Bug 1007133
Summary: | PRD35 - [RFE][host-deploy] support more ciphers for ssh - upgrade apache-sshd to 0.11.0 | ||
---|---|---|---|
Product: | Red Hat Enterprise Virtualization Manager | Reporter: | Aval <avyadav> |
Component: | ovirt-engine | Assignee: | Alon Bar-Lev <alonbl> |
Status: | CLOSED ERRATA | QA Contact: | Jiri Belka <jbelka> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 3.1.0 | CC: | aberezin, alonbl, bazulay, iheim, juan.hernandez, lpeer, mtessun, oourfali, pstehlik, rbalakri, Rhev-m-bugs, sbonazzo, sherold, vgaikwad, yeylon, yzaslavs |
Target Milestone: | --- | Keywords: | FutureFeature, Improvement |
Target Release: | 3.5.0 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | infra | ||
Fixed In Version: | Doc Type: | Enhancement | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2015-02-11 17:54:52 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | Infra | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1013333, 1094123 | ||
Bug Blocks: | 1142923, 1156165 |
Description
Aval
2013-09-12 01:30:23 UTC
Due to older version , SSHClient used in RHEV-M uses only CBC ciphers. Version used in rhevm backend == pom.xml: <sshd-core.version>0.7.0</sshd-core.version> == Ciphers used in Apache sshd-core 0.7.0 == avail.add(new AES128CBC.Factory()); avail.add(new TripleDESCBC.Factory()); avail.add(new BlowfishCBC.Factory()); avail.add(new AES192CBC.Factory()); avail.add(new AES256CBC.Factory()); == Ciphers used in Apache sshd-core 0.8.0 == //Newly added after a security bug fix avail.add(new AES128CTR.Factory()); avail.add(new AES256CTR.Factory()); avail.add(new ARCFOUR128.Factory()); avail.add(new ARCFOUR256.Factory()); avail.add(new AES128CBC.Factory()); avail.add(new TripleDESCBC.Factory()); avail.add(new BlowfishCBC.Factory()); avail.add(new AES192CBC.Factory()); avail.add(new AES256CBC.Factory()); == Itamar, Good example of what we just discussed. Current state is: PACKAGE POM FC19 EL6 apache-mina 2.0.1 2.0.4-6 N/A apache-sshd 0.7.0 0.7.0-3 N/A So even fedora 19 does not support this mode. We can provide our own jars for EL6 to meet functionality requirement as it is not packages in EL6 (advantage?). Then downgrade this and lose functionality in fedora as we want to use system jars. Or, depend on >=0.8.0 and force someone to provide correct rpms (us?). Customer wants to know, if for the temporary workaround can they use default SSH cipher settings to register host, later change the SSH cipher settings back to what they prefer. Will it break RHEV environment? Apart from Install/Upgrade, for what other functions/operations do we need SSH communication between [ manager <==> host ] in RHEV environment? (In reply to Aval from comment #3) > Customer wants to know, if for the temporary workaround can they use default > SSH cipher settings to register host, later change the SSH cipher settings > back to what they prefer. > > Will it break RHEV environment? It will not break rhev-3.2. > Apart from Install/Upgrade, for what other functions/operations do we need > SSH communication between [ manager <==> host ] in RHEV environment? In rhev-3.3 a new feature is using ssh which is software fencing, so software fencing will not be available. Apart from that there is the log-collector which relays on ssh, it currently uses the ssh command. Arthur Berezin 2013-09-23 09:34:44 EDT
> Target Release: 3.3.0 → 3.4.0
> Flags: rhevm-3.3.0? → rhevm-3.4.0?
As this is going to 3.4.0 now, it is not important so much for now.
Not a solution, but allows clean site specific workaround. commit 691442bea852ea4ebac95f59ac8e3c767fe543ee Author: Alon Bar-Lev <alonbl> Date: Wed Sep 25 22:56:17 2013 +0300 packaging: support modifying java module path if a customer need to have more recent version of module, he currently have no way to apply except of replacing pre-installed files. this change allows customer to add his own module path to search path to shadow product modules. Change-Id: Ibda53f67fa801cf4eb00b11483e9a6ab712d4d74 Signed-off-by: Alon Bar-Lev <alonbl> --- In this case, this will enable customer to shadow product mina-core.jar and sshd-core.jar with newer versions. Moving to rhevm-future, The mechanism to override the product's jboss modules was added to 3.3, Once a newer/stable apache-sshd version will be available this issue will be solvable within the product itself. Added improvement keyword. Moved back to rhevm-future apache-sshd-0.11.0 is out, finally all issues are resolved so we can use it. Doubts about aes192-ctr, a mail sent to rhev-devel list. ok, ovirt-3.5-pre Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHSA-2015-0158.html |