Bug 1356286

Summary: [RFE] Add support for requiring higher strength ciphers for etcd
Product: Red Hat Enterprise Linux 7 Reporter: Steven Walter <stwalter>
Component: etcdAssignee: Jan Chaloupka <jchaloup>
Status: CLOSED CURRENTRELEASE QA Contact: atomic-bugs <atomic-bugs>
Severity: high Docs Contact:
Priority: unspecified    
Version: 7.3CC: aos-bugs, erich, jchaloup, jlee, jokerman, mmccomas, stwalter
Target Milestone: rcKeywords: Extras, FutureFeature
Target Release: 7.4   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: etcd-2.3.7-2.el7 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
: 1357621 (view as bug list) Environment:
Last Closed: 2016-10-25 11:40:34 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1357621    
Bug Blocks:    

Description Steven Walter 2016-07-13 21:32:56 UTC
On etcd host; the certificates presented on ports 2379/2380 were TLSv1

x port 2379. 2380,  High Strength Ciphers (>= 112-bit key)

    TLSv1

      ECDHE-RSA-RC4-SHA            Kx=ECDH        Au=RSA      Enc=RC4(128)             Mac=SHA1   

      RC4-SHA                      Kx=RSA         Au=RSA      Enc=RC4(128)             Mac=SHA1


Customer is looking to be able to mandate stronger ciphers in the certificates generated during installation. Looking at upstream PR https://github.com/coreos/etcd/pull/5541 as well.

Comment 2 Jan Chaloupka 2016-07-18 15:53:52 UTC
IIUC, it is enough to apply https://github.com/coreos/etcd/pull/5541?

Comment 6 Jan Chaloupka 2016-07-18 21:06:25 UTC
Rebuilding etcd on RHEL via https://bugzilla.redhat.com/show_bug.cgi?id=1357621. Keeping the issue open to track the openshift part of it.

Comment 14 Jan Chaloupka 2016-10-25 11:40:34 UTC
This issue is already resolved in RHEL via https://bugzilla.redhat.com/show_bug.cgi?id=1357621. The bug has been left opened to resolve the same issue in OpenShift environment.

Closing this bug as etcd for 7.2.* AH is resolved. 7.3.* provides newer version of etcd which has the provided patch already included.