HPE OneView
1825513 Members
1782 Online
109681 Solutions
New Discussion юеВ

Powershell 8.50 and OV 8.60 on Synergy ( Issue faced )

 
Lucky_Ali
HPE Pro

Powershell 8.50 and OV 8.60 on Synergy ( Issue faced )

 

Accept or Kudo
2 REPLIES 2
ChrisLynch
HPE Pro

Re: Powershell 8.50 and OV 8.60 on Synergy ( Issue faced )

Exception : System.Net.WebException: The SSL connection could not be established, see inner exception.
---> System.Net.Http.HttpRequestException: The SSL connection could not be established, see inner exception.
---> System.IO.IOException: Received an unexpected EOF or 0 bytes from the transport stream.

This is typically caused by a mistach in the appliance web certificate Common Name or Subject Alternative Names not matching the -Hostname value you provided.  You can view the certificate information using a web browser, and clicking on the padlock icon in the address bar, or using the openssl client:

openssl s_client -connect <ip_address_or_hostname>:443

 

I work at HPE
[Any personal opinions expressed are mine, and not official statements on behalf of Hewlett Packard Enterprise]
Accept or Kudo
Lucky_Ali
HPE Pro

Re: Powershell 8.50 and OV 8.60 on Synergy ( Issue faced )

hello @ChrisLynch , 
the output of teh command 

openssl s_client -connect <ip_address_or_hostname>:443

 

 

CONNECTED(00000003)
---
Certificate chain
 0 s:C = US, ST = California, L = Palo Alto, O = Hewlett Packard Enterprise, CN = hdci-es-cpa-fg08b-m1.int.refinitiv.com
   i:C = US, ST = California, L = Palo Alto, O = Hewlett Packard Enterprise, CN = hdci-es-cpa-fg08b-m1.int.refinitiv.com
---
Server certificate
-----BEGIN CERTIFICATE-----
MIIEGjCCAwKgAwIBAgICZ2QwDQYJKoZIhvcNAQELBQAwgYwxCzAJBgNVBAYTAlVT
MRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlQYWxvIEFsdG8xIzAhBgNV
BAoMGkhld2xldHQgUGFja2FyZCBFbnRlcnByaXNlMS8wLQYDVQQDDCZoZGNpLWVz
LWNwYS1mZzA4Yi1tMS5pbnQucmVmaW5pdGl2LmNvbTAeFw0yMzA5MTkxNzM2MTZa
Fw0zMzA5MTkxNzM2MTZaMIGMMQswCQYDVQQGEwJVUzETMBEGA1UECAwKQ2FsaWZv
cm5pYTESMBAGA1UEBwwJUGFsbyBBbHRvMSMwIQYDVQQKDBpIZXdsZXR0IFBhY2th
cmQgRW50ZXJwcmlzZTEvMC0GA1UEAwwmaGRjaS1lcy1jcGEtZmcwOGItbTEuaW50
LnJlZmluaXRpdi5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDi
cRroEwXjWWdwnK11qH/pv41FbsMH5w5Fy55Mdaths1/sb9AUH/JQmhIDrIugains
Qbu3Igg0bTZJm6cXOQ+k3yBvOF/h1s7wh6sqxG6JWTU7/R+Kgov0PgXoCKaXVFVJ
1xtjHQT2zIhf2106KUTWXGj6RDRUXjnvsNm3J0/WS/BWjBv/0ArlmKZbWkTOjQe4
5YbvhKhZSAX6mfdsZFFifakJPCRiDBekK6JJE7+Vui0CndCjCS49KMKdzG1YEYiU
ey7dbWYcYoJ+hOkhSr2ZMF0NCMazfEsp4NyzV/0WylvpcywNJVyzQy4oYAJhk9R3
ebzWWHbv1mevTmfk2ek7AgMBAAGjgYMwgYAwXwYDVR0RBFgwVoImaGRjaS1lcy1j
cGEtZmcwOGItbTEuaW50LnJlZmluaXRpdi5jb22CFGhkY2ktZXMtY3BhLWZnMDhi
LW0xhwQKL80BhxD+gAAAAAAAAH5Ii/xviJ7ZMB0GA1UdJQQWMBQGCCsGAQUFBwMB
BggrBgEFBQcDAjANBgkqhkiG9w0BAQsFAAOCAQEAvkFYYFXyNNesDwjWNvs2tNpH
IC0lbF1chOpQuq7O1jS+QKHuBhcHMGa7HnnxTDhwintpcYOxS79erc02OeKIoVlZ
XfAqfzWoMln+337HRUnUmdQA6Cb/Sko0kO6QjizbXfvpqSWg4SGOZCpp2hsTpOML
NnVEheBdiBNE+LUyk0UQUTLu+PsL/9gQ2kiJFAD8tVClUhEDn4EYLl3mL5pfUjQe
L3OyZSgS+ogt4Yaw11iaVNg4SxlGcAw98BTIdibr3R2cWRRBE3kUu5W1IDUW000z
D0rGuzPl/7DxdNDKdSchTC5SjGfB2zcFxdWgbCUCCjrMRGb3KRvIJE8JvjUucg==
-----END CERTIFICATE-----
subject=C = US, ST = California, L = Palo Alto, O = Hewlett Packard Enterprise, CN = hdci-es-cpa-fg08b-m1.int.refinitiv.com

issuer=C = US, ST = California, L = Palo Alto, O = Hewlett Packard Enterprise, CN = hdci-es-cpa-fg08b-m1.int.refinitiv.com

---
No client certificate CA names sent
Peer signing digest: SHA512
Peer signature type: RSA
Server Temp Key: ECDH, P-256, 256 bits
---
SSL handshake has read 1764 bytes and written 433 bytes
Verification error: self signed certificate
---
New, TLSv1.0, Cipher is ECDHE-RSA-AES256-SHA
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-RSA-AES256-SHA
    Session-ID: A2B4B6D8CC4201ECD730AC45B3C6252AEFD61BCC7D207FE04D77053FA221D481
    Session-ID-ctx: 
    Master-Key: 943D53D2267D472EEDEE883A79939F47C644C94376602D3429191398E163C5F2A66D6C97B364ADA22E10A8A498FE9E06
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 300 (seconds)
    TLS session ticket:
    0000 - e0 94 45 36 1c 12 b8 de-69 ba 08 2f 99 1c 5d cd   ..E6....i../..].
    0010 - a6 94 ad e9 77 e5 ba 5d-88 4c 37 ff ec f7 34 6a   ....w..].L7...4j
    0020 - e5 30 03 b8 17 8e 1c 54-31 84 92 55 a6 78 9f 08   .0.....T1..U.x..
    0030 - ae f9 83 c1 96 83 a3 2b-a0 72 b9 da 12 3a 69 39   .......+.r...:i9
    0040 - 58 f2 1e 29 36 83 31 7a-f4 43 b4 e9 0c 42 8f 50   X..)6.1z.C...B.P
    0050 - 7c 7a 52 dd 0e 56 f6 ed-f5 ba 71 34 6f c7 a5 11   |zR..V....q4o...
    0060 - 92 11 5f c1 fb 84 94 d0-6e 89 14 f0 ac 88 43 ca   .._.....n.....C.
    0070 - bd ea eb 61 ce 1d 46 2a-1d 90 41 4e 7e 6d d1 a4   ...a..F*..AN~m..
    0080 - 5a a9 44 66 44 e4 da 4e-19 10 6b df 97 1e 29 60   Z.DfD..N..k...)`
    0090 - 22 87 9e db e6 8e 63 81-a9 3b 85 ed 6d 18 0a fa   ".....c..;..m...
    00a0 - 53 ad 5c 97 31 ff db f2-61 8f 3e 64 d5 0c 26 d2   S.\.1...a.>d..&.
    00b0 - 5b c2 f7 82 6f f7 2b 0b-3e 75 e5 26 6e 6c 8b 95   [...o.+.>u.&nl..

    Start Time: 1699513630
    Timeout   : 7200 (sec)
    Verify return code: 18 (self signed certificate)
    Extended master secret: no
---
HTTP/1.1 400 Bad Request
Date: Thu, 09 Nov 2023 07:08:37 GMT
Server: Apache
X-Frame-Options: SAMEORIGIN
Content-Length: 347
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>400 Bad Request</title>
</head><body>
<h1>Bad Request</h1>
<p>Your browser sent a request that this server could not understand.<br />
</p>
<p>Additionally, a 400 Bad Request
error was encountered while trying to use an ErrorDocument to handle the request.</p>
</body></html>
closed

 


Accept or Kudo