-
Notifications
You must be signed in to change notification settings - Fork 726
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TLS troubleshooting guide: document a common widely known case leading to unsupported_record_type X errors #1333
Comments
We have a guide on Troubleshooting TLS, so these would be a good fit there. |
In my environment (Kubernetes running RabbitMQ version 3.10), these log messages are emitted with a log level of "notice" which is not one of the documented logging levels. I'm not sure if that's an issue with the log message itself (should it be one of the documented levels?) or the documentation (should 'notice' be a documented level?). Given the explanation above, should we consider "notice" as comparable to "debug"? |
Consider using GitHub Discussions for questions. Those messages are logged by Erlang's TLS implementation, not RabbitMQ. RabbitMQ itself very rarely if ever logs
|
When connecting to a TLS endpoint from non TLS enabled client I also received this error. Try to do something like this if you are using a C# client:
|
This issue was never meant to be a support forum. |
There is only one place in It is a generic catch-all function clause. This means the cardinality of potential reasons is high. Some cases are well known, the most common being a non-TLS ("plain TCP") client connects to a TLS-enabled port and sends traffic other than TLS handshake. Therefore the scope for potential improvements to the docs seems to me much more limited than it may seem at first. Of course, even documenting the most common case is worth doing. |
This probably belongs in some sort of operations document besides the (already quite long) existing site/ssl.md page.
When connecting an Erlang TLS client or server to an un-encrypted server or client, instead of saying that the other side is probably when un-encrypted when the handshake is invalid, it generates stacktrace and a SASL error in the RabbitMQ logs like:
Errors from an outbound TLS connection generate
CLIENT ALERT
messages instead ofSERVER ALERT
above, but the format is otherwise the same. Packet capturing is the best way to diagnose which ports are not behaving as expected, but there is also a clue in the error message itself. The number given for theunsupported_record_type
is the decimal value of the first byte received over the connection, which for a TLS connection would be message ("record") type identifier. For the example above,65
is the ASCII letterA
, which is the first byte of the AMQP protocol, indicating that the incoming connection is likely an AMQP client that does not have TLS enabled. Another common code is71
for the ASCII letterG
, indicating a likely HTTPGET
request.These sorts of errors are somewhat expected on internet-facing RabbitMQ installations due to prevalence of internet scanning tools that inconsistently use TLS even on common TLS ports. If none of the expected clients are having issues connecting, the errors can be ignored and do not reflect an issue with the RabbitMQ server itself (though you may want to block noisy IP addresses).
The text was updated successfully, but these errors were encountered: