-
Notifications
You must be signed in to change notification settings - Fork 58
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SSL Certificate: Invalid header type 60 #822
Comments
That seems related to haskell-tls/hs-tls#179 , and perhaps using openssl would help. I'll propose a change shortly. |
To use another cert authority, you need to create a ca-bundle.crt file and bind mount it to the container |
I was mistaken. The certificate we are using is a valid certificate which does not require any additional non-public Root CA or Intermediate CA. Is it possible the GraphQL endpoint used it wrong? Trying to figure out if it might be an issue not related to the library. |
The crawler is currently using a library named http-client-tls to handle TLS, and it's possible that this implementation is not able to handle your endpoint. Does setting TLS_NO_VERIFY=1 help? Then #823 replaces the implementation with an openssl binding, which may also fix your issue. |
It did not, if I used it correctly. I did this in my crawler:
command: monocle crawler
depends_on:
- api
env_file: ".secrets"
environment:
CONFIG: /etc/monocle/config.yaml
+ TLS_NO_VERIFY: "1" |
Surely something has changed, but it has not been solved
The root cause might be different than what we thought initially. I am wondering if, for some reason, the container is trying to use proxy? Not sure. Running
After some tests and researches, it seems to be this bug which relates to openssl and possible the load balancer. |
Hi, Perhaps, in the crawler container you could decrease the seclevel via: /etc/crypto-policies/back-ends/openssl.config |
Yes, I did it mounting the file from my local with just
but I did not like it. I also tried the full string |
Could you please confirm the issue is related to the curl and openssl provided by fedora 35, by running: $ podman run -it --rm registry.fedoraproject.org/fedora:35
# dnf update -y
# curl https://github.mycomp.com If that is the case, could you try with an older version, e.g. Looking at |
Up to fedora v32 works. Above, it does not. |
So it seems like that may be relevant: https://fedoraproject.org/wiki/Changes/StrongCryptoSettings2 |
Actually, it seems like LEGACY is a crypto-policy settings, so you might have to try: |
Changing the cypher in the file seems not effective. I am wondering whether that's the correct way. I tried to find how the setting should be written on openssl.org but I did not find anything Google has too many options instead. Crawler container does not have the command I am trying to see whether I can confirm on a Fedora 33 which changes I need to make in order to get it working. |
Hi,
|
Hi @LunaticMuch, our proposed fixes have been merged. You can now specify the TLS ciphers using TLS_CIPHERS env var. Please make sure to use last published containers. I close the issue. Please re-open if needed. |
Confirmed working. It seems that error is gone. There's a different issue now. I will debug it separately. |
I am seeing a weird message in my crawler logs
I am using GitHub enterprise, and I am interesting in a single repo which is at URL
https://github.mycomp.com/tech-eng/myrepo
The config I am using is
And the token in the secrets is my valid token. I am wondering if it might be a certificate issue as the ssl certificate is not public, so the container might not be able to validate it. If so, is there any option I could use to accept invalid certificate? or to upload another cert authority?
The text was updated successfully, but these errors were encountered: