Bug 1454827 - [downstream clone - 4.1.5] [RFE][Tracker] Requesting testing of support for TLSv1.2
Summary: [downstream clone - 4.1.5] [RFE][Tracker] Requesting testing of support for T...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Virtualization Manager
Classification: Red Hat
Component: ovirt-engine
Version: 4.0.6
Hardware: All
OS: Linux
unspecified
high
Target Milestone: ovirt-4.1.5
: ---
Assignee: Martin Perina
QA Contact: Jiri Belka
URL:
Whiteboard:
Depends On: RHV_TLS_1_2_SUPPORT 1412552
Blocks:
TreeView+ depends on / blocked
 
Reported: 2017-05-23 14:12 UTC by rhev-integ
Modified: 2021-09-09 12:19 UTC (History)
18 users (show)

Fixed In Version:
Doc Type: Enhancement
Doc Text:
Previously, Red Hat Virtualization supported TLS version 1.0. From this release, all components can use TLS version 1.2 for encrypted communication, providing that it is used by all components.
Clone Of: RHV_TLS_1_2_SUPPORT
Environment:
Last Closed: 2017-08-22 17:42:35 UTC
oVirt Team: Infra
Target Upstream Version:
Embargoed:
lsvaty: testing_plan_complete-


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker RHV-36193 0 None None None 2021-08-30 12:33:21 UTC
Red Hat Knowledge Base (Solution) 2845461 0 None None None 2017-11-01 16:11:33 UTC
Red Hat Product Errata RHEA-2017:2509 0 normal SHIPPED_LIVE Red Hat Virtualization Manager (ovirt-engine) 4.1.5 2017-08-22 21:38:47 UTC

Description rhev-integ 2017-05-23 14:12:01 UTC
+++ This bug is a downstream clone. The original bug is: +++
+++   bug 1408847 +++
======================================================================

Description of problem:

Currently it appears that VDSM does not support TLSv1.2. Also, other aspects within RHEV should be checked too, e.g. libvirtd, Spice, qemu-kvm. 


Version-Release number of selected component (if applicable):

RHEV 4.x.


How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:


Additional info:

(Originally by Gordon Watson)

Comment 4 rhev-integ 2017-05-23 14:12:24 UTC
The customer needs to implement TLS 1.1+ to be compliant with the payment card industry (PCI).  This post says the date to implement TLS 1.2 support is June 30 2018:

Date Change for Migrating from SSL and Early TLS
https://blog.pcisecuritystandards.org/migrating-from-ssl-and-early-tls

(Originally by Donald Berry)

Comment 6 rhev-integ 2017-05-23 14:12:36 UTC
See also:
https://bugzilla.redhat.com/show_bug.cgi?id=1387996#c7

(Originally by Marina Kalinin)

Comment 16 rhev-integ 2017-05-23 14:13:39 UTC
I tested the support and when updating engine protocol version to TLSv1.2 and applying vdsm patch I see that it is possible to use this version of the protocol.

There are 2 glitches:
- we need to switch to std ssl module as default
- engine using tlsv1 is not able to talk to vdsm with 1.2 set. This is visible as:

2017-01-11 15:37:36,103+01 INFO  [stdout] (SSL Stomp Reactor) SSL Stomp Reactor, READ: TLSv1 Alert, length = 2
2017-01-11 15:37:36,103+01 INFO  [stdout] (SSL Stomp Reactor) SSL Stomp Reactor, RECV TLSv1.2 ALERT:  fatal, protocol_version
2017-01-11 15:37:36,103+01 INFO  [stdout] (SSL Stomp Reactor) SSL Stomp Reactor, fatal: engine already closed.  Rethrowing javax.net.ssl.SSLException: Received fatal alert: protocol_version
2017-01-11 15:37:36,103+01 INFO  [stdout] (SSL Stomp Reactor) SSL Stomp Reactor, fatal: engine already closed.  Rethrowing javax.net.ssl.SSLException: Received fatal alert: protocol_version

(Originally by Piotr Kliczewski)

Comment 17 rhev-integ 2017-05-23 14:13:46 UTC
We have found out that m2crypto library doesn't support TLSv1.2, so in order to support TLSv1.2 as communication protocol in VDSM we have to switch to Python standard SSL library. Because this change requires code changes and extensive testing, I'm targeting this to 4.2. But when patches are ready, we can discuss backports.

(Originally by Martin Perina)

Comment 18 rhev-integ 2017-05-23 14:13:52 UTC
So at the end we have found that setting ssl_version to 'sslv23' in m2crypto allows support for TLSv12 (which is very confusing), so we don't need to switch to standard ssl library. According to this I'm targeting to 4.1.1 to allow us more time to test that change.

(Originally by Martin Perina)

Comment 24 rhev-integ 2017-05-23 14:14:29 UTC
We tested ovirt-imageio, and it is already compliant, allowing TLS 1.1 and 1.2.
See https://gerrit.ovirt.org/76654.

According to https://blog.pcisecuritystandards.org/migrating-from-ssl-and-early-tls
we should not allow TLS v1, but currently we do allow this protocol. We plan to
improve this in 4.2.

We did not test yet glance support. We access glance via curl using defaults, so
I believe it will use the highest protocol supported by the server.

(Originally by Nir Soffer)

Comment 26 Oved Ourfali 2017-07-06 12:04:48 UTC
Moving to modified, as bug 1412552 is now modified as well.

Comment 27 rhev-integ 2017-07-07 12:23:45 UTC
INFO: Bug status wasn't changed from MODIFIED to ON_QA due to the following reason:

[No relevant external trackers attached]

For more info please contact: rhv-devops

Comment 30 Martin Perina 2017-07-23 21:44:58 UTC
Moving to 4.1.5 because of dependent bugs

Comment 34 Jiri Belka 2017-08-16 09:41:38 UTC
ok, vdsm-4.19.28-1.el7ev.x86_64

Comment 36 errata-xmlrpc 2017-08-22 17:42:35 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHEA-2017:2509


Note You need to log in before you can comment on or make changes to this bug.