Bug 1814390

Summary: Clusters upgraded to 4.3.5 may require manual service CA rotation
Product: OpenShift Container Platform Reporter: Maru Newby <mnewby>
Component: service-caAssignee: Maru Newby <mnewby>
Status: CLOSED WONTFIX QA Contact: Wei Sun <wsun>
Severity: urgent Docs Contact:
Priority: unspecified    
Version: 4.3.zCC: aos-bugs, dmoessne, mfojtik, nagrawal, wking
Target Milestone: ---   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
: 1814747 1815604 (view as bug list) Environment:
Last Closed: 2020-03-24 00:40:31 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Maru Newby 2020-03-17 18:32:47 UTC
Automated service ca rotation was initially released without a guarantee of a unique ca serial number due to the library code used to generate CAs using a fixed value. The lack of a unique serial number resulted in a broken chain of trust for non-golang clients such as curl [1].

If a cluster has been upgraded to a release supporting automated CA rotation but without the fix to ensure unique CA serials, the resulting CA configuration will break non-golang clients (e.g. curl) due to the chain of trust containing more than one certificate for the same issuer and serial. Fixing this CA configuration automatically will not be possible due to the requirement to restart affected services, so manual cert rotation [1] is likely the best option.

1: https://bugzilla.redhat.com/show_bug.cgi?id=1810036

Comment 2 Maru Newby 2020-03-20 16:53:53 UTC
Note that there is no work to be done on this BZ. It is intended to be the canonical BZ for reports of TLS validation errors caused by upgrading to 4.3.5 and 4.2.22. The fix is manual rotation.

Comment 3 Maru Newby 2020-03-20 17:01:36 UTC
Updating to indicate the affected release is 4.3.0, since this issue should only exhibit on 4.3.5. Again, no target release since we're not targeting a fix.

Comment 4 Maru Newby 2020-03-24 00:40:31 UTC
Closing since the issue is not actionable.