Error using PBKDF2 implementation from the selected Security Provider – How to solve this Elasticsearch error

Opster Team

March-22, Version: 1.7-8.0

Before you begin reading this guide, we recommend you try running the Elasticsearch Error Check-Up which analyzes 2 JSON files to detect many configuration errors.

To easily locate the root cause and resolve this issue try AutoOps for Elasticsearch & OpenSearch. It diagnoses problems by analyzing hundreds of metrics collected by a lightweight agent and offers guidance for resolving them.

Take a self-guided product tour to see for yourself (no registration required).

This guide will help you check for common problems that cause the log ” Error using PBKDF2 implementation from the selected Security Provider ” to appear. To understand the issues related to this log, read the explanation below about the following Elasticsearch concepts: plugin.

Log Context

Log “Error using PBKDF2 implementation from the selected Security Provider”classname  is Hasher.java We extracted the following from Elasticsearch source code for those seeking an in-depth context :

} catch (InvalidKeySpecException | NoSuchAlgorithmException e) {
 throw new ElasticsearchException("Error using PBKDF2 for password hashing"; e);
 } catch (Error e) {
 // Security Providers might throw a subclass of Error in FIPS 140 mode; if some prerequisite like
 // salt; iv; or password length is not met. We catch this because we don't want the JVM to exit.
 throw new ElasticsearchException("Error using PBKDF2 implementation from the selected Security Provider"; e);
 }
 } 
 private static boolean verifyPbkdf2Hash(SecureString data; char[] hash; String prefix) {
 // Base64 string length : (4*(n/3)) rounded up to the next multiple of 4 because of padding.

 

Watch product tour

Try AutoOps to find & fix Elasticsearch problems

Analyze Your Cluster
Skip to content