Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1153319 - [2.1 backport] Disable SSLv3 to mitigate POODLE CVE- 2014- 3566
[2.1 backport] Disable SSLv3 to mitigate POODLE CVE- 2014- 3566
Status: CLOSED ERRATA
Product: OpenShift Container Platform
Classification: Red Hat
Component: Security (Show other bugs)
2.1.0
Unspecified Unspecified
unspecified Severity high
: ---
: ---
Assigned To: Luke Meyer
Xiaoli Tian
:
Depends On: 1153313
Blocks:
  Show dependency treegraph
 
Reported: 2014-10-15 14:44 EDT by Luke Meyer
Modified: 2014-11-25 13:19 EST (History)
7 users (show)

See Also:
Fixed In Version: openshift-origin-broker-1.16.1.14-1.el6op rubygem-openshift-origin-frontend-apache-vhost-0.5.2.5-1.el6op rubygem-openshift-origin-frontend-apache-mod-rewrite-0.5.2.2-1.el6op
Doc Type: Bug Fix
Doc Text:
OpenShift Enterprise brokers as well as nodes using the apache-mod-rewrite or apache-vhost front end plug-ins previously had SSLv3 enabled, making them susceptible to POODLE-style attacks. This bug fix backports an OpenShift Enterprise 2.2 fix to update these components to remove SSLv3 support, and as a result new installations are no longer susceptible to these issues.
Story Points: ---
Clone Of: 1153313
Environment:
Last Closed: 2014-11-25 13:19:49 EST
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:1906 normal SHIPPED_LIVE Moderate: Red Hat OpenShift Enterprise 2.1.9 security, bug fix, and enhancement update 2014-11-25 18:19:05 EST

  None (edit)
Description Luke Meyer 2014-10-15 14:44:23 EDT
+++ This bug was initially created as a clone of Bug #1153313 +++

Description of problem:
Per https://access.redhat.com/articles/1232123 httpd configuration should disable the SSLv3 protocol.
Comment 5 Johnny Liu 2014-11-06 06:22:26 EST
Verified this bug with 2.1.z/2014-11-05.1 against both vhost and rewrite frontend, and PASS.


1. Create an app successfully.
2. Check sslv3 is disabled on broker and node, and make sure app's url are still available.
Command: ( sleep 0.2; echo Q ) | timeout 5 openssl s_client -connect '10.66.79.120:443' -no_tls1 -no_tls1_1 -no_tls1_2 2>&1 | grep 'no peer certificate available'
no peer certificate available
Command: (sleep 0.2; echo Q ) | timeout 5 openssl s_client -connect '10.66.79.120:443' 2>&1 | tail -1 | grep 'DONE'
DONE
Command: ( sleep 0.2; echo Q ) | timeout 5 openssl s_client -connect 'poodleapp-jialiu.ose21z-manual.com.cn:443' -no_tls1 -no_tls1_1 -no_tls1_2 2>&1 | grep 'no peer certificate available'
no peer certificate available
Command: (sleep 0.2; echo Q ) | timeout 5 openssl s_client -connect 'poodleapp-jialiu.ose21z-manual.com.cn:443' 2>&1 | tail -1 | grep 'DONE'
DONE
Comment 7 errata-xmlrpc 2014-11-25 13:19:49 EST
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHSA-2014-1906.html

Note You need to log in before you can comment on or make changes to this bug.