SSL FAQ
- Extended key usage must permit both TLS client and TLS server authentication.
- Both the certificate and the CA chain are required, because NetBrain requires a full chain certificate.
- Only the Base-64 encoded X.509 (.CER) format is supported.
- Private key cannot be password encrypted and must be in the pkcs8 format.
Use a vi editor on Linux or Notepad++ on Windows to open your private key file, and make sure it looks exactly like this:
-----BEGIN PRIVATE KEY----- xxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxx -----END PRIVATE KEY----- |
|---|
| -----BEGIN PRIVATE KEY----- Proc-Type: 4,ENCRYPTED xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx -----END PRIVATE KEY----- |
|---|
openssl rsa -in ABCCompany.key -out ABCCompany.key.unencrypted
|
|---|
For example, if your company has a root CA and an intermediate CA, which means Level 3 cert chain is used.
-----BEGIN CERTIFICATE----- |
|---|
-----BEGIN CERTIFICATE----- |
|---|
- The easiest way is to install Elasticsearch with SSL enabled.Generally, if Elasticsearch can be installed successfully with SSL enabled, your certificate chain should be able to meet the requirements of all the other NetBrain components.
Note: HTTPS, which can be enabled on IIS of Web Server, is not covered here.
- Another way is to check by running the following command on a Linux server: openssl verify –verbose -CAfile CApath Certpath
Note: This command cannot ensure the installation on NetBrain will be successful.
[root@localhost pki-scripts]# openssl verify -verbose -CAfile ./ca/chain-ca.pem node.pem node.pem: OK [root@localhost pki-scripts]# |
|---|
The most common certificate format is “.PFX”, which usually includes private keys and certificates in X.509 format.
Use the following command to convert a PFX file, for example, pkcs12, into the one that NetBrain supports:
openssl pkcs12 –in ABCCompany.pfx -out netbrain.pem –nodes
During this converting process, you might be asked to input the passphrase of the PFX file. Check with your Network Administrator for more details.
How to find out the root cause when your SSL installation fails?
The best way to verify your certificate chain is to install Elasticsearch first.
If the installation failed, check the elastic-search-cluster.log file under Elasticsearch’s installation directory to see if there is any error.
Generally, an error might be caused by:
- incorrect cert or private key format
- extended key usage TLS client does not permit client auth.
|
Note: Try the new certificate chain and key file to make sure the elastic-search-cluster.log file does not generate the same error logs anymore.
|
[root@localhost home]# cd elasticsearch/
[root@localhost elasticsearch]# ls
bin config data fix_releaseinfo.json lib LICENSE.txt logs modules NOTICE.txt pid plugins README.textile temp
[root@localhost elasticsearch]#
|
|---|