Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1454827 - [downstream clone - 4.1.5] [RFE][Tracker] Requesting testing of support for TLSv1.2
[downstream clone - 4.1.5] [RFE][Tracker] Requesting testing of support for T...
Status: CLOSED ERRATA
Product: Red Hat Enterprise Virtualization Manager
Classification: Red Hat
Component: ovirt-engine (Show other bugs)
4.0.6
All Linux
unspecified Severity high
: ovirt-4.1.5
: ---
Assigned To: Martin Perina
Jiri Belka
: FutureFeature, Tracking, ZStream
Depends On: RHV_TLS_1_2_SUPPORT 1412552
Blocks:
  Show dependency treegraph
 
Reported: 2017-05-23 10:12 EDT by rhev-integ
Modified: 2017-12-05 13:20 EST (History)
19 users (show)

See Also:
Fixed In Version:
Doc Type: Enhancement
Doc Text:
Previously, Red Hat Virtualization supported TLS version 1.0. From this release, all components can use TLS version 1.2 for encrypted communication, providing that it is used by all components.
Story Points: ---
Clone Of: RHV_TLS_1_2_SUPPORT
Environment:
Last Closed: 2017-08-22 13:42:35 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: Infra
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Knowledge Base (Solution) 2845461 None None None 2017-11-01 12:11 EDT
Red Hat Product Errata RHEA-2017:2509 normal SHIPPED_LIVE Red Hat Virtualization Manager (ovirt-engine) 4.1.5 2017-08-22 17:38:47 EDT

  None (edit)
Description rhev-integ 2017-05-23 10:12:01 EDT
+++ This bug is a downstream clone. The original bug is: +++
+++   bug 1408847 +++
======================================================================

Description of problem:

Currently it appears that VDSM does not support TLSv1.2. Also, other aspects within RHEV should be checked too, e.g. libvirtd, Spice, qemu-kvm. 


Version-Release number of selected component (if applicable):

RHEV 4.x.


How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:


Additional info:

(Originally by Gordon Watson)
Comment 4 rhev-integ 2017-05-23 10:12:24 EDT
The customer needs to implement TLS 1.1+ to be compliant with the payment card industry (PCI).  This post says the date to implement TLS 1.2 support is June 30 2018:

Date Change for Migrating from SSL and Early TLS
https://blog.pcisecuritystandards.org/migrating-from-ssl-and-early-tls

(Originally by Donald Berry)
Comment 6 rhev-integ 2017-05-23 10:12:36 EDT
See also:
https://bugzilla.redhat.com/show_bug.cgi?id=1387996#c7

(Originally by Marina Kalinin)
Comment 16 rhev-integ 2017-05-23 10:13:39 EDT
I tested the support and when updating engine protocol version to TLSv1.2 and applying vdsm patch I see that it is possible to use this version of the protocol.

There are 2 glitches:
- we need to switch to std ssl module as default
- engine using tlsv1 is not able to talk to vdsm with 1.2 set. This is visible as:

2017-01-11 15:37:36,103+01 INFO  [stdout] (SSL Stomp Reactor) SSL Stomp Reactor, READ: TLSv1 Alert, length = 2
2017-01-11 15:37:36,103+01 INFO  [stdout] (SSL Stomp Reactor) SSL Stomp Reactor, RECV TLSv1.2 ALERT:  fatal, protocol_version
2017-01-11 15:37:36,103+01 INFO  [stdout] (SSL Stomp Reactor) SSL Stomp Reactor, fatal: engine already closed.  Rethrowing javax.net.ssl.SSLException: Received fatal alert: protocol_version
2017-01-11 15:37:36,103+01 INFO  [stdout] (SSL Stomp Reactor) SSL Stomp Reactor, fatal: engine already closed.  Rethrowing javax.net.ssl.SSLException: Received fatal alert: protocol_version

(Originally by Piotr Kliczewski)
Comment 17 rhev-integ 2017-05-23 10:13:46 EDT
We have found out that m2crypto library doesn't support TLSv1.2, so in order to support TLSv1.2 as communication protocol in VDSM we have to switch to Python standard SSL library. Because this change requires code changes and extensive testing, I'm targeting this to 4.2. But when patches are ready, we can discuss backports.

(Originally by Martin Perina)
Comment 18 rhev-integ 2017-05-23 10:13:52 EDT
So at the end we have found that setting ssl_version to 'sslv23' in m2crypto allows support for TLSv12 (which is very confusing), so we don't need to switch to standard ssl library. According to this I'm targeting to 4.1.1 to allow us more time to test that change.

(Originally by Martin Perina)
Comment 24 rhev-integ 2017-05-23 10:14:29 EDT
We tested ovirt-imageio, and it is already compliant, allowing TLS 1.1 and 1.2.
See https://gerrit.ovirt.org/76654.

According to https://blog.pcisecuritystandards.org/migrating-from-ssl-and-early-tls
we should not allow TLS v1, but currently we do allow this protocol. We plan to
improve this in 4.2.

We did not test yet glance support. We access glance via curl using defaults, so
I believe it will use the highest protocol supported by the server.

(Originally by Nir Soffer)
Comment 26 Oved Ourfali 2017-07-06 08:04:48 EDT
Moving to modified, as bug 1412552 is now modified as well.
Comment 27 rhev-integ 2017-07-07 08:23:45 EDT
INFO: Bug status wasn't changed from MODIFIED to ON_QA due to the following reason:

[No relevant external trackers attached]

For more info please contact: rhv-devops@redhat.com
Comment 30 Martin Perina 2017-07-23 17:44:58 EDT
Moving to 4.1.5 because of dependent bugs
Comment 34 Jiri Belka 2017-08-16 05:41:38 EDT
ok, vdsm-4.19.28-1.el7ev.x86_64
Comment 36 errata-xmlrpc 2017-08-22 13:42:35 EDT
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHEA-2017:2509

Note You need to log in before you can comment on or make changes to this bug.