Does this force TLS 1.0 ? #876
-
it seems to be attempting to use it and our network policies block this TLS version. |
Beta Was this translation helpful? Give feedback.
Replies: 11 comments
-
I am getting an exception at an attempt to call ReadNamespacedService: |
Beta Was this translation helpful? Give feedback.
-
I don't think it tries to force TLS 1.0, it's possible that it can't negotiate the right cypher. Can you print out what your server(s) support? |
Beta Was this translation helpful? Give feedback.
-
our code for .net452 only |
Beta Was this translation helpful? Give feedback.
-
After network settings adjustment, we have resolved this issue for local machines. However, if we run a client from Azure WebJob, it still throws We use the regular AKS cluster. |
Beta Was this translation helpful? Give feedback.
-
Currently, AKS API does not provide a trusted certificate. Since Azure App Service does not allow us to connect to websites that do not have valid certificates, we have a blocker, where we can not use Kubernetes API from Azure App Service. So far I did not find any suitable solution on how to overcome this issue. |
Beta Was this translation helpful? Give feedback.
-
Can you load a custom certificate authority in App Service? That's what you need to do to make it work. this library should load the custom certificate authority for you, assuming it is in the kubeconfig file How are you making the requests to Kubernetes? |
Beta Was this translation helpful? Give feedback.
-
The exception in .NET is not very helpful when the SSL connection fails: That said, we use this in our code, along with SkipTlsVerify. So try this perhaps?
|
Beta Was this translation helpful? Give feedback.
-
Be warned that setting |
Beta Was this translation helpful? Give feedback.
-
Thanks, everyone! @JennyLawrance, your snippet helped to identify the real reason for App Service misconfiguration. After setting ClientCertificateKeyStoreFlags I've started getting Thanks, |
Beta Was this translation helpful? Give feedback.
-
Thanks @JennyLawrance this seems to be addressed, so I will close this issue. |
Beta Was this translation helpful? Give feedback.
-
So to summarize the problem (and so I can find this easier later), we could not connect from an Azure AppService WebJob to an Azure Kubernetes Service due to the AKS instance not providing a trustable cert and the AppService will only connect to sites with a cert it can trust. Trying to do this resulted in "The request was aborted: Could not create SSL/TLS secure channel" errors. The fix was to add an app setting (to the configuration blade in the app service) for |
Beta Was this translation helpful? Give feedback.
So to summarize the problem (and so I can find this easier later), we could not connect from an Azure AppService WebJob to an Azure Kubernetes Service due to the AKS instance not providing a trustable cert and the AppService will only connect to sites with a cert it can trust.
Trying to do this resulted in "The request was aborted: Could not create SSL/TLS secure channel" errors.
The fix was to add an app setting (to the configuration blade in the app service) for
WEBSITE_LOAD_USER_PROFILE
with a value of1
. I cant find any documentation on what this setting actually does or how it ties into certificate handling other than maybe its allowing the user certificate store to be used, and that…