TLS fatal alert code 48 on Azure web role - azure

We're experiencing random timeouts on our azure web role and I'm trying to rule out if this alert code is the cause. When I RDP into the role and check the Event Viewer, I'm seeing hundreds of these errors in the event log:
A fatal alert was received from the remote endpoint. The TLS protocol
defined fatal alert code is 48.
This blog gives more info for alert code 48:
Received a valid certificate chain or partial chain, but the
certificate was not accepted because the CA certificate could not be
located or could not be matched with a known, trusted CA. This message
is always fatal.
We do have an SSL certificate on the server, have setup the azure configuration to use it, and are able to browse the site under https.
What does this error and description mean and how do I go about fixing it? I'm not really sure how to move forward with this info, as it's the first time I've setup a site with SSL.

Related

What does HTTP 403 with substatus 72 mean on Azure and how to fix it?

I have an App Service that's protected by a TLS certificate. It worked fine with small payloads, however, it started failing with larger payloads.
According to an article, I enabled certificate negotiation for my API Management Service:
https://notetoself.tech/2019/06/13/api-call-with-client-certificate-policy-failing-to-execute-due-to-message-size-on-azure-api-management/
However, it still randomly fails with certificate negotiation error, as seen below:
Important - I do not want to use client authentication between browser <-> API management. I'm using it only between API management <-> App Service.
I could not find any information on this substatus 72 code. What does it mean and can it be fixed? Is Azure client certificate authentication broken and won't work with large payloads?
The Negotiate Client Certificate checkbox will not help here as this is for the mutual auth between the client and your apim service where your problem is between apim and app service. Your app service should force apim to exchange the client certificate during the initial SSL handshake rather than waiting until it is needed.
This problem is not related specifically to azure, see this
https://techcommunity.microsoft.com/t5/networking-blog/https-client-certificate-request-freezes-when-the-server-is/ba-p/339672
The issue description to me or at least to how I understood it does not match with the error code as the 17 substatus code means that the client certificate has expired or is not yet valid.
See this https://www.google.com/search?q=403.17+http+code&oq=403.17+http+code&aqs=chrome..69i57.9265j0j7&client=ms-android-samsung-gn-rev1&sourceid=chrome-mobile&ie=UTF-8
And this https://techcommunity.microsoft.com/t5/iis-support-blog/client-certificate-revisited-how-to-troubleshoot-client/ba-p/348053

Problem with SSL WIldcard Certificate on Azure App Service

Firstly I had working custom subdomain for my appservice.
Then I bought SSL wildcard Certificate and then generated pfx file with password. Next I uploaded certificate using Upload Certificate under Private Key Certificates. Certificate has Health Status = Healthy.
Finally, under binding tab I added TLS/SSL binging for my custom domain, choosen this certificate and its type = SNI SSL. Everything seems to be fine, undet custom domain there is SSL State = Secure and SSL Binding = SNI SSL.
When I go to my website - there is no information about any certificates.
I also tried the same with Create App Service Managed Certificate - the same effect, status Healthy, but certificate does not appear on the browser.
#mateuszwdowiak It sounds like you successfully added the SSL binding.
There are two main issues that I can think of that might have proceed the unexpected results that you encountered. Firstly, it can take some time for the SSL certificates to propagate out across the web. From my experience, I've seen it take up to 3 hours. Just because the Azure portal says it's binded, does not mean it will be getting served up just yet.
Secondly, I've seen browser cache also come into play.
It's been a few days but I wanted to see if you resolved this issue. If not, can you please try re-binding your wild card cert, wait up to 3 hours, and then using a fresh browsing session, attempt to browse your site. This should resolve the matter. If not, please reply back so we can assist you further.

Azure application gateway is failing to renew a ceritificate saying it is too large

I'm trying to renew a HTTPS certificate in the Listener of an Application gateway, but after uploading it this message appears:
Failed to save configuration changes to application gateway 'APPLICATION GATEWAY'. Error: Application Gateway serialized Authentication Certificates size 131892 bytes is greater than the allowed 131072 bytes. Please try removing unused Authentication Certificates or reduce size of the certificates. Refer https://aka.ms/appgwremoveauthcert
I already tried following the procedures suggested for removing unused expired certificates, I removed all of the old certificates for this server, but it didn't work
I have already renewed this certificate many times, and just now this error started to appear. I tried to compare the size of the .pfx certificate with its predecessors and the size is the same, someone already received this message?
Error with Application Gateway renew certificate usually occurs if the certificate already exists in Application Gateway auth cert list and matching it.
The best option is to submit a support request to Microsoft Azure Support
There was an Hard-coded limit in Appgateway..So you need to go with V2 version only.

Azure Data Factory v2 - Web Activity - Post Request to HTTPS self-signed Certificate

I have a web server which set up a self-signed certificate.
When I use Web Activity from ADF v2 to send a post request to the HTTPS URL, I got the error message:
"Error calling the endpoint 'https://...'. Response status code: ''. More details:Exception message: 'An error occurred while sending the request.'.No response from the endpoint. Possible causes: network connectivity, DNS failure, server certificate validation or timeout.
Is there anyway that I can cancel the Web Activity server certificate validation or any workaround that makes the Web Activity works with Self-signed certificate?
I have been stuck with this problem for few days so your help is greatly appreciated. Thanks very much in advance.
From here, should be exactly what you are looking for.
Also, in times of free certificates from Let's Encrypt, can't you get a proper cert?

"The X.509 certificate CN=servicebus.windows.net" Azure Service Bus Queue

We use Azure Service Bus and Azure Web App which fills queue. They are in the same resource group. We use WindowsAzure.ServiceBus v2.6.5.
We get this error very rarely:
The X.509 certificate CN=servicebus.windows.net is not in the trusted people store. The X.509 certificate CN=servicebus.windows.net chain building failed. The certificate that was used has a trust chain that cannot be verified. Replace the certificate or change the certificateValidationMode. A certificate chain could not be built to a trusted root authority.
Question: Is this internal error on Azure ? If it's not, what can we do to not get this error ?
I managed to find our more information about this issue. First of all,
what needs to be established is that this is a pure client issue, this
is why there are no tracking IDs. The client refuses to complete the
TLS handshake with Service Bus.
This is a known issue this is a known issue with the way how Microsoft
manages certificates and how they are used on non-HTTP(S) transports.
The errors occur when the endpoint that hosts the intermediate
certificates for Microsoft is unavailable or slow or cannot be reached
by the client for any reason. We are investigating a workaround for
injecting the required extra certificate into the TLS handshake for
the SBMP and AMQP transports similar to how this is done by HTTP.SYS,
so that this extra request is not needed.
The immediate workaround available is to enable
ServiceBusEnvironment.SystemConnectivity.Mode = ConnectivityMode.Https
This will force all traffic to use a WebSockets tunnel that is
protected by a prior TLS/HTTPS handshake, and that handshake carries
the required intermediate certificate. The WebSockets handshake does
impose a little extra latency as the connection is established, but
will otherwise be comparable with the regular communication mode. The
messaging protocol used through that tunnel will still be AMQP or
NetMessaging, so you should not be worried to get HTTP characteristics
when choosing this option.
This is the response from Microsoft. I'll apply this and if I don't face any problem at some period time, I will accept this as an answer. Who faces this problem, they can try this also.
Edit:
ConnectivityMode.Https is just in avaliable service bus 3. I have to use servicebus 2 because of issue on Signalr. Therefore I couldn't apply this solution.
I believe there must be a missing certificate.
From this stack overflow post https://stackoverflow.com/a/24224550/4735373 here is a link that may help: https://corp.sts.microsoft.com/Onboard/ADFSOnboard.htm#Corp-STS-Certificates

Resources