Bug 1440662
| Summary: | [TestOnly] 3rd party CA with / without sha256 | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Virtualization Manager | Reporter: | Sandro Bonazzola <sbonazzo> |
| Component: | ovirt-engine | Assignee: | Yedidyah Bar David <didi> |
| Status: | CLOSED CURRENTRELEASE | QA Contact: | Petr Kubica <pkubica> |
| Severity: | medium | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 4.1.0 | CC: | amarchuk, didi, lsurette, lsvaty, rbalakri, Rhev-m-bugs, srevivo, ykaul, ylavi |
| Target Milestone: | ovirt-4.1.3 | Keywords: | TestOnly, ZStream |
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2017-07-18 13:34:16 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | Integration | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1420577 | ||
| Bug Blocks: | |||
|
Description
Sandro Bonazzola
2017-04-10 08:37:44 UTC
(In reply to Sandro Bonazzola from comment #0) > We have a section that explains how to install 3rd party CA. > We need to confirm that this is still correct, relevant, desirable: > https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.1/ > html/administration_guide/appe- > red_hat_enterprise_virtualization_and_ssl#Replacing_the_Manager_SSL_Certifica > te > > Now that we moved from sha1 to sha256 with the CA we generated by > ovirt-engine, if user is using 3rd party CA it's up to users to use sha256 > then. > > We do need to make sure that the procedure we write works well also for > customers that used above article and use 3rd party CAs. "The procedure we write" refers to the still-not-ready expected result of bug 1420577. Verified. Verification steps: - already created own certificates (Root CA, Intermediate CA, Apache cert) - Root CA was imported to browsers 1) Install latest 4.0 2) Import own certificates Intermediate CA as apache-ca.pem and Apache cert (using flow from documentation [1]) 3) Update to latest 4.1 4) Check certificate in browsers 5) Migrate all other certs to sha256 as commented in bug 1420577 without Apache cert 6) Check - tested with sha1 and sha256 Apache certs - in case of sha1 there is warning in browser console but user is responsible for using certificates sha256 [1] https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.1/html/administration_guide/appe-red_hat_enterprise_virtualization_and_ssl#Replacing_the_Manager_SSL_Certificate |