Bug 1029126 - Handle failure to decrypt LocalAdminPassword
Summary: Handle failure to decrypt LocalAdminPassword
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Red Hat Enterprise Virtualization Manager
Classification: Red Hat
Component: ovirt-engine
Version: 3.3.0
Hardware: Unspecified
OS: Unspecified
unspecified
low
Target Milestone: ---
: 3.6.0
Assignee: Frantisek Kobzik
QA Contact:
URL:
Whiteboard: virt
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-11-11 17:43 UTC by David Jaša
Modified: 2014-08-27 07:03 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-08-27 07:03:38 UTC
oVirt Team: ---
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
oVirt gerrit 31387 0 master ABANDONED core: Detect inability to decrypt sysprep passwords 2020-02-05 13:35:49 UTC

Description David Jaša 2013-11-11 17:43:00 UTC
Description of problem:
Currently, when RHEV-M fails to decrypt LocalAdminPassword, it passes the plaintext value to the sysprep file. The plaintext value can however contain forbidden characters for Windows that effectively break Windows sysprep mechanism. Based on above, the condition of non-decryptable LocalAdminPassword should be handled somehow:
  * don't run VM at all, issue Error in Events
  * don't set Admin Password at all in sysprep, issue Warning in Events, run VM

Version-Release number of selected component (if applicable):
is21 / rhevm-backend-3.3.0-0.31.beta1.el6ev.noarch

How reproducible:
always

Steps to Reproduce:
1. replace keys used to encrypt LocalAdminPassword in /etc/pki/ovirt-engine
2. run sealed Windows 7 VM with sysprep floppy attached
3.

Actual results:
Windows is likely to fail sysprep because the password may contain illegal characters

Expected results:
failure to decrypt password is detected and handled somehow

Additional info:
it takes going through some hoops to run into this bug so I think that it can have low priority.

Comment 1 Michal Skrivanek 2013-11-13 11:21:10 UTC
makes sense to fail, not urgent though

Comment 2 Frantisek Kobzik 2014-08-27 07:03:38 UTC
Closing this since the problem reproduces only when the system is in illegal state (db values aren't encrypted by currently used keys).

This state is reported by engine in the logs (ERROR [...] Failed to decrypt value for property XYZ). As a consequence, plaintext value is used. It is up to administrator not to ignore this log line and ensure that password values are encrypted/decryptable correctly, or use plaintext at their own risk.


Note You need to log in before you can comment on or make changes to this bug.