Also when I run openssl I get the following: 

openssl s_client -showcerts -connect solrsite.com:8983 </dev/null
CONNECTED(00000003)
140323576973200:error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert 
handshake failure:s23_clnt.c:769:
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 7 bytes and written 289 bytes
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : 0000
    Session-ID:
    Session-ID-ctx:
    Master-Key:
    Key-Arg   : None
    Krb5 Principal: None
    PSK identity: None
    PSK identity hint: None
    Start Time: 1558094602
    Timeout   : 300 (sec)
    Verify return code: 0 (ok)


Subject: [EXTERNAL] ERR_SSL_VERSION_OR_CIPHER_MISMATCH Solr 8.1.0

Hello,

I have upgraded one of our boxes to Solr 8.1.0 on RHEL 7.6 with Java 12.0.1.  I 
also had a certificate up for renewal and I went through my regular process of 
creating the certificate and key.  Now I get a 
ERR_SSL_VERSION_OR_CIPHER_MISMATCH error.  I have gotten this before however, 
that was due to me adding the certificate into the keystore.   Here are the 
list of cmds I that have run.

keytool -import -trustcacerts -alias root -file RootCA.cer -keystore 
solr-ssl.keystore.jks keytool -import -trustcacerts -alias POL1 -file 
Pol1CA.cer -keystore solr-ssl.keystore.jks keytool -import -trustcacerts -alias 
SUB1 -file Sub1CA.cer -keystore solr-ssl.keystore.jks keytool -import 
-trustcacerts -alias SUB2 -file Sub2CA.cer -keystore solr-ssl.keystore.jks


openssl pkcs12 -export -in solr.cer -inkey solrpk.key > solr-ssl.p12


keytool -importkeystore -srckeystore solr-ssl.keystore.jks -destkeystore 
solr-ssl.keystore.jks -deststoretype pkcs12

solr.in.sh

# Enables HTTPS. It is implictly true if you set SOLR_SSL_KEY_STORE. Use this 
config # to enable https module with custom jetty configuration.
#SOLR_SSL_ENABLED=true
# Uncomment to set SSL-related system properties # Be sure to update the paths 
to the correct keystore for your environment 
SOLR_SSL_KEY_STORE=/opt/solr-8.1.0/solr-ssl.keystore.jks
SOLR_SSL_KEY_STORE_PASSWORD=password
SOLR_SSL_TRUST_STORE=/opt/solr-8.1.0/solr-ssl.keystore.jks
SOLR_SSL_TRUST_STORE_PASSWORD=password
# Require clients to authenticate
SOLR_SSL_NEED_CLIENT_AUTH=false
# Enable clients to authenticate (but not require) 
SOLR_SSL_WANT_CLIENT_AUTH=false # SSL Certificates contain host/ip "peer name" 
information that is validated by default. Setting # this to false can be useful 
to disable these checks when re-using a certificate on many hosts 
#SOLR_SSL_CHECK_PEER_NAME=true # Override Key/Trust Store types if necessary 
SOLR_SSL_KEY_STORE_TYPE=JKS SOLR_SSL_TRUST_STORE_TYPE=JKS









Thank you,

Kent Younge
Systems Engineer

Reply via email to