Bug 1814390 - Clusters upgraded to 4.3.5 may require manual service CA rotation
Summary: Clusters upgraded to 4.3.5 may require manual service CA rotation
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: OpenShift Container Platform
Classification: Red Hat
Component: service-ca
Version: 4.3.z
Hardware: Unspecified
OS: Unspecified
unspecified
urgent
Target Milestone: ---
: ---
Assignee: Maru Newby
QA Contact: Wei Sun
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2020-03-17 18:32 UTC by Maru Newby
Modified: 2020-03-27 07:13 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
: 1814747 1815604 (view as bug list)
Environment:
Last Closed: 2020-03-24 00:40:31 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Bugzilla 1810036 0 urgent CLOSED "You are attempting to import a cert with the same issuer/serial as an existing cert, but that is not the same cert" aft... 2023-09-07 22:11:27 UTC

Description Maru Newby 2020-03-17 18:32:47 UTC
Automated service ca rotation was initially released without a guarantee of a unique ca serial number due to the library code used to generate CAs using a fixed value. The lack of a unique serial number resulted in a broken chain of trust for non-golang clients such as curl [1].

If a cluster has been upgraded to a release supporting automated CA rotation but without the fix to ensure unique CA serials, the resulting CA configuration will break non-golang clients (e.g. curl) due to the chain of trust containing more than one certificate for the same issuer and serial. Fixing this CA configuration automatically will not be possible due to the requirement to restart affected services, so manual cert rotation [1] is likely the best option.

1: https://bugzilla.redhat.com/show_bug.cgi?id=1810036

Comment 2 Maru Newby 2020-03-20 16:53:53 UTC
Note that there is no work to be done on this BZ. It is intended to be the canonical BZ for reports of TLS validation errors caused by upgrading to 4.3.5 and 4.2.22. The fix is manual rotation.

Comment 3 Maru Newby 2020-03-20 17:01:36 UTC
Updating to indicate the affected release is 4.3.0, since this issue should only exhibit on 4.3.5. Again, no target release since we're not targeting a fix.

Comment 4 Maru Newby 2020-03-24 00:40:31 UTC
Closing since the issue is not actionable.


Note You need to log in before you can comment on or make changes to this bug.