You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Some of the controller's TLS listeners accept client certs as well as clients without client certs, e.g., enrollees, and jwt or password authenticators, including ziti edge login.
Each time one of these legitimate clients negotiates server TLS (not mTLS) with the client or management APIs, the controller logs an error-level message reporting this completely expected and normal event, that the client did not present a client certificate.
This causes significant confusion for users who understandably expect error-level messages to indicate a problem, so they often report these handshake "errors" when asking for help using ziti.
Here's an example log message in the simplified text format:
Some of the controller's TLS listeners accept client certs as well as clients without client certs, e.g., enrollees, and jwt or password authenticators, including
ziti edge login
.Each time one of these legitimate clients negotiates server TLS (not mTLS) with the client or management APIs, the controller logs an error-level message reporting this completely expected and normal event, that the client did not present a client certificate.
This causes significant confusion for users who understandably expect error-level messages to indicate a problem, so they often report these handshake "errors" when asking for help using ziti.
Here's an example log message in the simplified text format:
Here's how it's presented in JSON format:
The text was updated successfully, but these errors were encountered: