Bug 1379701
Summary: | Customer cert for route caused fatal error in haproxy router | ||
---|---|---|---|
Product: | OpenShift Container Platform | Reporter: | Steven Walter <stwalter> |
Component: | Networking | Assignee: | Ram Ranganathan <ramr> |
Networking sub component: | router | QA Contact: | zhaozhanqi <zzhao> |
Status: | CLOSED ERRATA | Docs Contact: | |
Severity: | medium | ||
Priority: | medium | CC: | aos-bugs, bbennett, bperkins, jliggitt, sreber, stwalter, tdawson |
Version: | 3.2.0 | ||
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
Cause: By default extended certificate validation was not enabled so bad certs could crash the router.
Consequence: Bad certificates in routes could crash the router.
Fix: We changed the default in 'oadm router' to turn on extended validation when a router is created.
Result: Bad certificates are caught and the route they are associated with is not used (and an appropriate status is set on it)
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2017-01-18 12:41:47 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Steven Walter
2016-09-27 13:24:01 UTC
Is the cert in the route broken? If so, can they include the route yaml. Obviously, if it contains sensitive keys, they shouldn't give it to us. Defaults set to true with PR: https://github.com/openshift/origin/pull/11218 This has been merged into ose and is in OSE v3.4.0.16 or newer. Verified this bug on haproxy images (id: 227ebcf6c7d8). the default EXTENDED_VALIDATION is true. and the invalid route will be skip. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2017:0066 |