Bug 1010082
Summary: | Compatibility issue with java-1.7.0-openjdk | |||
---|---|---|---|---|
Product: | [Retired] Subscription Asset Manager | Reporter: | Og Maciel <omaciel> | |
Component: | katello-configure | Assignee: | Devan Goodwin <dgoodwin> | |
Status: | CLOSED ERRATA | QA Contact: | sthirugn <sthirugn> | |
Severity: | high | Docs Contact: | ||
Priority: | unspecified | |||
Version: | 1.4 | CC: | bkearney, cbillett, cduryee, dgoodwin, sthirugn | |
Target Milestone: | rc | |||
Target Release: | --- | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | Doc Type: | Bug Fix | ||
Doc Text: | Story Points: | --- | ||
Clone Of: | ||||
: | 1010111 (view as bug list) | Environment: | ||
Last Closed: | 2014-06-10 12:13:22 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 971511, 1010111 |
Description
Og Maciel
2013-09-19 22:13:29 UTC
If anyone can reproduce this, could we get the "security.provider.*" lines from java.security file for the JDK on that system? Ok Chris Duryee hit this and got in touch with me. His java.security featured: security.provider.1=sun.security.pkcs11.SunPKCS11 ${java.home}/lib/security/nss.cfg Which is the FIPS compliant JCE provider, a new default in some JDK rpms in RHEL. This FIPS compliant provider provides an implementation for several anonymous ECDH ciphers you will see in /etc/tomcat6/server.xml: TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA TLS_ECDH_anon_WITH_AES_128_CBC_SHA TLS_ECDH_anon_WITH_AES_256_CBC_SHA However the stock JDK JCE provider does *not* provide an implementation for these: http://docs.oracle.com/javase/7/docs/technotes/guides/security/SunProviders.html#SUNProvider And critically, these ciphers should not be used and cannot work with Candlepin. See https://github.com/candlepin/candlepin/commit/be8c72995e29912319bb6e622b8e648e3cbab411 for more details. TLDR Candlepin has been shipping config that included some ciphers which cannot work with the application. The problem was hidden because those ciphers are not provided by the default JCE provider. The SunPKCS11 however does implement them, and recent JDK's have been switching to this as the default, exposing the problem. To work around, edit your server.xml and remove the anon ciphers above. Cipher config should be corrected as of candlepin-0.9.5-1 Verified. Steps: 1. Provisioned rhel 6.5 2. Removed older openjdk and installed java-1.7.0-openjdk: yum install -y java-1.7.0-openjdk 3. Install SAM 4. Run katello-configure Result: # rpm -qa | grep openjdk java-1.7.0-openjdk-1.7.0.55-2.4.7.1.el6_5.x86_64 # katello-service status tomcat6 (pid 18909) is running...[ OK ] httpd (pid 19371) is running... thumbslug (pid 19119) is running... elasticsearch (pid 18333) is running... katello (19307) is running. katello (19324) is running. katello (19341) is running. delayed_job is running. delayed_job_monitor is running. Version tested: * apr-util-ldap-1.3.9-3.el6_0.1.x86_64 * candlepin-0.9.6-1.el6_5.noarch * candlepin-scl-1-5.el6_4.noarch * candlepin-scl-quartz-2.1.5-5.el6_4.noarch * candlepin-scl-rhino-1.7R3-1.el6_4.noarch * candlepin-scl-runtime-1-5.el6_4.noarch * candlepin-selinux-0.9.6-1.el6_5.noarch * candlepin-tomcat6-0.9.6-1.el6_5.noarch * elasticsearch-0.19.9-8.el6sat.noarch * katello-candlepin-cert-key-pair-1.0-1.noarch * katello-certs-tools-1.4.2-2.el6sat.noarch * katello-cli-1.4.3.1-1.el6sam.noarch * katello-cli-common-1.4.3.1-1.el6sam.noarch * katello-common-1.4.3.26-1.el6sam_splice.noarch * katello-configure-1.4.5-1.el6sam.noarch * katello-glue-candlepin-1.4.3.26-1.el6sam_splice.noarch * katello-glue-elasticsearch-1.4.3.26-1.el6sam_splice.noarch * katello-headpin-1.4.3.26-1.el6sam_splice.noarch * katello-headpin-all-1.4.3.26-1.el6sam_splice.noarch * katello-selinux-1.4.4-2.el6sat.noarch * openldap-2.4.23-32.el6_4.1.x86_64 * openldap-devel-2.4.23-32.el6_4.1.x86_64 * ruby193-rubygem-ldap_fluff-0.2.2-1.el6sat.noarch * ruby193-rubygem-net-ldap-0.3.1-2.el6sat.noarch * thumbslug-0.0.39-1.el6sam.noarch * thumbslug-selinux-0.0.39-1.el6sam.noarch Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHEA-2014-0677.html |