Bug 1998016
| Summary: | RA key import failing during pki instance creation on RHEL9.0 replica from RHEL8.4 server | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 9 | Reporter: | Kaleem <ksiddiqu> |
| Component: | pki-core | Assignee: | Jack Magne <jmagne> |
| Status: | CLOSED ERRATA | QA Contact: | PKI QE <bugzilla-pkiqe> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 9.0 | CC: | aakkiang, abokovoy, amore, ckelley, dpunia, edewata, jmagne, mharmsen, pcech, rcritten, rhcs-maint, skhandel, ssidhaye, tscherf |
| Target Milestone: | rc | Keywords: | Triaged |
| Target Release: | --- | Flags: | ckelley:
needinfo-
ckelley: needinfo- ckelley: needinfo- ckelley: needinfo- pm-rhel: mirror+ |
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | pki-core-11.0.1-3.el9 | Doc Type: | If docs needed, set a value |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2022-05-17 12:41:22 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 2032806 | ||
|
Description
Kaleem
2021-08-26 09:37:08 UTC
Taking as I'm investigating this. Reproduced. This is similar to https://github.com/dogtagpki/pki/pull/3590. So my thinking is that there are two parts here: - pki-core fix in bug 1998016 is required but not enough. It only fixes the first step -- when RA Agent file is generated, it is no longer encrypted with a legacy cipher - IPA needs to drop encryption of existing RA Agent file generated with older PKI version _before_ submitting it to replica via Custodia. This will be handled via bug 2032806. For RHCS, I think, this is also valid, so some sort of a way to handle upgrade would be needed if RHCS supports in-place upgrade from RHEL 8 to RHEL 9. I've followed this issue to the other ipa bug referenced which seems to be resolved: bug 2032806. The question is there more to be done from the pki side for this? The following irc trace was provided to me by edewata: [Friday, February 4, 2022] [8:58:21 AM CST] <cheimes> ab / ckelley: I just finish running some tests. The ca-agent.p12 file uses a weak, problematic encryption algo. [Friday, February 4, 2022] [8:58:36 AM CST] <cheimes> Shrouded Keybag: pbeWithSHA1And3-KeyTripleDES-CBC, Iteration 600000 [Friday, February 4, 2022] [8:58:40 AM CST] Nick vvanhaft is now known as vvanhaft|afk. [Friday, February 4, 2022] [8:58:59 AM CST] <cheimes> cacert.p12 is better: PBES2, PBKDF2, AES-256-CBC, Iteration 2000, PRF hmacWithSHA1 [Friday, February 4, 2022] [8:59:26 AM CST] <cheimes> Tested on RHEL 8.5 with pki-ca-10.11.2-2.module+el8.5.0+12735+8eb38ccc [Friday, February 4, 2022] [9:00:15 AM CST] <ckelley> cheimes: yeah the stripping out of SHA-1 in pki-core/jss went in after the 9.0 branching so there is probably a lot of that sort of thing happening. [Friday, February 4, 2022] [9:00:31 AM CST] <cheimes> http://pastebin.test.redhat.com/1027132 [Friday, February 4, 2022] [9:00:45 AM CST] <cheimes> 3DES is more of a problem I was wondering if it has been isolated as to what command is being called from pkispawn to isolate this issue, or is it some test program that is the issue? If so it would be great to attempt to trace down what piece of code is allegedly using DES3 as reported here. thanks Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (new packages: pki-core), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2022:2376 |