Bug 1199519
Summary: | Packstack install AMQP with SSL, fails to start rabbitmq service | ||
---|---|---|---|
Product: | Red Hat OpenStack | Reporter: | Lukas Bezdicka <lbezdick> |
Component: | openstack-packstack | Assignee: | Martin Magr <mmagr> |
Status: | CLOSED ERRATA | QA Contact: | Ido Ovadia <iovadia> |
Severity: | high | Docs Contact: | |
Priority: | unspecified | ||
Version: | 6.0 (Juno) | CC: | aberezin, ajeain, aortega, derekh, gdubreui, tshefi, yeylon |
Target Milestone: | z2 | Keywords: | ZStream |
Target Release: | 6.0 (Juno) | ||
Hardware: | x86_64 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | openstack-packstack-2014.2-0.17.dev1462.gbb05296.el7ost | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | 1147224 | Environment: | |
Last Closed: | 2015-04-07 15:10:58 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1147224 | ||
Bug Blocks: |
Description
Lukas Bezdicka
2015-03-06 14:44:00 UTC
Rabbitmq SSL Certificates require specific extensions, which seem to be missing from current sources, see [1]. The result are that even though CA and Server SSL Certificates are valid, no Rabbitmq client can establish a secure connection to Rabbitmq server. I've tested and confirm that on vanilla Rabbitmq install. A patch is needed to include the specific options Rabbitmq required in the certificates. [1] https://github.com/stackforge/packstack/blob/master/packstack/puppet/modules/packstack/templates/ssl/generate_ssl_certs.sh.erb After talking with Lukas, the issue I faced seems to be impacting Sensu client communicating with Rabbitmq over SSL. Since there is no need for Sensu to be made available via Packstack my previous comment is out of scope, at least until Sensu is needed. This must be issue outside of scope of packstack as for packstack juno (git) it works, installation completes and we can open SSL connection to rabbitmq, even though we don't have client side certs and we don't verify nor require certs :( [root@controller-c7 ~]# openssl s_client -connect 192.168.122.196:5671 CONNECTED(00000003) depth=0 C = XX, L = Default City, O = Default Company Ltd verify error:num=18:self signed certificate verify return:1 depth=0 C = XX, L = Default City, O = Default Company Ltd verify return:1 --- Certificate chain 0 s:/C=XX/L=Default City/O=Default Company Ltd i:/C=XX/L=Default City/O=Default Company Ltd --- Server certificate -----BEGIN CERTIFICATE----- MIIDVzCCAj+gAwIBAgIJAN55ySPT2MhCMA0GCSqGSIb3DQEBCwUAMEIxCzAJBgNV BAYTAlhYMRUwEwYDVQQHDAxEZWZhdWx0IENpdHkxHDAaBgNVBAoME0RlZmF1bHQg Q29tcGFueSBMdGQwHhcNMTUwMzA5MTAyODQ5WhcNMTgwMzA4MTAyODQ5WjBCMQsw CQYDVQQGEwJYWDEVMBMGA1UEBwwMRGVmYXVsdCBDaXR5MRwwGgYDVQQKDBNEZWZh dWx0IENvbXBhbnkgTHRkMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA vWWbBkeP2rSvUoajdanozXTaMWlAhqhgGXZwDsqeAmH9eeDCCnqYbWuGEM5/4n3a LbwOjTWDx1x8keQ3dAGXjLMObOX/Si/bE3ggsUZNXeI13fsNu+vVOXe820XboD3j bm9gef0E7ccBGZHIGnDDNwOqrNYbXrFXIM2NYbbWjsAIc6I56LgieWr4G2PEvyRn cyp0f4F/tITnEXe46D/NoPUuGm6SlMyo8tPbF5rucpq13ODnTaMdpljWgFNZGIl8 31obaecjy7+zlMnUfzyGzRJ1oBRdIV7AaZuPrzela6V7f/5jT72jNBuft9Iv80t6 HMrDQtOCUmddB34gZHkAowIDAQABo1AwTjAdBgNVHQ4EFgQU9oGXNcJyyxitUPK2 Fdna/WNJN+kwHwYDVR0jBBgwFoAU9oGXNcJyyxitUPK2Fdna/WNJN+kwDAYDVR0T BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAQEAV3QRvS+gsmWSIl5DeHmvzLU2P+zM qh5N0gXOJMNw6g7s8chfZDI75N0gplexYKAObrI77+/w9EYFs5s2p4JrSggH5Ihr E50VGuYkexo01kYjKgcyPu5el5GXy2+ihAI8gsP4MJT37cwRraZQT9oS8I6+cc/h hwCvcq+Yu8DPLGFmkxVKGL3mqiWfaP1/yt2Z+QPBDm0IBg3/MlPn4TLKIcGP42jm a8axmwkr8oWka/76ZGz+2ThlDtQx+nN9aa88asYovKeVRMx0NGqxbSukqpRe7h7m 56kOdO1GYLrI9MdwXNkNiNQ9TyUBfP/Q8kxC0YR6D6knIYZdIkkiOQsTew== -----END CERTIFICATE----- subject=/C=XX/L=Default City/O=Default Company Ltd issuer=/C=XX/L=Default City/O=Default Company Ltd --- No client certificate CA names sent Server Temp Key: DH, 1024 bits --- SSL handshake has read 1592 bytes and written 479 bytes --- New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-SHA256 Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE SSL-Session: Protocol : TLSv1.2 Cipher : DHE-RSA-AES256-SHA256 Session-ID: DE5A966F1BCF3EFAFB1EDAE260B8857188E0A044718988E422F1EE7977F8A3C8 Session-ID-ctx: Master-Key: C32FC1FCCB3D84689444B7517815ED8FD673E676F06C1736F86C63E90E5521AA8F89496760650BDC0BAB183D9822A00F Key-Arg : None Krb5 Principal: None PSK identity: None PSK identity hint: None Start Time: 1425898718 Timeout : 300 (sec) Verify return code: 18 (self signed certificate) --- But, some parts of Gilles' issue do apply for packstack and future, we should rework the cert generation and probably switch packstack to use/deploy external CA with api for example IPA. Verified ======== openstack-packstack-2014.2-0.17.dev1462.gbb05296.el7ost.noarch Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHSA-2015-0789.html |