Bug 1424484
| Summary: | Single bad SSL certificate causes cascading failure | ||
|---|---|---|---|
| Product: | OpenShift Container Platform | Reporter: | Ed Seymour <eseymour> |
| Component: | Networking | Assignee: | Ben Bennett <bbennett> |
| Networking sub component: | router | QA Contact: | zhaozhanqi <zzhao> |
| Status: | CLOSED DUPLICATE | Docs Contact: | |
| Severity: | medium | ||
| Priority: | unspecified | CC: | aos-bugs, eparis, eseymour |
| Version: | 3.4.0 | ||
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2017-02-20 11:53:08 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Ed Seymour
2017-02-17 17:17:29 UTC
Thank you so much for the report. Can you supply the/a example of the bad certificate? We have added extensive verification to try to prevent bad certificates. Your example can help use fix our validation. Any file will do, I used the following: $ cat garbage.pem -----BEGIN CERTIFICATE----- This is utter garbage -----END CERTIFICATE----- In my test I used this file for all three entries (cert, key, and ca). I've retested using openshift3/ose:latest and openshift3/ose-haproxy-router:latest and this issue has been fixed. The router now identifies the bad certs and does not load this route. E0220 10:20:48.867752 1 extended_validator.go:67] Skipping route myproject/badcert due to invalid configuration: - spec.tls.caCertificate: Invalid value: "\u003cca certificate data\u003e": failed to parse CA certificate: Could not read any certificates - spec.tls.certificate: Invalid value: "\u003ccertificate data\u003e": Could not read any certificates - spec.tls.key: Invalid value: "\u003ckey data\u003e": tls: failed to find any PEM data in certificate input Other routes remain unaffected, and new routes are accepted and loaded. This suggests the issue has been resolved in OpenShift 3.4. *** This bug has been marked as a duplicate of bug 1389165 *** |