Bug 1679841 - Diffie-Hellman keysize < 2048 in logging-es
Summary: Diffie-Hellman keysize < 2048 in logging-es
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: OpenShift Container Platform
Classification: Red Hat
Component: Logging
Version: 3.9.0
Hardware: Unspecified
OS: Unspecified
unspecified
high
Target Milestone: ---
: 3.9.z
Assignee: Rich Megginson
QA Contact: Anping Li
URL:
Whiteboard:
Depends On:
Blocks: 1685655 1686140
TreeView+ depends on / blocked
 
Reported: 2019-02-22 02:01 UTC by sfu@redhat.com
Modified: 2019-04-09 14:20 UTC (History)
5 users (show)

Fixed In Version: openshift3/logging-elasticsearch:v3.9.73-1
Doc Type: Bug Fix
Doc Text:
Cause: The SSL/TLS service uses Diffie-Hellman groups with insufficient strength (key size < 2048) Consequence: The keys are more vulnerable Fix: Increase the key strength Result: The certificates are more secure
Clone Of:
: 1685655 (view as bug list)
Environment:
Last Closed: 2019-04-09 14:20:18 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github openshift origin-aggregated-logging pull 1553 0 None None None 2019-03-11 15:48:54 UTC
Red Hat Product Errata RHBA-2019:0619 0 None None None 2019-04-09 14:20:27 UTC

Description sfu@redhat.com 2019-02-22 02:01:53 UTC
Description of problem:

SSL/TLS: Diffie-Hellman Key Exchange Insufficient DH Group Strength Vulnerability
The SSL/TLS service uses Diffie-Hellman groups with insufficient strength (key size < 2048).


Version-Release number of selected component (if applicable):
OCP version 3.9.51
ES image version 3.9.43


How reproducible:
Customer using Vulnerability scanning tool to get this issue report

Steps to Reproduce:
in ES 3.9 image,it doesn't contains openssl command,cannot sure the keysize length,but in 3.11 it seems the default keysize is already 2048bit:

===================================================================
sh-4.2$ openssl s_client -connect www.example.com:443 -cipher "EDH" | grep "Server Temp Key"
depth=2 C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root CA
verify return:1
depth=1 C = US, O = DigiCert Inc, CN = DigiCert SHA2 Secure Server CA
verify return:1
depth=0 C = US, ST = California, L = Los Angeles, O = Internet Corporation for Assigned Names and Numbers, OU = Technology, CN = www.example.org
verify return:1
Server Temp Key: DH, 2048 bits

sh-4.2$ rpm -qa |grep openssl
openssl-1.0.2k-12.el7.x86_64
openssl-libs-1.0.2k-12.el7.x86_64
===================================================================

Comment 8 Anping Li 2019-03-25 09:43:59 UTC
Verified the fix is in elasticsearch:v3.9.74

Comment 10 errata-xmlrpc 2019-04-09 14:20:18 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2019:0619


Note You need to log in before you can comment on or make changes to this bug.