Troubleshooting Hub Encryption Wallet - DSS 6 | Data Source Solutions Documentation

Documentation: Troubleshooting Hub Encryption Wallet - DSS 6 | Data Source Solutions Documentation

Troubleshooting Hub Encryption Wallet Issues

This section covers various challenges you may encounter with the hub encryption wallet and provides workarounds to resolve them.


Location Connection Failure After Force Disabling the Encryption Wallet

Issue

After force disabling the encryption wallet using the command dsswalletconfig -fd, error messages about redacted values may be encountered.

SC-Dss-Troubleshooting-Wallet-DBPasswordRedacted_Error.webp

More Error Messages

The following error messages are displayed only whenFew more error messages that may be displayed when values are redacted after force disabling the encryption wallet.

SC-Dss-Troubleshooting-Wallet-AgentPasswordRedacted_Error.webp

SC-Dss-Troubleshooting-Wallet-TestLocationFailed_AgentClient_Error.webp

TLS Error Messages

The following error messages are displayed only when locations are configured with DSS Agent and the encryption wallet is force disabled.

SC-Dss-Troubleshooting-Wallet-TLS_Error2.webp

SC-Dss-Troubleshooting-Wallet-TLS_Error1.webp


Cause

When force disabling a wallet that is in use, all encrypted passwords and keys will be redacted automatically.

Resolution

To resolve this problem, update the redacted location passwords. Also, for locations configured with DSS Agent, all keys and certificates must be regenerated and then the corresponding repository properties must be updated with new values.

  1. If the location has agent connection configured, update the keys and certificates, else skip to step 2,

    Expand to see the instructions
    1. Create a new SSL certificate and key using the command dsssslgen (this must be executed on the machine where the DSS Hub System is installed):

      dsssslgen <em>basename</em> "<em>Subject</em>"
      

      This command will generate a Public Certificate (basename.pub_cert) and a Private Key (basename.priv_key) files. The command output will also display the Private Key Password, which is required in the next step.

    2. Update the following repository properties - Agent_Client_Public_Certificate, Agent_Client_Private_Key, and Agent_Client_Private_Key_Password using the command dssreposconfig:

      dssreposconfig Agent_Client_Public_Certificate=@<em>basename</em>.pub_cert Agent_Client_Private_Key=@<em>basename</em>.priv_key Agent_Client_Private_Key_Password=<em>Private_Key_Password</em>
      
    3. If access to the agent is limited to certain hub system(s), the client public certificate (Agent_Client_Public_Certificate) of the hub system must be regenerated and updated in the agent property Only_From_Client_Public_Certificates. This can be done either from CLI or UI:

      {% tabs %}

      {% tab label="CLI" %}

      1. Create a public certificate file of the hub system; execute the command dssreposconfig on the hub machine that needs to be added to the allowed list:

        Linux:

        dssreposconfig 'Agent_Client_Public_Certificate>@<em>file_name</em>.pub_cert'
        

        Windows:

        dssreposconfig "Agent_Client_Public_Certificate>@<em>file_name</em>.pub_cert"
        
      2. Copy the public certificate file (file_name.pub_cert) to the agent machine.

      3. Add the public certificate file of the hub system to the allowed list; execute the command dssagentconfig on the agent machine:

        Direct CLI:

        dssagentconfig Only_From_Client_Public_Certificates.<em>identifier</em>=@<em>file_name</em>.pub_cert
        

        Remote CLI:

        dssagentconfig -R<em>url</em> -h<em>hub</em> -r<em>agent_host</em>:<em>port</em> -L<em>agent_username</em>/<em>password</em> Only_From_Client_Public_Certificates.<em>identifier</em>=@<em>file_name</em>.pub_cert
        

identifier may be replaced with the actual name of the hub (e.g. myhub1) or any name/text to easily identify the allowed hub.

    4. To verify that the public certificate file of the hub system is added to the allowed list, execute the command [**dssagentconfig**](/docs/dss6-command-line-interface-command-reference-dssagentconfig) on the hub machine:

       ```shell
       dssagentconfig -h<em>hub</em> -r<em>agent_host</em>:<em>port</em> -L<em>agent_username</em>/<em>password</em> Only_From_Client_Public_Certificates
       ```

       <div class="callout callout-note">

If the public certificate file of the hub system is successfully added to the allowed list, the command output will display the name and the certificate.

   {% /tab %}

   {% tab label="UI" %}

   In UI, the **Agent Service Configuration** dialog needs to be accessed for adding the current hub system's client public certificate, for this the agent setup mode must be initiated.

    1. Initiate the agent setup mode using the command [**dssagentconfig**](/docs/dss6-command-line-interface-command-reference-dssagentconfig):
       ```shell
       dssagentconfig Setup_Mode_Timed_Until=now+30m
       ```

       <div class="callout callout-warning">

Initiating setup mode for an agent will terminate all connections to the agent.

       In setup mode, the agent does not accept any connections and is not available for any other activities except for agent configuration.
    2. In the [Location Details](/docs/dss6-user-interface-locations-location-details) page, **Edit** the location's agent service connection properties.

    3. In the **Agent Service Configuration** dialog,
        1. Select **Limit agent access so only hubs with specific client public certificates can connect**.
        2. Click **Add Client Certificate of Current Hub System** to allow the current hub system to connect to this agent.
        3. Click **Save Agent Service Configuration**.

   {% /tab %}

   {% /tabs %}
  1. In the Location Details page, click Replace Redacted Properties and update the redacted passwords (e.g, Database Password, Agent Password) in the All Location Properties dialog.

  2. Click Save.


Lost/Corrupted Auto-open Password File or Error: Could Not Open Encryption Wallet

Issue

The following error may be displayed when the wallet's auto-open password file is lost/corrupted: SC-Dss-Troubleshooting-Wallet-CouldNotOpenEncryptionWallet_Error.webp

Resolution

To resolve this problem, recreate the wallet's auto-open password file (Encryption_Password_Filename shown in the error message. E.g., 613b43f8.cred) using the command dsscrypt:

dsscrypt -W > /home/dssuser/dss_config/wallet/613b43f8.cred

Supply the wallet password when prompted.

You must know the wallet password to fix this issue. If the wallet password is not known, then the only solution is to force disable the wallet using dsswalletconfig -fd and then perform the recovery procedure mentioned in section Location Connection Failure After Force Disabling of Wallet.