| Summary: | Running multiple RHEV-M installs corrupted certs database | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 6 | Reporter: | Mark Wagner <mwagner> | |
| Component: | openssl | Assignee: | Tomas Mraz <tmraz> | |
| Status: | CLOSED WONTFIX | QA Contact: | BaseOS QE Security Team <qe-baseos-security> | |
| Severity: | high | Docs Contact: | ||
| Priority: | unspecified | |||
| Version: | 6.1 | CC: | dfediuck, dpal, iheim, perfbz | |
| Target Milestone: | rc | Keywords: | FutureFeature | |
| Target Release: | 6.1 | |||
| Hardware: | Unspecified | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | Doc Type: | Enhancement | ||
| Doc Text: | Story Points: | --- | ||
| Clone Of: | ||||
| : | 725732 (view as bug list) | Environment: | ||
| Last Closed: | 2011-07-26 09:09:45 UTC | Type: | --- | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
|
Description
Mark Wagner
2011-07-25 21:11:59 UTC
This request was evaluated by Red Hat Product Management for inclusion in the current release of Red Hat Enterprise Linux. Because the affected component is not scheduled to be updated in the current release, Red Hat is unfortunately unable to address this request at this time. Red Hat invites you to ask your support representative to propose this request, if appropriate and relevant, in the next release of Red Hat Enterprise Linux. If you would like it considered as an exception in the current release, please ask your support representative. Hi, Changing the BZ to openssl, and adding some information; We use OpenSSL for CA functionality in RHEV-M. It seems that we hit a concurrency issue when we try to sign several certificates. The effect was corrupted database file (had an extra empty line) and serial file wasn't increased. What we need is some basic locking mechanism, so when we use "openssl ca" it'll block other calls until it ends the current task. I saw other places implementing it with a simple lock file, similar to what National US laboratories implemented: http://bugzilla.mcs.anl.gov/globus/show_bug.cgi?id=6528 I'm sorry but the openssl ca was never meant to be a full Certificate Authority solution but rather a proof of a concept implementation using OpenSSL. It should not be used as a production tool in an environment such as yours. You will have to add the locking mechanism above it or - what I would suggest as a more appropriate - to use the Red Hat Certificate System http://www.redhat.com/certificate_system/ as the authority. |