Bug 1654558

Summary: The ca.crt created in pod by installer couldn't pass the SSL certificate verification
Product: OpenShift Container Platform Reporter: Qiaoling Tang <qitang>
Component: InstallerAssignee: Alex Crawford <crawford>
Installer sub component: openshift-installer QA Contact: Johnny Liu <jialiu>
Status: CLOSED CURRENTRELEASE Docs Contact:
Severity: high    
Priority: high CC: aalevy, anli, aos-bugs, jokerman, mmccomas, qitang, rmeggins, wking
Version: 4.1.0   
Target Milestone: ---   
Target Release: 4.1.0   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
: 1670282 (view as bug list) Environment:
Last Closed: 2019-01-07 02:15:41 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1670282    

Description Qiaoling Tang 2018-11-29 05:34:23 UTC
Description of problem:
Deploy Openshift 4.0 by openshift-installer(Next Generation). the ca.crt generated in pod couldn't pass the certificate. 

The issue block the logging-fluentd pod to start.

[core@test40-master-0 ~]$ oc get pod
NAME                                                  READY     STATUS             RESTARTS   AGE
cluster-logging-operator-9d486f9c9-mzqdk              1/1       Running            0          47m
elasticsearch-clientdatamaster-0-1-7f58f7b54c-9k5rz   1/1       Running            0          45m
elasticsearch-operator-799c57d6b8-tvkjg               1/1       Running            0          45m
fluentd-946hn                                         0/1       CrashLoopBackOff   13         46m
fluentd-p7qww                                         0/1       CrashLoopBackOff   13         46m
kibana-675b587dfd-hx4fp                               2/2       Running            0          46m

Fluentd pod logs:
[core@test40-master-0 ~]$ sudo cat /var/log/fluentd/fluentd.log 
2018-11-27 01:49:38 +0000 [error]: config error file="/etc/fluent/fluent.conf" error_class=Fluent::ConfigError error="Invalid Kubernetes API v1 endpoint https://kubernetes.default.svc: SSL_connect returned=1 errno=0 state=error: certificate verify failed (unable to get issuer certificate)"
2018-11-27 01:49:38 +0000 [error]: fluent/log.rb:362:error: config error file="/etc/fluent/fluent.conf" error_class=Fluent::ConfigError error="Invalid Kubernetes API v1 endpoint https://kubernetes.default.svc: SSL_connect returned=1 errno=0 state=error: certificate verify failed (unable to get issuer certificate)"
2018-11-27 01:49:41 +0000 [error]: config error file="/etc/fluent/fluent.conf" error_class=Fluent::ConfigError error="Invalid Kubernetes API v1 endpoint https://kubernetes.default.svc: SSL_connect returned=1 errno=0 state=error: certificate verify failed (unable to get issuer certificate)"
2018-11-27 01:49:41 +0000 [error]: fluent/log.rb:362:error: config error file="/etc/fluent/fluent.conf" error_class=Fluent::ConfigError error="Invalid Kubernetes API v1 endpoint https://kubernetes.default.svc: SSL_connect returned=1 errno=0 state=error: certificate verify failed (unable to get issuer certificate)"
2018-11-27 01:49:57 +0000 [error]: config error file="/etc/fluent/fluent.conf" error_class=Fluent::ConfigError error="Invalid Kubernetes API v1 endpoint https://kubernetes.default.svc: SSL_connect returned=1 errno=0 state=error: certificate verify failed (unable to get issuer certificate)"
2018-11-27 01:49:57 +0000 [error]: fluent/log.rb:362:error: config error file="/etc/fluent/fluent.conf" error_class=Fluent::ConfigError error="Invalid Kubernetes API v1 endpoint https://kubernetes.default.svc: SSL_connect returned=1 errno=0 state=error: certificate verify failed (unable to get issuer certificate)"


In pods:
cat /var/run/secrets/kubernetes.io/serviceaccount/ca.crt | openssl s_client -connect kubernetes.default.svc:443 -showcerts
CONNECTED(00000003)
depth=1 OU = bootkube, CN = kube-ca
verify error:num=20:unable to get local issuer certificate

BTW, the following command works well
curl -v -s --cacert/var/run/secrets/kubernetes.io/serviceaccount/ca.crt   https://kubernetes.default.svc.cluster.local


Version-Release number of the following components:

How reproducible:
Always

Steps to Reproduce:
1.Deploy Openshift 4.0 by openshift-installer
2.oc rsh $pod  
Note: To install openssl, You have to use the pod with root permission, For example: openshift-logging/fluentd, openshift-controller-manager/controller-manager-xxx openshift-apiserver/apiserver-xxx

3. yum install openssl
4. cat /var/run/secrets/kubernetes.io/serviceaccount/ca.crt | openssl s_client -connect kubernetes.default.svc:443 -showcerts


Actual results:

 cat /var/run/secrets/kubernetes.io/serviceaccount/ca.crt | openssl s_client -connect kubernetes.default.svc:443 -showcerts
CONNECTED(00000003)
depth=1 OU = bootkube, CN = kube-ca
verify error:num=20:unable to get local issuer certificate
---
Certificate chain
 0 s:/O=kube-master/CN=system:kube-apiserver
   i:/OU=bootkube/CN=kube-ca
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
 1 s:/OU=bootkube/CN=kube-ca
   i:/OU=openshift/CN=root-ca
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
---
Server certificate
subject=/O=kube-master/CN=system:kube-apiserver
issuer=/OU=bootkube/CN=kube-ca
---
Acceptable client certificate CA names
/OU=bootkube/CN=kube-ca
/OU=bootkube/CN=aggregator
Client Certificate Types: RSA sign, ECDSA sign
Requested Signature Algorithms: RSA+SHA256:ECDSA+SHA256:RSA+SHA384:ECDSA+SHA384:RSA+SHA512:ECDSA+SHA512:RSA+SHA1:ECDSA+SHA1
Shared Requested Signature Algorithms:  RSA+SHA256:ECDSA+SHA256:RSA+SHA384:ECDSA+SHA384:RSA+SHA512:ECDSA+SHA512:RSA+SHA1:ECDSA+SHA1
Peer signing digest: SHA512
Server Temp Key: ECDH, P-256, 256 bits
---
SSL handshake has read 2583 bytes and written 427 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES128-GCM-SHA256
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-RSA-AES128-GCM-SHA256
    Session-ID: C59DA8A2818CE38C896DC7F957901C32C4D688316383FC6CBE8C9A973769FEA8
    Session-ID-ctx: 
    Master-Key: 4D9E49A1128BC674EC6F67319F62FED55F5C19338840B26FFD29C8409A6A6FFB7D425DE9727C50A39DA40BE8CF54A933
    Key-Arg   : None
    Krb5 Principal: None
    PSK identity: None
    PSK identity hint: None
    TLS session ticket:
    0000 - 46 48 f2 4b 8f b4 13 33-b8 29 1a 4a ba c0 83 d9   FH.K...3.).J....
    0010 - 4d 4b 3f 51 b6 b4 1e c7-23 a4 c0 43 f5 b4 af 6f   MK?Q....#..C...o
    0020 - 20 65 fa eb 10 87 cb 54-cf 9a d2 a1 47 2e 60 85    e.....T....G.`.
    0030 - 43 74 66 68 9e de bb 98-95 f5 7b a1 43 2c ba ab   Ctfh......{.C,..
    0040 - 23 3e 35 71 cb 07 48 93-03 08 f3 ea dd 1f 4f cd   #>5q..H.......O.
    0050 - 7e 67 e6 bd 15 5a 6f a6-24 0a 09 82 29 1c 9e 9a   ~g...Zo.$...)...
    0060 - 97 fc d4 1d a9 94 0e 36-87 c7 9c d1 a2 8e 85 bd   .......6........
    0070 - d2 8e 51 96 d4 4d 66 a9-                          ..Q..Mf.
 
    Start Time: 1543405817
    Timeout   : 300 (sec)
    Verify return code: 20 (unable to get local issuer certificate)
---
DONE


Expected results:

Additional info:

Comment 1 Anping Li 2018-11-29 05:54:53 UTC
@rich, It maybe an installer/master bug. It seems the kube-ca certificate is not in /var/run/secrets/kubernetes.io/serviceaccount/ca.crt.

Comment 2 Jeff Cantrill 2018-11-29 14:38:33 UTC
Moving to Installer team as logging doesn't control this cert.  Maybe it should be master?

Comment 3 Aaron Levy 2018-12-12 22:40:22 UTC
If the CA in the service account as incorrect - a lot more than logging would be failing. So I have my doubts the installer (or master) is the source of the issue.

I'm unsure the behavior of piping the CA into openssl connect - but I have a feeling that if you were to specify `-CAfile` (similar to how the curl command is setting `--cacert`) the openssl connect command would work.

Along those lines, I do believe this might be something in the logging stack not properly specifying/using the cluster CA for trust.

Comment 4 Rich Megginson 2018-12-12 23:09:07 UTC
tl;dr I would very, very, strongly encourage the installer to provide the _entire_ cert chain in the ca.crt provided with the serviceaccount secrets.  I've already had a lot of problems with fluentd, and for rsyslog I'm probably to have to hack together a CA file containing the entire cert chain in the rsyslog configmap.  Not to mention that there may be many other openssl, ruby, python, and other apps which will be affected.  I still don't know if java apps will be affected, or what the remediation will be if so.  See below for further analysis.

(In reply to Aaron Levy from comment #3)
> If the CA in the service account as incorrect - a lot more than logging
> would be failing. So I have my doubts the installer (or master) is the
> source of the issue.
> 
> I'm unsure the behavior of piping the CA into openssl connect - but I have a
> feeling that if you were to specify `-CAfile` (similar to how the curl
> command is setting `--cacert`) the openssl connect command would work.

No, it would not - verify error:num=2:unable to get issuer certificate

sh-4.4# openssl s_client -connect kubernetes.default.svc:443 -CAfile /var/run/se
crets/kubernetes.io/serviceaccount/ca.crt                                       
CONNECTED(00000004)
depth=1 OU = bootkube, CN = kube-ca
verify error:num=2:unable to get issuer certificate
issuer= OU = openshift, CN = root-ca
---
Certificate chain
 0 s:O = kube-master, CN = system:kube-apiserver
   i:OU = bootkube, CN = kube-ca
 1 s:OU = bootkube, CN = kube-ca
   i:OU = openshift, CN = root-ca
---
Server certificate
-----BEGIN CERTIFICATE-----
...
Verification error: unable to get issuer certificate
...
    Verify return code: 2 (unable to get issuer certificate)

In this case, this means "unable to get the root CA" i.e. client has only the intermediate CA cert for "OU = bootkube, CN = kube-ca", not the root CA cert for "OU = openshift, CN = root-ca" so cannot verify the whole chain.

However, if you provide the `-partial_chain` flag, you can avoid the error:

depth=1 OU = bootkube, CN = kube-ca
verify return:1
depth=0 O = kube-master, CN = system:kube-apiserver
verify return:1
CONNECTED(00000004)
...
Verification: OK
... etc.

The problem is that openssl "sets" `-partial_chain` _off_ by default - by default, it requires the full chain.  In order to disable this behavior, the openssl client must provide a way to set the flag on the underlying trust store to X509_V_FLAG_PARTIAL_CHAIN.

Note that NSS, gnutls, and golang tls/crypto appear so far to be unaffected - they "set" partial_chain "on" by default.  I haven't done an exhaustive analysis, but the `curl` command works (NSS), wget works (gnutls).

python and ruby both fail, and it depends a great deal on the application's rest/http/ssl layers as to how easy it is to pass this flag in.  Of course, you can usually resort to monkeypatching for dynamic languages.

> 
> Along those lines, I do believe this might be something in the logging stack
> not properly specifying/using the cluster CA for trust.

It turns out we got unlucky with logging because we have clients that use openssl such as fluentd and rsyslog.

It turns out we got fairly lucky with the ruby kubeclient because it assumes openssl and allows passing the right flags all the way down into the crypto layer.

https://github.com/openshift/origin-aggregated-logging/pull/1483

and

https://github.com/fabric8io/fluent-plugin-kubernetes_metadata_filter/pull/164

For rsyslog, I'm going to have to hack the logging operator to dynamically construct the serviceaccount CA cert from the default one and the root ca in kube-system.

Comment 5 Rich Megginson 2018-12-12 23:36:21 UTC
If the installer team is unwilling to change this, then there is still an installer bug, for the docs.

WARNING: YOUR APPS MAY BREAK IF USING THE /var/run/secrets/kubernetes.io/serviceaccount/ca.crt SINCE IT NOW CONTAINS ONLY AN INTERMEDIATE CA CERT AND NOT A ROOT CA CERT.  OpenSSL and applications that use it (ruby, python, etc.) by default REQUIRE THE ENTIRE CERT CHAIN TO VERIFY SERVER CERTS.

Comment 6 Rich Megginson 2018-12-13 00:06:14 UTC
You don't need the entire cert chain, you only need the root CA:

$ oc extract -n kube-system cm/root-ca --to=.
ca.crt
$ mv ca.crt root-ca.crt
$ # or any serviceaccount secret
$ oc extract -n openshift-logging secret/fluentd-token-jj7zq --to=.        
namespace
token
ca.crt
$ oc get endpoints --all-namespaces
NAMESPACE                                            NAME                       
         ENDPOINTS                                                              
     AGE
...
default                                              kubernetes                 
         192.168.126.11:6443                                                    
$ openssl s_client -connect 192.168.126.11:6443 -CAfile ca.crt 
CONNECTED(00000003)
depth=1 OU = bootkube, CN = kube-ca
verify error:num=2:unable to get issuer certificate
issuer= OU = openshift, CN = root-ca
... failure case ... 
$ openssl s_client -connect 192.168.126.11:6443 -CAfile root-ca.crt 
CONNECTED(00000003)
depth=2 OU = openshift, CN = root-ca
verify return:1
depth=1 OU = bootkube, CN = kube-ca
verify return:1
depth=0 O = kube-master, CN = system:kube-apiserver
verify return:1
...
    Verify return code: 0 (ok)

Comment 8 Alex Crawford 2018-12-13 18:56:52 UTC
https://github.com/openshift/cluster-kube-controller-manager-operator/pull/110 has been merged. Can you verify that this has been fixed?

Comment 10 Qiaoling Tang 2018-12-17 01:53:41 UTC
Fluentd pod can be in running status now.
$ oc get pod
NAME                                                  READY     STATUS    RESTARTS   AGE
cluster-logging-operator-8866ff9c8-9bhnk              1/1       Running   0          15m
elasticsearch-clientdatamaster-0-1-84d764899d-wl4l5   1/1       Running   0          13m
elasticsearch-operator-86599f8849-544tn               1/1       Running   0          14m
fluentd-8wfqd                                         1/1       Running   0          14m
fluentd-dkbvx                                         1/1       Running   0          14m
fluentd-f27rf                                         1/1       Running   0          14m
kibana-675b587dfd-prf28                               2/2       Running   0          14m

$ oc rsh fluentd-8wfqd
sh-4.2# openssl s_client -connect kubernetes.default.svc:443 -CAfile /var/run/secrets/kubernetes.io/serviceaccount/ca.crt
CONNECTED(00000003)
depth=2 OU = openshift, CN = root-ca
verify return:1
depth=1 OU = bootkube, CN = kube-ca
verify return:1
depth=0 O = kube-master, CN = system:kube-apiserver
verify return:1
---
Certificate chain
 0 s:/O=kube-master/CN=system:kube-apiserver
   i:/OU=bootkube/CN=kube-ca
 1 s:/OU=bootkube/CN=kube-ca
   i:/OU=openshift/CN=root-ca
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/O=kube-master/CN=system:kube-apiserver
issuer=/OU=bootkube/CN=kube-ca
---
Acceptable client certificate CA names
/OU=bootkube/CN=kube-ca
/OU=bootkube/CN=aggregator
Client Certificate Types: RSA sign, ECDSA sign
Requested Signature Algorithms: RSA+SHA256:ECDSA+SHA256:RSA+SHA384:ECDSA+SHA384:RSA+SHA512:ECDSA+SHA512:RSA+SHA1:ECDSA+SHA1
Shared Requested Signature Algorithms: RSA+SHA256:ECDSA+SHA256:RSA+SHA384:ECDSA+SHA384:RSA+SHA512:ECDSA+SHA512:RSA+SHA1:ECDSA+SHA1
Peer signing digest: SHA512
Server Temp Key: ECDH, P-256, 256 bits
---
SSL handshake has read 2568 bytes and written 427 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES128-GCM-SHA256
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-RSA-AES128-GCM-SHA256
    Session-ID: 0FC52E41120AD73CDC8A81F74DE353D1F06987FF320204AA7941DF6CB3F6E29C
    Session-ID-ctx: 
    Master-Key: 178CA609E42EC7EEE845D487A78FD63488554794DA99A0C2F9264091C3C28B3AF1E2A78BDDAB9AE51C5FD326EAEDA060
    Key-Arg   : None
    Krb5 Principal: None
    PSK identity: None
    PSK identity hint: None
    TLS session ticket:
    0000 - 3d 10 af 5a 9b eb 60 d5-c7 d3 22 f8 e7 d8 f3 72   =..Z..`..."....r
    0010 - a1 d9 4c 7f 6b 46 c1 68-3f 9a 13 97 89 fc 4d f2   ..L.kF.h?.....M.
    0020 - 97 df 41 51 dc 98 12 42-62 c2 07 7f 0b d7 81 98   ..AQ...Bb.......
    0030 - 3d aa f8 91 ac 75 26 25-02 45 a0 35 82 d5 3a fa   =....u&%.E.5..:.
    0040 - 55 f0 29 66 bc d7 1a b8-08 2d 1e 73 f9 97 3b 43   U.)f.....-.s..;C
    0050 - c3 76 6f 5c 87 ff 16 00-87 39 b1 21 c5 cc 95 fa   .vo\.....9.!....
    0060 - c5 f6 77 d7 ff f0 4f fb-4a a8 69 12 bc bd 2f 47   ..w...O.J.i.../G
    0070 - 0e b8 50 bb 94 9b 67 fd-                          ..P...g.

    Start Time: 1545011294
    Timeout   : 300 (sec)
    Verify return code: 0 (ok)
---


Remove keyword "TestBlocker"

Comment 11 W. Trevor King 2019-01-06 05:02:37 UTC
> Fluentd pod can be in running status now

So we can mark this CLOSED CURRENTRELEASE?  Or is there anything left to do?