When running the sgadmin tool I am getting the following. I do have the Java Cryptography Extension installed.
[2017-02-17 19:56:02,420][INFO ][node ] [Nekra] version[2.4.3], pid[1430], build[d38a34e/2016-12-07T16:28:56Z]
[2017-02-17 19:56:02,421][INFO ][node ] [Nekra] initializing ...
[2017-02-17 19:56:03,226][INFO ][com.floragunn.searchguard.ssl.SearchGuardSSLPlugin] Search Guard 2 plugin also available
[2017-02-17 19:56:03,245][INFO ][com.floragunn.searchguard.SearchGuardPlugin] Clustername: elasticsearch
[2017-02-17 19:56:03,245][INFO ][com.floragunn.searchguard.SearchGuardPlugin] Node [null] is a transportClient: false/tribeNode: false/tribeNodeClient: false
[2017-02-17 19:56:03,246][INFO ][plugins ] [Nekra] modules [reindex, lang-expression, lang-groovy], plugins [search-guard-ssl, search-guard-2], sites []
[2017-02-17 19:56:03,278][INFO ][env ] [Nekra] using [1] data paths, mounts [[/ (rootfs)]], net usable_space [5.6gb], net total_space [9.9gb], spins? [unknown], types [rootfs]
[2017-02-17 19:56:03,278][INFO ][env ] [Nekra] heap size [1.9gb], compressed ordinary object pointers [true]
[2017-02-17 19:56:03,278][WARN ][env ] [Nekra] max file descriptors [4096] for elasticsearch process likely too low, consider increasing to at least [65536]
[2017-02-17 19:56:03,335][INFO ][com.floragunn.searchguard.ssl.DefaultSearchGuardKeyStore] Open SSL not available (this is not an error, we simply fallback to built-in JDK SSL) because of java.lang.ClassNotFoundException: org.apache.tomcat.jni.SSL
[2017-02-17 19:56:03,780][INFO ][com.floragunn.searchguard.ssl.DefaultSearchGuardKeyStore] Config directory is /opt/elastic/ElasticSearch/elasticsearch-2.4.3/config/, from there the key- and truststore files are resolved relatively
[2017-02-17 19:56:03,826][INFO ][com.floragunn.searchguard.ssl.DefaultSearchGuardKeyStore] sslTransportClientProvider:JDK with ciphers [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256]
[2017-02-17 19:56:03,826][INFO ][com.floragunn.searchguard.ssl.DefaultSearchGuardKeyStore] sslTransportServerProvider:JDK with ciphers [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256]
[2017-02-17 19:56:03,826][INFO ][com.floragunn.searchguard.ssl.DefaultSearchGuardKeyStore] sslHTTPProvider:null with ciphers []
[2017-02-17 19:56:03,826][INFO ][com.floragunn.searchguard.ssl.DefaultSearchGuardKeyStore] sslTransport protocols [TLSv1.2, TLSv1.1]
[2017-02-17 19:56:03,826][INFO ][com.floragunn.searchguard.ssl.DefaultSearchGuardKeyStore] sslHTTP protocols [TLSv1.2, TLSv1.1]
[2017-02-17 19:56:04,137][INFO ][com.floragunn.searchguard.configuration.ConfigurationModule] FLS/DLS valve not bound (noop)
[2017-02-17 19:56:04,139][INFO ][com.floragunn.searchguard.auditlog.AuditLogModule] Auditlog not available
[2017-02-17 19:56:04,304][INFO ][transport ] [Nekra] Using [com.floragunn.searchguard.transport.SearchGuardTransportService] as transport service, overridden by [search-guard2]
[2017-02-17 19:56:04,304][INFO ][transport ] [Nekra] Using [com.floragunn.searchguard.ssl.transport.SearchGuardSSLNettyTransport] as transport, overridden by [search-guard-ssl]
[2017-02-17 19:56:07,110][INFO ][node ] [Nekra] initialized
[2017-02-17 19:56:07,110][INFO ][node ] [Nekra] starting ...
[2017-02-17 19:56:07,292][INFO ][com.floragunn.searchguard.transport.SearchGuardTransportService] [Nekra] publish_address {
10.240.0.24:9300}, bound_addresses {[::]:9300}
[2017-02-17 19:56:07,296][INFO ][com.floragunn.searchguard.action.configupdate.TransportConfigUpdateAction] [Nekra] Check if searchguard index exists ...
[2017-02-17 19:56:07,302][DEBUG][action.admin.indices.exists.indices] [Nekra] no known master node, scheduling a retry
[2017-02-17 19:56:07,308][INFO ][discovery ] [Nekra] elasticsearch/pRteXY99TWyxyGZtUAkBJQ
[2017-02-17 19:56:10,444][INFO ][cluster.service ] [Nekra] new_master {Nekra}{pRteXY99TWyxyGZtUAkBJQ}{10.240.0.24}{
10.240.0.24:9300}, reason: zen-disco-join(elected_as_master, [0] joins received)
[2017-02-17 19:56:10,508][INFO ][http ] [Nekra] publish_address {
10.240.0.24:9200}, bound_addresses {[::]:9200}
[2017-02-17 19:56:10,508][INFO ][node ] [Nekra] started
[2017-02-17 19:56:10,527][INFO ][gateway ] [Nekra] recovered [0] indices into cluster_state
[2017-02-17 19:56:10,528][INFO ][com.floragunn.searchguard.action.configupdate.TransportConfigUpdateAction] [Nekra] searchguard index does not exist yet, so no need to load config on node startup. Use sgadmin to initialize cluster