Thanks Shawn for your input, Is this errors specific only for zookeeper 
operations? If so is there any way to turn off default zookeeper which runs on 
9983?

Dinesh Sundaram
MBS Platform Engineering

Mastercard



-----Original Message-----
From: Shawn Heisey [mailto:apa...@elyograg.org]
Sent: Wednesday, December 13, 2017 11:38 AM
To: solr-user@lucene.apache.org
Subject: Re: Solr ssl issue while creating collection

On 12/13/2017 10:06 AM, Sundaram, Dinesh wrote:
> Thanks Shawn, this helps. Now getting the below exception, is there any way 
> to avoid verifying this?
>
> 2017-12-13 17:00:39.239 DEBUG 
> (httpShardExecutor-4-thread-1-processing-n:xx.xx.xx.xx:8983_solr 
> [https://urldefense.proofpoint.com/v2/url?u=https-3A____xx.xx.xx.xx-3A8983__solr&d=DwIDaQ&c=uc5ZRXl8dGLM1RMQwf7xTCjRqXF0jmCF6SP0bDlmMmY&r=gCFZFMR7y0gzhIBFz1lKTqHFMl-3R6gq7ojE0Eam2Eg&m=v4DznkLF4VBvrVleiFON0I41uu_NPGd1TpVYs3q0Hro&s=eqDSyAa-0UCXm_IT2YoWaZDjMb5zM5Uv8-9Zcidjlec&e=]
>  
> https://urldefense.proofpoint.com/v2/url?u=https-3A____xx.xx.xx.xx-3A8983__solr&d=DwIDaQ&c=uc5ZRXl8dGLM1RMQwf7xTCjRqXF0jmCF6SP0bDlmMmY&r=gCFZFMR7y0gzhIBFz1lKTqHFMl-3R6gq7ojE0Eam2Eg&m=v4DznkLF4VBvrVleiFON0I41uu_NPGd1TpVYs3q0Hro&s=eqDSyAa-0UCXm_IT2YoWaZDjMb5zM5Uv8-9Zcidjlec&e=)
>  [   ] o.a.h.c.s.DefaultHostnameVerifier Certificate for <xx.xx.xx.xx> 
> doesn't match common name of the certificate subject: xx.xx.xx.xx.com
> javax.net.ssl.SSLPeerUnverifiedException: Certificate for
> <xx.xx.xx.xx> doesn't match common name of the certificate subject:
> xx.xx.xx.xx.com

If you're running 6.x, then you can disable the hostname verification. But if 
you're running 7.x, there's a bug that breaks it:

https://urldefense.proofpoint.com/v2/url?u=https-3A__issues.apache.org_jira_browse_SOLR-2D9304&d=DwIDaQ&c=uc5ZRXl8dGLM1RMQwf7xTCjRqXF0jmCF6SP0bDlmMmY&r=gCFZFMR7y0gzhIBFz1lKTqHFMl-3R6gq7ojE0Eam2Eg&m=v4DznkLF4VBvrVleiFON0I41uu_NPGd1TpVYs3q0Hro&s=mX_wS19NYYqBsWUI3qCXAXBbY-3p8Vjkzq4K3BFfgdk&e=

There's a patch on the issue, but it hasn't been tested, so I have no idea 
whether it works.  Even if it works, the patch is incomplete because it doesn't 
have a test to verify the problem doesn't happen again.

An alternate idea would be to add all the possible hostnames to the certificate 
you're using, and make sure the trust stores are valid, so all of the cert 
verification will work.

Thanks,
Shawn


CONFIDENTIALITY NOTICE This e-mail message and any attachments are only for the 
use of the intended recipient and may contain information that is privileged, 
confidential or exempt from disclosure under applicable law. If you are not the 
intended recipient, any disclosure, distribution or other use of this e-mail 
message or attachments is prohibited. If you have received this e-mail message 
in error, please delete and notify the sender immediately. Thank you.

Reply via email to