Bug 1319638 - rpc: set bind-insecure to off by default
Summary: rpc: set bind-insecure to off by default
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Gluster Storage
Classification: Red Hat Storage
Component: core
Version: rhgs-3.1
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
: RHGS 3.1.3
Assignee: Prasanna Kumar Kalever
QA Contact: Neha
URL:
Whiteboard:
Depends On:
Blocks: 1311817
TreeView+ depends on / blocked
 
Reported: 2016-03-21 08:55 UTC by Prasanna Kumar Kalever
Modified: 2016-09-17 14:40 UTC (History)
9 users (show)

Fixed In Version: glusterfs-3.7.9-1
Doc Type: Bug Fix
Doc Text:
none
Clone Of:
Environment:
Last Closed: 2016-06-23 05:04:34 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2016:1240 0 normal SHIPPED_LIVE Red Hat Gluster Storage 3.1 Update 3 2016-06-23 08:51:28 UTC

Description Prasanna Kumar Kalever 2016-03-21 08:55:48 UTC
Description of problem:

commit 243a5b429f225acb8e7132264fe0a0835ff013d5 turn's 'ON'
allow-insecure and bind-insecure by default.

while upgrading subset of nodes from a trusted storage pool,
nodes which have older versions of glusterfs will expect
connection from secure ports only (since they still have
bind-insecure off) thus they reject connection from upgraded
nodes which now have insecure ports.

Hence we will run into connection issues between peers.


Version-Release number of selected component (if applicable):
3.1.3

reproducible:
Simple, upgrading a subset of nodes from trusted pool will show you failure in connection between peers

Actual results:
Failure in connection between non-upgraded nodes and upgraded nodes

Expected results:
No connection issues between peers

Additional info:

Comment 2 Atin Mukherjee 2016-03-21 09:17:06 UTC
This bug is to track the fix which was already in 3.1.2 but missed out as part of rebasing to 3.1.3 from upstream 3.7.9

Comment 3 SATHEESARAN 2016-03-21 09:34:50 UTC
(In reply to Atin Mukherjee from comment #2)
> This bug is to track the fix which was already in 3.1.2 but missed out as
> part of rebasing to 3.1.3 from upstream 3.7.9

If I understand correctly, this solution is to revert that patch ( commit 243a5b429f225acb8e7132264fe0a0835ff013d5 ) that enabled allow-insecure and bind-insecure ?

Comment 5 Prasanna Kumar Kalever 2016-03-21 09:39:11 UTC
rpc: set bind-insecure to off by default

commit 243a5b429f225acb8e7132264fe0a0835ff013d5 turn's 'ON'
allow-insecure and bind-insecure by default.

Problem:
Now with newer versions we have bind-insecure 'ON' by default.
So, while upgrading subset of nodes from a trusted storage pool,
nodes which have older versions of glusterfs will expect
connection from secure ports only (since they still have
bind-insecure off) thus they reject connection from upgraded
nodes which now have insecure ports.

Hence we will run into connection issues between peers.

Solution:
This patch will turn bind-insecure 'OFF' by default to avoid
problem explained above.

Change-Id: Id7a19b4872399d3b019243b0857c9c7af75472f7
BUG: 1319638
Signed-off-by: Prasanna Kumar Kalever <prasanna.kalever>

Comment 6 Prasanna Kumar Kalever 2016-03-21 09:41:36 UTC
REVIEW: https://code.engineering.redhat.com/gerrit/#/c/70313/

Comment 9 Neha 2016-04-26 04:28:54 UTC
Don't see this issue with latest build. Tried to upgrade subset of nodes from 3.1.2 to 3.1.3 [version 3.7.9-2]. 

Moving it to verified.

Comment 12 Atin Mukherjee 2016-06-14 05:52:03 UTC
bind insecure default value is off in rhgs-3.1.2 as well and hence this doesn't qualify for a doc_text.

Comment 13 SATHEESARAN 2016-06-14 06:00:35 UTC
Based on comment12, making the required changes

Comment 16 errata-xmlrpc 2016-06-23 05:04:34 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2016:1240


Note You need to log in before you can comment on or make changes to this bug.