Bug 2112348
Summary: | pass the OPENSSL_CONF env var through to the "ssh" binary | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 9 | Reporter: | Laszlo Ersek <lersek> |
Component: | libvirt | Assignee: | Michal Privoznik <mprivozn> |
libvirt sub component: | General | QA Contact: | Lili Zhu <lizhu> |
Status: | CLOSED ERRATA | Docs Contact: | |
Severity: | unspecified | ||
Priority: | unspecified | CC: | dzheng, jdenemar, lmen, mprivozn, mxie, rjones, vhodina, virt-maint, xuzhang |
Version: | 9.1 | Keywords: | Triaged |
Target Milestone: | rc | Flags: | pm-rhel:
mirror+
|
Target Release: | 9.1 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | libvirt-8.5.0-5.el9 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2022-11-15 10:04:47 UTC | Type: | Enhancement |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 2062360 |
Description
Laszlo Ersek
2022-07-29 12:53:26 UTC
With libvirt-8.5.0-2.el9.x86_64: $ OPENSSL_CONF=/var/tmp/openssl.cnf virsh -c 'qemu+ssh://root.0.91/system' list error: failed to connect to the hypervisor error: Cannot recv data: ssh: connect to host 192.168.0.91 port 22: No route to host: Connection reset by peer With libvirt-8.5.0-5.el9_rc.03627d98b7.x86_64: $ OPENSSL_CONF=/var/tmp/openssl.cnf virsh -c 'qemu+ssh://root.0.91/system' list root.0.91's password: Id Name State -------------------- Looks like the problem is fixed with the scratch build. Tested with: libvirt-8.5.0-3.el9.x86_64 Tested with the above build: libvirt-8.5.0-5.el9_rc.03627d98b7.x86_64 1. On the RHEL9 installation that we're going to use as the ssh and libvirt client, create the following ~/.ssh/config stanza: Host 10.73.*.* KexAlgorithms +diffie-hellman-group14-sha1 MACs +hmac-sha1 HostKeyAlgorithms +ssh-rsa PubkeyAcceptedKeyTypes +ssh-rsa PubkeyAcceptedAlgorithms +ssh-rsa 2. On the same RHEL9 installation, create the following OpenSSL config file, called "$HOME/openssl-sha1.cnf": .include /etc/ssl/openssl.cnf [openssl_init] alg_section = evp_properties [evp_properties] rh-allow-sha1-signatures = yes 3. On the RHEL9 installation, run # update-crypto-policies --show DEFAULT 4. Connect to the xen server # OPENSSL_CONF=/root/openssl-sha1.cnf virsh -c 'xen+ssh://10.73.*.*' list error: failed to connect to the hypervisor error: Cannot recv data: ssh_dispatch_run_fatal: Connection to 10.73.*.* port 22: error in libcrypto: Connection reset by peer Tested with the above build: libvirt-8.5.0-5.el9_rc.03627d98b7.x86_64 4. Connect to the xen server # OPENSSL_CONF=/root/openssl-sha1.cnf virsh -c 'xen+ssh://10.73.**' list The authenticity of host '10.73.*.* (10.73.*.*)' can't be established. RSA key fingerprint is SHA256:EUNB9K3dP6Dzl4VGuy5EScDKm6XIMysvJVEWV56bYY0. This key is not known by any other names Are you sure you want to continue connecting (yes/no/[fingerprint])? yes root.*.*'s password: Id Name State -------------------------- 0 Domain-0 running Verify this bug with: libvirt-8.5.0-5.el9.x86_64 1. On the RHEL9 installation that we're going to use as the ssh and libvirt client, create the following ~/.ssh/config stanza: Host 10.73.*.* KexAlgorithms +diffie-hellman-group14-sha1 MACs +hmac-sha1 HostKeyAlgorithms +ssh-rsa PubkeyAcceptedKeyTypes +ssh-rsa PubkeyAcceptedAlgorithms +ssh-rsa 2. On the same RHEL9 installation, create the following OpenSSL config file, called "/home/lizhu/openssl-sha1.cnf": .include /etc/ssl/openssl.cnf [openssl_init] alg_section = evp_properties [evp_properties] rh-allow-sha1-signatures = yes 3. On the RHEL9 installation, run $ update-crypto-policies --show DEFAULT 4. Connect to the xen server $ OPENSSL_CONF=/home/lizhu/openssl-sha1.cnf virsh -c 'xen+ssh://root.*.*' list root.*.*'s password: Id Name State -------------------------- 0 Domain-0 running As the testing result match with the expected result. Mark the bug as verified. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Low: libvirt security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2022:8003 |