Bug 1819688
Summary: | oc login produces "TLS handshake error from <ingress pod IP and port>: remote error: tls: bad certificate" | ||
---|---|---|---|
Product: | OpenShift Container Platform | Reporter: | Xingxing Xia <xxia> |
Component: | apiserver-auth | Assignee: | Standa Laznicka <slaznick> |
Status: | CLOSED ERRATA | QA Contact: | Xingxing Xia <xxia> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 4.4 | CC: | aos-bugs, jseunghw, mfojtik, slaznick |
Target Milestone: | --- | ||
Target Release: | 4.5.0 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
Cause:
`oc login` was performing HTTP request to decide which CA bundle (system trust store/kubeconfig CA) to use connecting to the remote login server
Consequence:
Every login attempt generated "remote error: tls: bad certificate" line in the oauth-server logs
Fix:
retrieve the server certificate chain from insecure TLS handshake and perform the correct-CA pick outside the connection.
Result:
oauth-server no longer logs bad certificate on login attempts
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-07-13 17:24:45 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Xingxing Xia
2020-04-01 10:27:58 UTC
The message we see is caused by the `oc` first trying to connect without the CA (=> that's where the bad certificate comes from), and only using the CA in a subsequent request. Verified in oc 4.5.0-202004202137-8dda2e7 with original steps, fixed and cannot reproduce now. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2020:2409 *** Bug 1901379 has been marked as a duplicate of this bug. *** |