Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1484404 - fence_drac5 requires specifying custom SSH options to work properly
fence_drac5 requires specifying custom SSH options to work properly
Status: CLOSED CURRENTRELEASE
Product: ovirt-engine
Classification: oVirt
Component: BLL.Infra (Show other bugs)
4.1.5.2
Unspecified Unspecified
high Severity high (vote)
: ovirt-4.1.9
: ---
Assigned To: Eli Mesika
Petr Matyáš
:
Depends On: 1523304 1481280
Blocks:
  Show dependency treegraph
 
Reported: 2017-08-23 09:13 EDT by Petr Matyáš
Modified: 2018-01-28 20:26 EST (History)
9 users (show)

See Also:
Fixed In Version: ovirt-engine-4.1.8.1
Doc Type: Enhancement
Doc Text:
You can now use key=key=value format (where the value of a fence option key is itself in a key=value format) when setting fence agent options, in order to support old drac5 devices that require "ssh_options=-oCiphers=+3des-cbc" in the Options field to enable no-longer-enabled-insecure ciphers for SSH connection.
Story Points: ---
Clone Of: 1481280
Environment:
Last Closed: 2018-01-24 05:40:10 EST
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: Infra
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---
rule-engine: ovirt‑4.1+


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
oVirt gerrit 83685 master MERGED core: allow key=key=val format in PM options 2017-11-14 03:25 EST
oVirt gerrit 84241 ovirt-engine-4.1 MERGED core: allow key=key=val format in PM options 2017-11-20 06:57 EST

  None (edit)
Comment 1 Martin Perina 2017-08-24 02:26:21 EDT
Reducing severity to high as we need to wait if/how underlying RHEL issue is handled. But at the moment we cannot do anything about it
Comment 2 Yaniv Kaul 2017-10-18 13:24:44 EDT
(In reply to Martin Perina from comment #1)
> Reducing severity to high as we need to wait if/how underlying RHEL issue is
> handled. But at the moment we cannot do anything about it

Any updates?
Comment 3 Martin Perina 2017-10-19 04:31:13 EDT
(In reply to Yaniv Kaul from comment #2)
> (In reply to Martin Perina from comment #1)
> > Reducing severity to high as we need to wait if/how underlying RHEL issue is
> > handled. But at the moment we cannot do anything about it
> 
> Any updates?

We can't do anything, platform needs to provide a fix for that (more info in BZ1481280).
Comment 4 Martin Perina 2017-10-27 08:38:24 EDT
So according to platform bug BZ1481280, they will not re-enable no longer secure cipher 3des-cbc, so the only way how to use the cipher is to specify it in additional paramater for fence_drac5 agent using Options field in webadmin:

  ssh_options="-oCiphers=+3des-cbc"

Unfortunately we are not able to enter such value into Options field as it somehow breaks our current validation.
Comment 5 Petr Matyáš 2017-11-27 08:47:31 EST
Using ovirt-engine-4.1.8.1-0.1.el7.noarch and adding ssh_options="-oCiphers=+3des-cbc" still gives me unable to login error
Comment 13 Martin Perina 2018-01-08 10:51:37 EST
Moving back to modified, because we have already provided the infra to be able to set key=key=value into Options field of Fence Agent.

If platform doesn't change the defaults, then users will need to set login_timeout=30 along with ssh_options="-oCiphers=+3des-cbc" into Options field. Otherwise specifying ssh_options is enough
Comment 14 Petr Matyáš 2018-01-16 06:47:13 EST
Verified on ovirt-engine-4.1.9-0.2.el7.noarch

Using these values in options field: ssh_options="-oCiphers=+3des-cbc,login_timeout=30
Comment 15 Sandro Bonazzola 2018-01-24 05:40:10 EST
This bugzilla is included in oVirt 4.1.9 release, published on Jan 24th 2018.

Since the problem described in this bug report should be
resolved in oVirt 4.1.9 release, published on Jan 24th 2018, it has been closed with a resolution of CURRENT RELEASE.

If the solution does not work for you, please open a new bug report.

Note You need to log in before you can comment on or make changes to this bug.