:in
> `get'
>        from
> /opt/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-11.6.0/lib/chef/api_client.rb:139:in
> `list'
>        from
> /opt/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-11.6.0/lib/chef/knife/client_list.rb:38:in
> `run'
>        from
> /opt/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-11.6.0/lib/chef/knife.rb:466:in
> `run_with_pretty_exceptions'
>        from
> /opt/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-11.6.0/lib/chef/knife.rb:173:in
> `run'
>        from
> /opt/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-11.6.0/lib/chef/application/knife.rb:123:in
> `run'
>        from
> /opt/chef/embedded/lib/ruby/gems/1.9.1/gems/chef-11.6.0/bin/knife:25:in
> `<top (required)>'
>        from /usr/bin/knife:23:in `load'
>        from /usr/bin/knife:23:in `<main>'
>
> Lamont,
>
>>Also, are you gem installing chef or using omnibus?
> omnibus
>
>>If you install 11.6 with omnibus (and validate that ls -la `which
> knife` is a symlink to omnibus) does it fix it?
> " href="mailto: "> :/opt/chef/chef-repo/.chef# ls -la `which knife`
> lrwxrwxrwx 1 root root 19 Aug  8 08:24 /usr/bin/knife -> /opt/chef/bin/knife
>
>> Are you using rbenv or rvm?
> I have no idea. Do you think thats related? how do i switch back and
> forth to test?
>
> ------------------------------------------------------------------------
> *From:* Daniel DeLeo < " href="mailto: "> >
> *To:* phil helm < " href="mailto: "> >
> *Cc:* " " href="mailto: "> " < " href="mailto: "> >
> *Sent:* Friday, August 9, 2013 2:41 PM
> *Subject:* Re: [chef] SSL error running workstation/client commands to
> hosted server
>
>
> On Friday, August 9, 2013 at 10:33 AM, phil helm wrote:
>> Hi all,
>>
>> I am having some trouble getting anything on my Ubuntu box to connect
>> to my hosted chef server. What I am trying to do (I think) is to set
>> up a workstation and/or a chef client on this same machine (which, I
>> guess is ok?). One example that produces the failure is 'knife client
>> list' which returns:
>>
>> " href="mailto: "> :/opt/chef/chef-repo# knife client list
>> ERROR: Errno::ECONNRESET: Connection reset by peer - SSL_connect
> Does this happen consistently?
>
> Can you re-run this with `-VV` ?
>
>
> --
> Daniel DeLeo
>
>
>
>
>


--
Steven Danna
Systems Engineer, Opscode, Inc
GPG Key: http://stevendanna.github.com/downloads/code/public.key





Archive powered by MHonArc 2.6.16.

§