Failed to connect to pkp.sfu.ca port 443: Connection timed out

Hello,
I am updating OJS3.3.0-6 to version 3.3.0-8, and I have noticed that there is a problem when entering in the plugins section, it takes a long time to load and sometimes it shows a 500 error.
I read in other posts that it was a server problem, I already checked on the server side there are no problems. (I had no problems before upgrading)
And this happens to me specifically in version 3.3.0-8 at the end of the update.

Note: I have several days updating others OJS and I started to notice this problem on Thursday of last week.

This is the error:

[Tue Dec 07 16:08:29.942725 2021] [php7:error] [pid 1224] [client 148.234.16.165:50305] PHP Fatal error: Uncaught GuzzleHttp\\Exception\\ConnectException: cURL error 7: Failed to connect to pkp.sfu.ca port 443: Connection timed out (see https://curl.haxx.se/libcurl/c/libcurl-errors.html) in /web/htdocs/revistas/revig/lib/pkp/lib/vendor/guzzlehttp/guzzle/src/Handler/CurlFactory.php:200\nStack trace:\n#0 /web/htdocs/revistas/revig/lib/pkp/lib/vendor/guzzlehttp/guzzle/src/Handler/CurlFactory.php(155): GuzzleHttp\\Handler\\CurlFactory::createRejection(Object(GuzzleHttp\\Handler\\EasyHandle), Array)\n#1 /web/htdocs/revistas/revig/lib/pkp/lib/vendor/guzzlehttp/guzzle/src/Handler/CurlFactory.php(105): GuzzleHttp\\Handler\\CurlFactory::finishError(Object(GuzzleHttp\\Handler\\CurlHandler), Object(GuzzleHttp\\Handler\\EasyHandle), Object(GuzzleHttp\\Handler\\CurlFactory))\n#2 /web/htdocs/revistas/revig/lib/pkp/lib/vendor/guzzlehttp/guzzle/src/Handler/CurlHandler.php(43): GuzzleHttp\\Handler\\CurlFactory::finish(Object(GuzzleHttp\\Handler\\CurlHandler), Object(GuzzleHttp\\Handler\\EasyHandle), Object(GuzzleHttp\\Handler\\CurlFactory))\n#3 /web/htdoc in /web/htdocs/revistas/revig/lib/pkp/lib/vendor/guzzlehttp/guzzle/src/Handler/CurlFactory.php on line 200, referer: https://ingenieriaygestion.uanl.mx/index.php/r/management/settings/website

I repeat, this problem only appears after updating to 3.3.0-8, after several minutes it will be possible to see the plugin section.
I also noticed that if I disabled the “Plugins update notification” plugin the page could now load normally.

OJS3.3.0-8
PHP7.3

@dagosalas Could you please run those commands on your server and reply here with the results?

The first one is to test the SSL connection

openssl s_client -connect pkp.sfu.ca:443

The second one is to test if you’re being able to download the plugins.xml file from our servers.

wget https://pkp.sfu.ca/ojs/xml/plugins.xml

Thank you!

Olá Henrique, cómo vai!
This is te output from openssl

# openssl s_client -connect pkp.sfu.ca:443
CONNECTED(00000003)
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = R3
verify return:1
depth=0 CN = pkp.sfu.ca
verify return:1
---
Certificate chain
 0 s:CN = pkp.sfu.ca
   i:C = US, O = Let's Encrypt, CN = R3
 1 s:C = US, O = Let's Encrypt, CN = R3
   i:C = US, O = Internet Security Research Group, CN = ISRG Root X1
 2 s:C = US, O = Internet Security Research Group, CN = ISRG Root X1
   i:O = Digital Signature Trust Co., CN = DST Root CA X3
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=CN = pkp.sfu.ca

issuer=C = US, O = Let's Encrypt, CN = R3

---
No client certificate CA names sent
Peer signing digest: SHA512
Peer signature type: RSA
Server Temp Key: ECDH, P-256, 256 bits
---
SSL handshake has read 5218 bytes and written 428 bytes
Verification: OK
---
New, TLSv1.2, Cipher is ECDHE-RSA-AES128-GCM-SHA256
Server public key is 4096 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-RSA-AES128-GCM-SHA256
    Session-ID: F8A7967C77F8822522701EA8FD6D7DEC0644690138F4634494C804F5EA4676CC
    Session-ID-ctx: 
    Master-Key: 6689717FF211926FA1390121D30F8D7C87DE32405CFB30730A855880F154B12C788DE68A4E300D24AF43332755913939
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 300 (seconds)
    TLS session ticket:
    0000 - a6 10 f5 7b ff e7 f2 82-d0 0a 9b 44 5c 5f e4 77   ...{.......D\_.w
    0010 - 33 6e 2a 49 3d 08 64 20-e8 f9 14 d1 cf 36 d7 7f   3n*I=.d .....6..
    0020 - dd cb 3c 7d ab 07 2c 71-68 46 e6 40 b5 1c 29 cf   ..<}..,qhF.@..).
    0030 - 56 9c 2f 1a 54 46 93 2a-e9 10 e8 5f c9 b6 a0 bd   V./.TF.*..._....
    0040 - 65 63 a7 35 57 1e f6 0b-c9 d5 e8 f6 f1 57 a0 1c   ec.5W........W..
    0050 - dc f3 2f 5d 24 56 9e ab-74 36 de 14 6b 84 9d bb   ../]$V..t6..k...
    0060 - ce f4 f5 ac 11 3e 29 77-3b 93 83 06 ec 67 b7 30   .....>)w;....g.0
    0070 - 7c 12 a1 aa 74 7f c8 7c-e0 7f 22 16 5a 38 03 c6   |...t..|..".Z8..
    0080 - 55 cf 2f b2 8a e2 dc 29-28 17 af 72 6d 5c b0 67   U./....)(..rm\.g
    0090 - d7 e3 f6 6d c0 1e ab 37-1d 4c d2 ac 6a 1b 15 35   ...m...7.L..j..5
    00a0 - 4b a8 04 c4 0c 4d 3b b8-eb f0 c1 6a 26 7a e1 69   K....M;....j&z.i
    00b0 - 0f ea 85 dd 73 e8 1f 2e-8f 5a 84 46 0b 29 16 31   ....s....Z.F.).1
    00c0 - a7 6e a2 50 d9 90 fa 65-c5 1d 05 44 7d 25 71 f2   .n.P...e...D}%q.

    Start Time: 1639004689
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
---

HTTP/1.1 400 Bad Request
Date: Wed, 08 Dec 2021 23:04:52 GMT
Server: Apache
Content-Length: 226
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>400 Bad Request</title>
</head><body>
<h1>Bad Request</h1>
<p>Your browser sent a request that this server could not understand.<br />
</p>
</body></html>
closed

And wget:

# wget https://pkp.sfu.ca/ojs/xml/plugins.xml
--2021-12-08 17:06:38--  https://pkp.sfu.ca/ojs/xml/plugins.xml
Resolving pkp.sfu.ca (pkp.sfu.ca)... 204.187.13.80
Connecting to pkp.sfu.ca (pkp.sfu.ca)|204.187.13.80|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 299926 (293K) [application/xml]
Saving to: ‘plugins.xml’

plugins.xml                       100%

Apparently I have no connection problems.

Hi @henriqueramos ,
Again, same connection problem after upgrading to 3.3.0-8. But now it shows me this error:

#openssl s_client -connect pkp.sfu.ca:443

140087660000384:error:0200206E:system library:connect:Connection timed out:../crypto/bio/b_sock2.c:110:

140087660000384:error:2008A067:BIO routines:BIO_connect:connect error:../crypto/bio/b_sock2.c:111:

connect:errno=110

Olá @dagosalas,

this is kind strange, because you’re able to download the plugins.xml file thru wget.

Perhaps you could add the timeout option on the GuzzleClient to see if the connection works.

The GuzzleClient construction resides at /lib/pkp/classes/core/PKPApplication.inc.php, method getHttpClient.

The craziest thing about this is that before the upgrade the connection works normal, I run the upgrade and I have the problem, after 5 minutes it works normal again.

So, I have seen this mainly when I am on the System Information page and run the upgrade from the command line.

I still have 5 more OJS to upgrade and I’m going to test if this is correct (the error) or has been a coincidence (too much).