Log location: /var/log/vmware/content-library/cls.log
YYYY-MM-DDTHH:MM:SS | ERROR | ########-####-####-####-#########-## | cls-simple-activity-18 | VcspClientImpl | exception while getting vcsp endpoint https://<Content library url>/lib.jsonorg.bouncycastle.tls.TlsFatalAlertReceived: handshake_failure(40) at org.bouncycastle.tls.TlsProtocol.handleAlertMessage(TlsProtocol.java:245) ~[bctls-fips-1.0.18.jar:1.0.18] at org.bouncycastle.tls.TlsProtocol.processAlertQueue(TlsProtocol.java:740) ~[bctls-fips-1.0.18.jar:1.0.18] at org.bouncycastle.tls.TlsProtocol.processRecord(TlsProtocol.java:563) ~[bctls-fips-1.0.18.jar:1.0.18]
openssl s_client -connect <Content-library-url>:443 -tls1_2
SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-RSA-AES128-SHA Session-ID: ############################################ Session-ID-ctx:
"ECDHE-RSA-AES128-SHA" cipher suite.vCenter Server./usr/lib/vmware-vsr/bin/ssl_scanner --host localhost:443 | less
endpoint: localhost:443
tls_protocols:
- version: tlsv1_2
ciphers:
accepted:
- ECDHE-RSA-AES256-GCM-SHA384
- ECDHE-RSA-AES128-GCM-SHA256vCenter Server 8.x
The vCenter Server was set to use the "NIST_2024" TLS profile, which disables the "ECDHE‑RSA‑AES128‑SHA" cipher suite. As a result, the TLS handshake failed because no common cipher suite could be negotiated.
To enable "ECDHE‑RSA‑AES128‑SHA" cipher suite on vCenter change the TLS profile to "COMPATIBLE"
Note: Changing TLS profile would restart vCenter services, kindly schedule down time and take backup/offline snapshot of vCenter before proceeding further.
cat var/lib/applmgmt/tls_settings.yaml
mode: NIST_2024
status: PENDING
cat var/lib/applmgmt/tls_settings.yaml
mode: COMPATIBLE
status: PENDING