[ 
https://issues.apache.org/jira/browse/ZOOKEEPER-4393?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17484346#comment-17484346
 ] 

Nilendra Jain commented on ZOOKEEPER-4393:
------------------------------------------

Hi [~edipesh19] 

 

Thanks for the suggestion. I tried it, but now I am getting a new exception 
during packet exchange:

[2022-01-30 23:32:33,325] INFO Nilendra - sendPkt - {} clientPath:null 
serverPath:null finished:false header:: null replyHeader:: null request:: 
0,0,18000,0,#0000000000000000  response:: null 
(org.apache.zookeeper.ClientCnxnSocketNetty)
[2022-01-30 23:32:33,326] TRACE Channel active [id: 0x9b98ffde, 
L:/0:0:0:0:0:0:0:1:2181 - R:/0:0:0:0:0:0:0:1:40500] 
(org.apache.zookeeper.server.NettyServerCnxnFactory)
[2022-01-30 23:32:33,433] DEBUG -Dio.netty.recycler.maxCapacityPerThread: 4096 
(io.netty.util.Recycler)
[2022-01-30 23:32:33,433] DEBUG -Dio.netty.recycler.maxSharedCapacityFactor: 2 
(io.netty.util.Recycler)
[2022-01-30 23:32:33,433] DEBUG -Dio.netty.recycler.linkCapacity: 16 
(io.netty.util.Recycler)
[2022-01-30 23:32:33,433] DEBUG -Dio.netty.recycler.ratio: 8 
(io.netty.util.Recycler)
[2022-01-30 23:32:33,433] DEBUG -Dio.netty.recycler.delayedQueue.ratio: 8 
(io.netty.util.Recycler)
[2022-01-30 23:32:33,438] DEBUG -Dio.netty.buffer.checkAccessible: true 
(io.netty.buffer.AbstractByteBuf)
[2022-01-30 23:32:33,438] DEBUG -Dio.netty.buffer.checkBounds: true 
(io.netty.buffer.AbstractByteBuf)
[2022-01-30 23:32:33,439] DEBUG Loaded default ResourceLeakDetector: 
io.netty.util.ResourceLeakDetector@4542e4da 
(io.netty.util.ResourceLeakDetectorFactory)
[2022-01-30 23:32:33,444] TRACE message received called 
PooledUnsafeDirectByteBuf(ridx: 0, widx: 235, cap: 2048) 
(org.apache.zookeeper.server.NettyServerCnxnFactory)
[2022-01-30 23:32:33,444] DEBUG New message PooledUnsafeDirectByteBuf(ridx: 0, 
widx: 235, cap: 2048) from [id: 0x9b98ffde, L:/0:0:0:0:0:0:0:1:2181 - 
R:/0:0:0:0:0:0:0:1:40500] (org.apache.zookeeper.server.NettyServerCnxnFactory)
[2022-01-30 23:32:33,445] DEBUG 0x0 queuedBuffer: null 
(org.apache.zookeeper.server.NettyServerCnxn)
[2022-01-30 23:32:33,446] TRACE 0x0 buf 
16030300e6010000e2030341dfebbc23c8d06b17545b8088a64a8e39ad222fc52c262d448a2df07609ffbf000056c02cc02bc030c02f009f00a3009e00a2c024c028c023c027006b006a00670040c02ec032c02dc031c026c02ac025c029c00ac014c009c0130039003800330032c005c00fc004c00e009d009c003d003c0035002f00ff01000063000a0012001000170018001901000101010201030104000b00020100000d001c001a04030503060304010501060104020303030103020203020102020032001c001a0403050306030401050106010402030303010302020302010202002b0003020303
 (org.apache.zookeeper.server.NettyServerCnxn)
[2022-01-30 23:32:33,446] DEBUG not throttled 
(org.apache.zookeeper.server.NettyServerCnxn)
[2022-01-30 23:32:33,446] TRACE message readable 235 bblenrem 4 
(org.apache.zookeeper.server.NettyServerCnxn)
[2022-01-30 23:32:33,449] TRACE 0x0 bbLen  
(org.apache.zookeeper.server.NettyServerCnxn)
[2022-01-30 23:32:33,449] TRACE More bytes read - message readable 231 bblenrem 
0 (org.apache.zookeeper.server.NettyServerCnxn)
[2022-01-30 23:32:33,450] TRACE 0x0 bbLen 16030300 
(org.apache.zookeeper.server.NettyServerCnxn)
[2022-01-30 23:32:33,450] TRACE 0x0 bbLen len is 369296128 
(org.apache.zookeeper.server.NettyServerCnxn)
[2022-01-30 23:32:33,451] WARN Closing connection to /0:0:0:0:0:0:0:1:40500 
(org.apache.zookeeper.server.NettyServerCnxn)
java.io.IOException: Len error 369296128
        at 
org.apache.zookeeper.server.NettyServerCnxn.receiveMessage(NettyServerCnxn.java:518)
        at 
org.apache.zookeeper.server.NettyServerCnxn.processMessage(NettyServerCnxn.java:370)
        at 
org.apache.zookeeper.server.NettyServerCnxnFactory$CnxnChannelHandler.channelRead(NettyServerCnxnFactory.java:337)
        at 
io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)
        at 
io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)
        at 
io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)
        at 
io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410)
        at 
io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)
        at 
io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)
        at 
io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919)
        at 
io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166)
        at 
io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:719)
        at 
io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:655)
        at 
io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:581)
        at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493)
        at 
io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989)
        at 
io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74)
        at 
io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30)
        at java.lang.Thread.run(Thread.java:748)
[2022-01-30 23:32:33,452] DEBUG close called for session id: 0x0 
(org.apache.zookeeper.server.NettyServerCnxn)
[2022-01-30 23:32:33,452] DEBUG close in progress for session id: 0x0 
(org.apache.zookeeper.server.NettyServerCnxn)

> Problem to connect to zookeeper in FIPS mode
> --------------------------------------------
>
>                 Key: ZOOKEEPER-4393
>                 URL: https://issues.apache.org/jira/browse/ZOOKEEPER-4393
>             Project: ZooKeeper
>          Issue Type: Bug
>          Components: security
>    Affects Versions: 3.6.3
>            Reporter: Dipesh Kumar Dutta
>            Priority: Major
>
> In my environment zookeeper is running in fips mode of 3 node cluster. My 
> service is also running in fips mode with security provider 
> org.bouncycastle.jcajce.provider.BouncyCastleFipsProvider
> And from the my service when I am trying to connect to zookeeper I am getting 
> the below error.
> {code:java}
> 2021-10-06 17:14:52,645 [nioEventLoopGroup-5-1] WARN  
> io.netty.channel.ChannelInitializer - opc.request.id=none - Failed to 
> initialize a channel. Closing: [id: 0xa129ece9] -
> org.apache.zookeeper.common.X509Exception$SSLContextException: 
> java.security.KeyManagementException: FIPS mode: only SunJSSE TrustManagers 
> may be used
>       at 
> org.apache.zookeeper.common.X509Util.createSSLContextAndOptionsFromConfig(X509Util.java:386)
>       at 
> org.apache.zookeeper.common.X509Util.createSSLContextAndOptions(X509Util.java:328)
>       at 
> org.apache.zookeeper.common.X509Util.createSSLContext(X509Util.java:256)
> {code}
> The reason is the zookeeper has its own trust manager implementation which is 
> {code:java}
> public class ZKTrustManager extends X509ExtendedTrustManager
> {code}
> and jdk also provide a trust manager implementation as below.
> {code:java}
> X509TrustManagerImpl extends X509ExtendedTrustManager implements 
> X509TrustManager
> {code}
> Because of this hierarchy in SSLContextImpl::chooseTrustManager() method the 
> below instance check become false and hence it falls to the exception block.
> {code:java}
> if (SunJSSE.isFIPS() && !(var1[var2] instanceof X509TrustManagerImpl)) {
>     throw new KeyManagementException("FIPS mode: only SunJSSE TrustManagers 
> may be used");
> }
> {code}
>  
>  



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

Reply via email to