Bug 1601926 - [RFE] [OVN] TLS/SSL Support
Summary: [RFE] [OVN] TLS/SSL Support
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat OpenStack
Classification: Red Hat
Component: openstack-tripleo-heat-templates
Version: 12.0 (Pike)
Hardware: All
OS: Linux
high
high
Target Milestone: rc
: 16.0 (Train on RHEL 8.1)
Assignee: Kamil Sambor
QA Contact: Luis Tomas Bolivar
URL:
Whiteboard:
Depends On:
Blocks: 1766772
TreeView+ depends on / blocked
 
Reported: 2018-07-17 13:17 UTC by Nir Yechiel
Modified: 2020-02-06 14:39 UTC (History)
17 users (show)

Fixed In Version: openstack-tripleo-heat-templates-11.3.1-0.20191127041628.38ce0a5.el8ost
Doc Type: Enhancement
Doc Text:
Starting with this update, OSP deployments have full encryption between all the OVN services. All OVN clients (ovn-controller, neutron-server and ovn-metadata-agent) now connect to the OVSDB server using Mutual TLS encryption.
Clone Of:
Environment:
Last Closed: 2020-02-06 14:37:23 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
OpenStack gerrit 605406 0 'None' MERGED Configure http/https on OVN Metadata service to talk to Nova 2020-09-22 13:13:26 UTC
OpenStack gerrit 674603 0 'None' MERGED Support connecting OVN DB over SSL 2020-09-22 13:13:26 UTC
OpenStack gerrit 674849 0 'None' MERGED Support connecting OVN DB over SSL 2020-09-22 13:13:26 UTC
OpenStack gerrit 680345 0 'None' MERGED Support connecting OVN DB over SSL 2020-09-22 13:13:29 UTC
OpenStack gerrit 683294 0 'None' MERGED Add posibilities to set ovn_openflow_probe_interval for controller 2020-09-22 13:13:25 UTC
OpenStack gerrit 694614 0 'None' MERGED Fix neutron api TLS issues 2020-09-22 13:13:29 UTC
OpenStack gerrit 694742 0 'None' MERGED [metadata-agent] Fix issue with TLS/SSL connections 2020-09-22 13:13:25 UTC
OpenStack gerrit 694769 0 'None' MERGED Fix neutron api TLS issues 2020-09-22 13:13:25 UTC
Red Hat Product Errata RHEA-2020:0283 0 None None None 2020-02-06 14:39:39 UTC

Description Nir Yechiel 2018-07-17 13:17:42 UTC
Description of problem:

Encryption of internal API traffic has been a very high priority for RHOSP. We have been making steady progress to deliver coverage for all internal services, and need to ensure that OVN is covered as well.

TripleO already has TLS/SSL support for other services and we need to add support with OVN.

Comment 1 Daniel Alvarez Sanchez 2018-09-28 11:00:29 UTC
Looks like first we need to land the patches that allow passing the certificates and SSL support in OVS for HA mode [0].
Once we have this, we need to include support in THT to support it [1] and configure networking-ovn [2] as well as the puppet bits [3].


[0] https://patchwork.ozlabs.org/project/openvswitch/list/?submitter=73281
[1] https://github.com/openstack/tripleo-heat-templates/blob/master/docker/services/pacemaker/ovn-dbs.yaml
[2] https://github.com/openstack/networking-ovn/blob/93834508d1795846ffcda2cc179e8b02ebc8ce85/networking_ovn/common/config.py#L32-#L68
[3] https://github.com/openstack/puppet-ovn/blob/master/manifests/northd.pp#L18
    https://github.com/openstack/puppet-ovn/blob/master/manifests/controller.pp#L80

Comment 2 Daniel Alvarez Sanchez 2018-09-28 11:02:48 UTC
Apart from what I outlined in C1, we need to support TLS connection between OVN Metadata agent and Nova which should be covered by this patch [0].
Perhaps worth opening a new BZ?
[0] https://review.openstack.org/#/c/605406/

Comment 5 Toni Freger 2019-04-16 12:00:26 UTC
Full QE testing cycle is required along with new CI job

Comment 15 Toni Freger 2019-11-17 10:25:04 UTC
Anita, due to OVS verification to OVS2.11, manual regressions and upgrades QE won't be able to start with this feature during OSP16 time frame, please postpone it to next version.

Comment 20 Luis Tomas Bolivar 2019-12-05 11:45:46 UTC
Tested it and all the OVN components are using SSL/TLS

Comment 36 errata-xmlrpc 2020-02-06 14:37:23 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHEA-2020:0283


Note You need to log in before you can comment on or make changes to this bug.