Products | Versions |
---|---|
TIBCO LogLogic Universal Collector | all versions |
The following error may be seen in the TIBCO LogLogic Universal Collector Console in a popup window as a result of performing a test connection with secure ULDP (ULDPS) or TLS TCP syslog to LogLogic LMI:
The server does not answer. Check that the firewall is configured properly and that the IP, Hostname or Port are correct. The remote server may also be down or unreachable.
Although the above error is also reported in other scenarios, such as when the LMI appliance is completely offline, if the UC host is using Java 1.8.0u201 or higher with ULDPS or TLS TCP syslog and the LMI appliance has been confirmed to be operating correctly, then the error is most likely due to an issue with TLS cipher suites.
Another way to confirm if it's a cipher suite issue is if the following events are seen on the LogLogic LMI end of the connection in /var/log/sys.log:
2019.03.12 15:27:53 LOG5[3]: Service [SecureULDP] accepted connection from ::ffff:192.168.1.196:51737
<29>Mar 12 15:27:53 logapp stunnel: LOG5[3]: Service [SecureULDP] accepted connection from ::ffff:192.168.1.196:51737
2019.03.12 15:27:53 LOG3[3]: SSL_accept: Peer suddenly disconnected
<27>Mar 12 15:27:53 logapp stunnel: LOG3[3]: SSL_accept: Peer suddenly disconnected
2019.03.12 15:27:53 LOG5[3]: Connection reset: 0 byte(s) sent to SSL, 0 byte(s) sent to socket
<29>Mar 12 15:27:53 logapp stunnel: LOG5[3]: Connection reset: 0 byte(s) sent to SSL, 0 byte(s) sent to socket
The events listed above in the LMI sys.log file will occur both as a result of a failed test connection but also each time UC attempts making a connection to LMI (every 1 minute) when the behavior is a result of the known issue documented in this article.
The errors above from UC and LMI are indicating that no attempt at all was made to establish the encrypted tunnel. A packet capture of this connection attempt also will show this. The first step for establishing a secure tunnel is for the UC host to send an SSL Client Hello message to the server (i.e. LMI) but the packet capture shows this is never sent by UC.
All this indicates a fundamental problem, such as one related to cipher suites, exists that is preventing UC from attempting to establish the tunnel. If the UC host was recently upgraded to Java 1.8.0u201 (or higher) then the behavior described above is most likely due to cipher suites. Per the 1.8.0u201 release notes Oracle has disabled anonymous and null cipher suites. That change has generated a known issue with Universal Collector.
How does that change affect UC and the encrypted tunnel to LMI? There are 2 ways that UC is affected:
The first is when using ULDPS. When using ULDPS the UC Console provides the flexibility to enable authentication separately from encryption. UC uses a different cipher suite when encryption is enabled versus if only authentication is enabled. The cipher suite used when encryption is not enabled is one that specifically excludes an encryption algorithm in the suite, which is expected behavior given the user's choices in the UC Console GUI. A cipher suite that doesn't have an encryption component included in it is what is known as a null cipher. For example this is a non-NULL cipher: TLS_RSA_WITH_AES_128_CBC_SHA. This is an example of a NULL cipher: SSL_RSA_WITH_NULL_SHA.
For most situations anyone who uses a cipher suite with SSL certificates is going to be using it for encryption but there are exceptions. In the case of UC, a user who only wants to use certificates for authentication purposes rather than for confidentiality purposes can do so. But starting with Java 1.8.0u201 that requires some changes to the Java configuration.
The other way that UC is affected is when using TLS TCP syslog to forward data to a product like LogLogic LMI. When TLS TCP syslog is used the cipher suite used is an anonymous cipher.
How to resolve this behavior?
Refer to the resolution section for how to resolve this issue in the context of the environments documented in the Environment field.