You run the command again. Same error. That’s when you realize it’s not the agent code—it’s the TLS configuration.
Agent configuration is straightforward until encryption gets involved. TLS configuration is where small mistakes break big systems. A missing certificate chain. An outdated cipher suite. A mismatch between the server’s TLS policy and the agent’s client settings. These details decide whether connections survive or fail.
To configure an agent with TLS the right way, start with certificates. Use valid, non-expired certificates from a trusted certificate authority. For development, self-signed certs can work, but set them up with care—define correct SAN (Subject Alternative Name) values and store private keys securely.
Next, set explicit protocols. Disable outdated versions like TLS 1.0 and 1.1. Allow only TLS 1.2 or TLS 1.3. These versions offer stronger encryption and are accepted by most modern systems without negotiation problems. In your agent’s configuration file or startup parameters, declare the protocol version and supported cipher suites.
Match cipher suites to your security baseline. Balanced configurations often use ECDHE for key exchange, AES-GCM for encryption, and SHA256 or better for integrity. Avoid weak ciphers, even if the server still supports them. Weak ciphers are silent failures in waiting.