Skip to main content

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [List Home]
Re: [jetty-users] SSLEngineImpl initHandshaker Internal error

Hi everyone, thanks again -- I know it's been holidays but I'm curious if anyone had a chance to take
a look at the logs I captured and see if you notice anything amiss.

Much appreciated!

> On Dec 22, 2016, at 10:49 AM, Steven Schlansker <stevenschlansker@xxxxxxxxx> wrote:
> 
> Thanks so much Greg and Simone!  We use the PROXY protocol so the real source IP is actually in the trace
> (you may remember me as the crazy guy who wanted to write an autodetecting / passthrough PROXY connector!)
> 
> I will definitely try with a newer Jetty.  Since we only see it in production, and we are under a code freeze for
> the rest of the year, this will have to wait til January.  Also another user reported seeing it on 9.3.15 already
> 
> 
> 
> It seems to come from 'dsl-xx-xx-xx-xx-dyn.prod-infinitum.com.mx.'
> I'm glad it's not from Russia, we at least have a business presence in Mexico :)
> Spot check of 2 or 3 more shows that they all seem to come from dynamic IPs, Infinitum MX, Comcast, Verizon.
> 
> And they all had actual successful requests that look like legit users.  So probably not a botnet / attack (phew!)
> 
> Additionally, they are mostly using
> swcd (unknown version) CFNetwork/808.2.16 Darwin/16.3.0
> (Probably our iOS app)
> 
> Since that's one of our biggest traffic drivers I'm not 100% sure that's a smoking gun -- I also saw e.g.
> Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
> 
> 
> 
> I took the connection IDs and ran a grep through our logs. I've attached that.
> 
> egrep '@(1c7c0306|2917e8db|5a23fff6)' logfile | xz
> 
> Hopefully this is a good way to get relevant information, let me know if you have a better approach.
> 
> Thanks again guys for validating our use of Jetty with top-notch mailing list support :)
> 
> 
> <1c7c0306.txt.xz>
>> On Dec 22, 2016, at 2:30 AM, Simone Bordet <sbordet@xxxxxxxxxxx> wrote:
>> 
>> Hi,
>> 
>> On Thu, Dec 22, 2016 at 1:53 AM, Steven Schlansker
>> <stevenschlansker@xxxxxxxxx> wrote:
>>> These are the tail of Jetty logs for the thread that died:
>>> 
>>> 
>>> 2016-12-21T23:44:12.816Z DEBUG <> [qtp294008652-58364] o.e.j.util.thread.QueuedThreadPool - queue EPC Prod/Pend/org.eclipse.jetty.io.ManagedSelector$SelectorProducer@6fad21e
>>> 2016-12-21T23:44:12.818Z DEBUG <> [qtp294008652-58364] o.e.j.u.t.s.ExecuteProduceConsume - EPC Prod/Pend/org.eclipse.jetty.io.ManagedSelector$SelectorProducer@6fad21e run SelectChannelEndPoint@5a23fff6{/10.30.64.212:16725<->4443,Open,in,OSHUT,FI,-,1838/30000,SslConnection@5b279677}{io=1/0,kio=1,kro=1}:runFillable
>>> 2016-12-21T23:44:12.820Z DEBUG <> [qtp294008652-58364] org.eclipse.jetty.io.FillInterest - FillInterest@61f9356f{true,AC.ReadCB@5b279677{SslConnection@5b279677{NEED_UNWRAP,eio=-1/-1,di=-1} -> HttpConnection@1c7c0306[DecryptedEndPoint@2917e8db{/201.114.209.201:61299<->443,Open,in,OSHUT,FI,-,1856
>> 
>> Both the SelectChannelEndPoint@5a23fff6 and DecryptedEndPoint@2917e8db
>> say they are OSHUT already.
>> Can you track back in your logs where they were OSHUT (i.e.
>> shutdownOutput() was called on them) ?
>> 
>> What could have happened is that Jetty decided that the TLS connection
>> was not good, sent back a TLS Close message, and then OSHUT it, but
>> the client insisted in continuing to talk, and SSLEngine got confused
>> by this, eventually throwing the "IllegalStateException: Internal
>> error".
>> 
>> --
>> Simone Bordet
>> ----
>> http://cometd.org
>> http://webtide.com
>> Developer advice, training, services and support
>> from the Jetty & CometD experts.
>> _______________________________________________
>> jetty-users mailing list
>> jetty-users@xxxxxxxxxxx
>> To change your delivery options, retrieve your password, or unsubscribe from this list, visit
>> https://dev.eclipse.org/mailman/listinfo/jetty-users
> 

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail


Back to the top