Bug 1153319 - [2.1 backport] Disable SSLv3 to mitigate POODLE CVE- 2014- 3566
Summary: [2.1 backport] Disable SSLv3 to mitigate POODLE CVE- 2014- 3566
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: OpenShift Container Platform
Classification: Red Hat
Component: Security
Version: 2.1.0
Hardware: Unspecified
OS: Unspecified
unspecified
high
Target Milestone: ---
: ---
Assignee: Luke Meyer
QA Contact: Xiaoli Tian
URL:
Whiteboard:
Depends On: 1153313
Blocks:
TreeView+ depends on / blocked
 
Reported: 2014-10-15 18:44 UTC by Luke Meyer
Modified: 2014-11-25 18:19 UTC (History)
7 users (show)

Fixed In Version: openshift-origin-broker-1.16.1.14-1.el6op rubygem-openshift-origin-frontend-apache-vhost-0.5.2.5-1.el6op rubygem-openshift-origin-frontend-apache-mod-rewrite-0.5.2.2-1.el6op
Doc Type: Bug Fix
Doc Text:
OpenShift Enterprise brokers as well as nodes using the apache-mod-rewrite or apache-vhost front end plug-ins previously had SSLv3 enabled, making them susceptible to POODLE-style attacks. This bug fix backports an OpenShift Enterprise 2.2 fix to update these components to remove SSLv3 support, and as a result new installations are no longer susceptible to these issues.
Clone Of: 1153313
Environment:
Last Closed: 2014-11-25 18:19:49 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:1906 0 normal SHIPPED_LIVE Moderate: Red Hat OpenShift Enterprise 2.1.9 security, bug fix, and enhancement update 2014-11-25 23:19:05 UTC

Description Luke Meyer 2014-10-15 18:44:23 UTC
+++ This bug was initially created as a clone of Bug #1153313 +++

Description of problem:
Per https://access.redhat.com/articles/1232123 httpd configuration should disable the SSLv3 protocol.

Comment 5 Johnny Liu 2014-11-06 11:22:26 UTC
Verified this bug with 2.1.z/2014-11-05.1 against both vhost and rewrite frontend, and PASS.


1. Create an app successfully.
2. Check sslv3 is disabled on broker and node, and make sure app's url are still available.
Command: ( sleep 0.2; echo Q ) | timeout 5 openssl s_client -connect '10.66.79.120:443' -no_tls1 -no_tls1_1 -no_tls1_2 2>&1 | grep 'no peer certificate available'
no peer certificate available
Command: (sleep 0.2; echo Q ) | timeout 5 openssl s_client -connect '10.66.79.120:443' 2>&1 | tail -1 | grep 'DONE'
DONE
Command: ( sleep 0.2; echo Q ) | timeout 5 openssl s_client -connect 'poodleapp-jialiu.ose21z-manual.com.cn:443' -no_tls1 -no_tls1_1 -no_tls1_2 2>&1 | grep 'no peer certificate available'
no peer certificate available
Command: (sleep 0.2; echo Q ) | timeout 5 openssl s_client -connect 'poodleapp-jialiu.ose21z-manual.com.cn:443' 2>&1 | tail -1 | grep 'DONE'
DONE

Comment 7 errata-xmlrpc 2014-11-25 18:19:49 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHSA-2014-1906.html


Note You need to log in before you can comment on or make changes to this bug.