A recent Server Communication Certificate update (System Configuration > Security tab) is the cause of:
SSL Key Pinning: On (Mismatch)
ParseMessageHeader(): [action: METHOD_SECURE_MESSAGE] Session GUID From Message Header [0000-00-00]
There are many potential scenarios that could cause this; however, the most common include:
There's no exact number or way to calculate what the application server is capable of handling. Factors that play a role in the performance impacts include:
Ultimately, it could be as few as 50-100 Agents using the Communication Key will cause performance issues, or it could be 500 or more before performance impacts are observed. Each environment will have different considerations/variables to consider.
Essentially this will be a simple three-step task that itself is very straightforward:
As mentioned, the Certificate Update Schedule introduced in Server 8.10.2 was meant as a way to allow more time for Agents to receive these changes. Under normal circumstances, the App Control Server can typically push these changes to hundreds of thousands of Agents in under 24 hours. However, when performance impacts are being encountered, this will drastically limit the Server's ability to deliver the file automatically using IIS.
There are several ways to identify the endpoints either struggling to acquire the new TrustedCertList.pem file or using the Communication Key.
ParseMessageHeader(): [action: METHOD_SECURE_MESSAGE]
[46210] ParseMessageHeader(): [action: METHOD_SECURE_MESSAGE]
[46210] request started from host address [192.168.0.52]
"C:\Program Files (x86)\Bit9\Parity Agent\DasCLI.exe" status
Client Information
...
SSL Key Pinning: On (Mismatch)
Get-FileHash "C:\Program Files (x86)\Bit9\Parity Server\hostpkg\TrustedCertList.pem"
Algorithm Hash Path
--------- ---- ----
SHA256 BC375FC5A9B115C18505565F806E17E7D3193BF217D3F49C3BE940FE0CEC4B80 C:\Program Files (x86)\Bit9\P...
Windows:
"C:\Program Files (x86)\Bit9\Parity Agent\dascli.exe" status
macOS:
/Applications/Bit9/Tools/b9cli --status
Example output:
Server Information
Server: serveraddress.local:41002
...
Certificate List: e6ae090da3821d920580b5b5bd4bf729f3ed393b0302b599c60faacd701ee5da
Any workflow that is able to achieve the steps in Overview will resolve the issue. For purposes of this article, several options will be presented. No matter which option is chosen:
Scripting the commands could easily allow for your SCCM Team to deploy a package that authenticates with the Agent and imports the updated TrustedCertList.pem file.
Work with your Active Directory team to verify the proper procedure for your environment using the PDF attached to the bottom of this article (AD Import TrustedCertList.pdf):
Work with your Firewall team to block access to the Server via port 41002. This will prevent Agents from communicating with the App Control Server using the Communication Key which will alleviate the performance impact.
Slowly open this restriction back up after confirming various segments have fully received the updated TrustedCertList.pem file. Example steps:
A combination of changes may be required, but it is recommended to verify the following items and best practices: