RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1855303 - [RFE] Support for reload of crypto configuration
Summary: [RFE] Support for reload of crypto configuration
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 8
Classification: Red Hat
Component: corosync
Version: 8.3
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: rc
: 8.0
Assignee: Jan Friesse
QA Contact: cluster-qe@redhat.com
URL:
Whiteboard:
Depends On: 1855293 1855301
Blocks: 1856397
TreeView+ depends on / blocked
 
Reported: 2020-07-09 13:54 UTC by Jan Friesse
Modified: 2021-05-18 15:26 UTC (History)
4 users (show)

Fixed In Version: corosync-3.1.0-1.el8
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
: 1856397 (view as bug list)
Environment:
Last Closed: 2021-05-18 15:26:09 UTC
Type: Bug
Target Upstream Version:
Embargoed:
pm-rhel: mirror+


Attachments (Terms of Use)

Description Jan Friesse 2020-07-09 13:54:50 UTC
Description of problem:
Currently it is not possible to change crypto parameters (hash/cipher/key) in runtime. Bug is about adding support for such changes.

Actual results:
not possible to change crypto parameters

Expected results:
It is possible to change crypto parameters

Additional info:
Crypto parameters are changeable during runtime (change config on all nodes and issue corosync-cfgtool -R command on one node). Both nodes must be able to communicate during whole process of changing crypto parameters without any interruption. There should be no membership change, ...

Old corosync version must be able to communicate with new version as long as crypto parameters are equal. 

For QA:
I've tested changing crypto_cipher, crypto_hash and authkey.

Tested following scenarios:
- crypto_hash was changed from sha256 to sha1
- crypto_cipher and crypto_hash from none/none to aes256/sha256
- crypto_cipher and crypto_hash from aes256/sha256 to none/none
- change authkey and reload
- one node using old version was member of cluster without problems
- one node using old version, change crypto parameters on nodes with new version  (old version node created single node membership, other nodes sees each other) and then back to same parameters as used on node with old version (all nodes created new full membership)

Comment 3 Jan Friesse 2020-07-13 14:15:39 UTC
Just to clarify - change of crypto parameters is done by changing corosync.conf (or authkey) - as any other change in corosync.conf (so no extra call is needed). After all nodes has updated corosync.conf (or authkey) on place, then just issue `corosync-cfgtool -R` on one (and only one) of the node - so same as before. Basically this feature just allows changing more options on fly.

Comment 5 Patrik Hagara 2020-10-12 11:02:57 UTC
to be tested together with bz#1855301, which adds config reload support to kronosnet

Comment 9 Jan Friesse 2020-10-15 07:39:07 UTC
@slevine:
One super important thing for you to document. It's going to be in the release notes for upstream but I think we should mention it also in release notes for 8.4 HA.

When user updates corosync (package) and some of the nodes have old version of corosync and some of the nodes have a new version of corosoync and user changes crypto key and/or options and triggers configuration reload then nodes cluster will split into 2 partitions - one with old corosync and one with new corosync.

This is really happening only when some nodes runs old (3.0.3) and some new (3.1.0) version of corosync. So if all nodes runs either new or old corosync it works just fine. Same happens when reload of configuration is triggered but no change in crypto key or options was made.

Chrissie wrote generic and very true warning to corosync man pages:

Running corosync-cfgtool -R where nodes are running different versions
of corosync (including minor versions) is unsupported and may result in undefined
behaviour.

So you may consider adding something similar to our docs too.

Comment 10 Steven J. Levine 2020-10-15 12:10:10 UTC
@jfriesse:

Would this fall into the release note category of "Known Issue"?  If so we can set that as the doc value and this will get put on the release note list.

In the meantime I have added this to the Release Notes section of my 8.4 doc plan:

https://docs.engineering.redhat.com/display/RHELPLAN/Documentation+Plan+for+RHEL+HA+Add-On+for+8.4

Comment 11 Jan Friesse 2020-10-15 12:16:33 UTC
@slevine:
Not really sure. I mean, it is not really "Issue" (= nothing we would like to or could fix). It is how it works. But it it is definitively "heads-up" area.

Comment 12 Steven J. Levine 2020-10-15 14:11:52 UTC
@jfriesse :

Should we mention this feature in general in the 8.4 release notes as a new HA feature?  If so, we can just be sure we include the warning when we note the feature.

My question is whether this is a user-level feature to note.

Comment 13 Jan Friesse 2020-10-15 15:38:22 UTC
@slevine :

You mean ability to reload crypto configuration? Yes, it is definitively big feature so mentioning it in release notes would be very handy. The question how much it is user-level feature is a bit tricky. pcs will be responsible for changing corosync.conf/regenerate authkey/sync, but this wouldn't be possible without corosync support.

So at the end of the day, this feature will allow user to change few more options (crypto cipher/hash and key) at runtime.

Hopefully I've answered your question (if not, then please don't hesitate to ask more ;) )

Comment 19 Patrik Hagara 2020-11-09 11:38:22 UTC
> [root@virt-248 ~]# rpm -q pacemaker libknet1
> pacemaker-2.0.5-2.el8.x86_64
> libknet1-1.18-1.el8.x86_64
> [root@virt-248 ~]# corosync-cfgtool -s
> Printing link status.
> Local node ID 1
> LINK ID 0
>         addr    = 2620:52:0:25a4:1800:ff:fe00:f8
>         status:
>                 nodeid  1:      localhost
>                 nodeid  2:      connected
>                 nodeid  3:      connected
>                 nodeid  4:      connected
>                 nodeid  5:      connected
> [root@virt-248 ~]# corosync-cmapctl totem.crypto_cipher totem.crypto_hash
> totem.crypto_cipher (str) = aes256
> totem.crypto_hash (str) = sha256
> [root@virt-248 ~]# OTHER_NODES="virt-249 virt-250 virt-251 virt-252"


Downgrading from aes256/sha256 to none/none:

> [root@virt-248 ~]# sed -Ei 's/(crypto_hash: ).*/\1none/' /etc/corosync/corosync.conf
> [root@virt-248 ~]# sed -Ei 's/(crypto_cipher: ).*/\1none/' /etc/corosync/corosync.conf
> [root@virt-248 ~]# for node in $OTHER_NODES; do scp /etc/corosync/corosync.conf $node:/etc/corosync/; done
> corosync.conf                                                                                         100%  733     1.2MB/s   00:00
> corosync.conf                                                                                         100%  733     1.1MB/s   00:00
> corosync.conf                                                                                         100%  733   909.3KB/s   00:00
> corosync.conf                                                                                         100%  733     1.1MB/s   00:00
> [root@virt-248 ~]# corosync-cfgtool -R
> Reloading corosync.conf...
> Done
> [root@virt-248 ~]# tail -f /var/log/cluster/corosync.log
> Nov 09 11:37:23 [50162] virt-248 corosync notice  [CFG   ] Config reload requested by node 1
> Nov 09 11:37:23 [50162] virt-248 corosync info    [TOTEM ] Configuring link 0
> Nov 09 11:37:23 [50162] virt-248 corosync info    [TOTEM ] Configured link number 0: local addr: 2620:52:0:25a4:1800:ff:fe00:f8, port=5405
> Nov 09 11:37:23 [50162] virt-248 corosync info    [TOTEM ] kronosnet crypto reconfigured on index 2: nss/none/none
> Nov 09 11:37:23 [50162] virt-248 corosync error   [KNET  ] nsscrypto: Digest does not match
> Nov 09 11:37:23 [50162] virt-248 corosync error   [KNET  ] nsscrypto: Digest does not match
> Nov 09 11:37:23 [50162] virt-248 corosync error   [KNET  ] nsscrypto: Digest does not match
> Nov 09 11:37:23 [50162] virt-248 corosync error   [KNET  ] nsscrypto: Digest does not match
> Nov 09 11:37:23 [50162] virt-248 corosync error   [KNET  ] nsscrypto: Digest does not match
> Nov 09 11:37:23 [50162] virt-248 corosync error   [KNET  ] nsscrypto: Digest does not match
> Nov 09 11:37:23 [50162] virt-248 corosync error   [KNET  ] nsscrypto: Digest does not match
> Nov 09 11:37:23 [50162] virt-248 corosync info    [KNET  ] pmtud: PMTUD link change for host: 5 link: 0 from 1381 to 1426
> Nov 09 11:37:23 [50162] virt-248 corosync info    [KNET  ] pmtud: PMTUD link change for host: 4 link: 0 from 1381 to 1426
> Nov 09 11:37:23 [50162] virt-248 corosync info    [KNET  ] pmtud: PMTUD link change for host: 3 link: 0 from 1381 to 1426
> Nov 09 11:37:23 [50162] virt-248 corosync info    [KNET  ] pmtud: PMTUD link change for host: 2 link: 0 from 1381 to 1426
> Nov 09 11:37:23 [50162] virt-248 corosync info    [KNET  ] pmtud: Global data MTU changed to: 1426

Knet crypto successfully disabled, cluster communication resumes, no fencing, all nodes report active connection to all others (`corosync-cfgtool -s`, left out for the sake of brevity) with the desired crypto config (`corosync-cmapctl totem.crypto_cipher totem.crypto_hash`, left out for the sake of brevity).


Upgrading from none/none to aes128/sha1:

> [root@virt-248 ~]# sed -Ei 's/(crypto_cipher: ).*/\1aes128/' /etc/corosync/corosync.conf
> [root@virt-248 ~]# sed -Ei 's/(crypto_hash: ).*/\1sha1/' /etc/corosync/corosync.conf
> [root@virt-248 ~]# for node in $OTHER_NODES; do scp /etc/corosync/corosync.conf $node:/etc/corosync/; done
> corosync.conf                                                                                         100%  735   758.2KB/s   00:00
> corosync.conf                                                                                         100%  735   742.1KB/s   00:00
> corosync.conf                                                                                         100%  735   703.7KB/s   00:00
> corosync.conf                                                                                         100%  735   799.9KB/s   00:00
> [root@virt-248 ~]# corosync-cfgtool -R
> Reloading corosync.conf...
> Done
> [root@virt-248 ~]# tail -f /var/log/cluster/corosync.log
> Nov 09 11:41:35 [50162] virt-248 corosync notice  [CFG   ] Config reload requested by node 1
> Nov 09 11:41:35 [50162] virt-248 corosync info    [TOTEM ] Configuring link 0
> Nov 09 11:41:35 [50162] virt-248 corosync info    [TOTEM ] Configured link number 0: local addr: 2620:52:0:25a4:1800:ff:fe00:f8, port=5405
> Nov 09 11:41:35 [50162] virt-248 corosync info    [TOTEM ] kronosnet crypto reconfigured on index 1: nss/aes128/sha1
> Nov 09 11:41:35 [50162] virt-248 corosync error   [KNET  ] nsscrypto: Digest does not match
> Nov 09 11:41:35 [50162] virt-248 corosync error   [KNET  ] nsscrypto: Digest does not match
> Nov 09 11:41:36 [50162] virt-248 corosync info    [KNET  ] pmtud: PMTUD link change for host: 5 link: 0 from 1426 to 1381
> Nov 09 11:41:36 [50162] virt-248 corosync info    [KNET  ] pmtud: PMTUD link change for host: 4 link: 0 from 1426 to 1381
> Nov 09 11:41:36 [50162] virt-248 corosync info    [KNET  ] pmtud: PMTUD link change for host: 3 link: 0 from 1426 to 1381
> Nov 09 11:41:36 [50162] virt-248 corosync info    [KNET  ] pmtud: PMTUD link change for host: 2 link: 0 from 1426 to 1381
> Nov 09 11:41:36 [50162] virt-248 corosync info    [KNET  ] pmtud: Global data MTU changed to: 1381

Knet crypto successfully enabled, cluster communication resumes, no fencing, all nodes report active connection to all others (`corosync-cfgtool -s`, left out for the sake of brevity) with the desired crypto config (`corosync-cmapctl totem.crypto_cipher totem.crypto_hash`, left out for the sake of brevity).


Upgrading from aes128/sha1 to aes256/sha512:

> [root@virt-248 ~]# sed -Ei 's/(crypto_hash: ).*/\1sha512/' /etc/corosync/corosync.conf
> [root@virt-248 ~]# sed -Ei 's/(crypto_cipher: ).*/\1aes256/' /etc/corosync/corosync.conf
> [root@virt-248 ~]# for node in $OTHER_NODES; do scp /etc/corosync/corosync.conf $node:/etc/corosync/; done
> corosync.conf                                                                                         100%  737     1.2MB/s   00:00
> corosync.conf                                                                                         100%  737     1.3MB/s   00:00
> corosync.conf                                                                                         100%  737     1.3MB/s   00:00
> corosync.conf                                                                                         100%  737     1.0MB/s   00:00
> [root@virt-248 ~]# corosync-cfgtool -R
> Reloading corosync.conf...
> Done
> [root@virt-248 ~]# tail -f /var/log/cluster/corosync.log
> Nov 09 11:53:19 [50162] virt-248 corosync notice  [CFG   ] Config reload requested by node 1
> Nov 09 11:53:19 [50162] virt-248 corosync info    [TOTEM ] Configuring link 0
> Nov 09 11:53:19 [50162] virt-248 corosync info    [TOTEM ] Configured link number 0: local addr: 2620:52:0:25a4:1800:ff:fe00:f8, port=5405
> Nov 09 11:53:19 [50162] virt-248 corosync info    [TOTEM ] kronosnet crypto reconfigured on index 2: nss/aes256/sha512
> Nov 09 11:53:19 [50162] virt-248 corosync info    [KNET  ] pmtud: PMTUD link change for host: 5 link: 0 from 1381 to 1333
> Nov 09 11:53:19 [50162] virt-248 corosync info    [KNET  ] pmtud: PMTUD link change for host: 4 link: 0 from 1381 to 1333
> Nov 09 11:53:19 [50162] virt-248 corosync info    [KNET  ] pmtud: PMTUD link change for host: 3 link: 0 from 1381 to 1333
> Nov 09 11:53:19 [50162] virt-248 corosync info    [KNET  ] pmtud: PMTUD link change for host: 2 link: 0 from 1381 to 1333
> Nov 09 11:53:19 [50162] virt-248 corosync info    [KNET  ] pmtud: Global data MTU changed to: 1333

Knet crypto successfully upgraded, cluster communication resumes, no fencing, all nodes report active connection to all others (`corosync-cfgtool -s`, left out for the sake of brevity) with the desired crypto config (`corosync-cmapctl totem.crypto_cipher totem.crypto_hash`, left out for the sake of brevity).


Changing authkey:

> [root@virt-248 ~]# corosync-keygen
> Corosync Cluster Engine Authentication key generator.
> Gathering 2048 bits for key from /dev/urandom.
> Writing corosync key to /etc/corosync/authkey.
> [root@virt-248 ~]# for node in $OTHER_NODES; do scp /etc/corosync/authkey $node:/etc/corosync/; done
> authkey                                                                                               100%  256   443.3KB/s   00:00
> authkey                                                                                               100%  256   464.2KB/s   00:00
> authkey                                                                                               100%  256   427.8KB/s   00:00
> authkey                                                                                               100%  256   387.0KB/s   00:00
> [root@virt-248 ~]# corosync-cfgtool -R
> Reloading corosync.conf...
> Done
> [root@virt-248 ~]# tail -f /var/log/cluster/corosync.log
> Nov 09 11:57:11 [50162] virt-248 corosync notice  [CFG   ] Config reload requested by node 1
> Nov 09 11:57:11 [50162] virt-248 corosync info    [TOTEM ] Configuring link 0
> Nov 09 11:57:11 [50162] virt-248 corosync info    [TOTEM ] Configured link number 0: local addr: 2620:52:0:25a4:1800:ff:fe00:f8, port=5405
> Nov 09 11:57:11 [50162] virt-248 corosync info    [TOTEM ] kronosnet crypto reconfigured on index 1: nss/aes256/sha512
> Nov 09 11:57:11 [50162] virt-248 corosync info    [KNET  ] pmtud: Global data MTU changed to: 1333

Cluster authkey seems to have been successfully changed, cluster communication resumes, no fencing, all nodes report active connection to all others (`corosync-cfgtool -s`, left out for the sake of brevity).

Verify that the authkey actually does get changed by using a different one on one of the nodes:

> [root@virt-249 ~]# corosync-keygen
> [root@virt-248 ~]# corosync-cfgtool -R
> Reloading corosync.conf...
> Done
> [root@virt-248 ~]# tail -f /var/log/cluster/corosync.log
> Nov 09 12:00:33 [50162] virt-248 corosync notice  [CFG   ] Config reload requested by node 1
> Nov 09 12:00:33 [50162] virt-248 corosync info    [TOTEM ] Configuring link 0
> Nov 09 12:00:33 [50162] virt-248 corosync info    [TOTEM ] Configured link number 0: local addr: 2620:52:0:25a4:1800:ff:fe00:f8, port=5405
> Nov 09 12:00:34 [50162] virt-248 corosync error   [KNET  ] nsscrypto: Digest does not match
> Nov 09 12:00:34 [50162] virt-248 corosync error   [KNET  ] nsscrypto: Digest does not match
> Nov 09 12:00:35 [50162] virt-248 corosync error   [KNET  ] nsscrypto: Digest does not match
> Nov 09 12:00:36 [50162] virt-248 corosync info    [KNET  ] link: host: 2 link: 0 is down
> Nov 09 12:00:36 [50162] virt-248 corosync info    [KNET  ] host: host: 2 (passive) best link: 0 (pri: 1)
> Nov 09 12:00:36 [50162] virt-248 corosync warning [KNET  ] host: host: 2 has no active links
> Nov 09 12:00:36 [50162] virt-248 corosync error   [KNET  ] nsscrypto: Digest does not match
> Nov 09 12:00:37 [50162] virt-248 corosync error   [KNET  ] nsscrypto: Digest does not match
> Nov 09 12:00:37 [50162] virt-248 corosync notice  [TOTEM ] Token has not been received in 3730 ms
> Nov 09 12:00:37 [50162] virt-248 corosync error   [KNET  ] nsscrypto: Digest does not match
> Nov 09 12:00:38 [50162] virt-248 corosync error   [KNET  ] nsscrypto: Digest does not match
> Nov 09 12:00:39 [50162] virt-248 corosync error   [KNET  ] nsscrypto: Digest does not match
> Nov 09 12:00:39 [50162] virt-248 corosync error   [KNET  ] nsscrypto: Digest does not match
> Nov 09 12:00:40 [50162] virt-248 corosync error   [KNET  ] nsscrypto: Digest does not match
> Nov 09 12:00:41 [50162] virt-248 corosync error   [KNET  ] nsscrypto: Digest does not match
> Nov 09 12:00:41 [50162] virt-248 corosync error   [KNET  ] nsscrypto: Digest does not match
> Nov 09 12:00:42 [50162] virt-248 corosync error   [KNET  ] nsscrypto: Digest does not match
> Nov 09 12:00:43 [50162] virt-248 corosync error   [KNET  ] nsscrypto: Digest does not match
> Nov 09 12:00:44 [50162] virt-248 corosync error   [KNET  ] nsscrypto: Digest does not match
> Nov 09 12:00:44 [50162] virt-248 corosync notice  [QUORUM] Sync members[4]: 1 3 4 5
> Nov 09 12:00:44 [50162] virt-248 corosync notice  [QUORUM] Sync left[1]: 2
> Nov 09 12:00:44 [50162] virt-248 corosync notice  [TOTEM ] A new membership (1.11) was formed. Members left: 2
> Nov 09 12:00:44 [50162] virt-248 corosync notice  [TOTEM ] Failed to receive the leave message. failed: 2
> Nov 09 12:00:44 [50162] virt-248 corosync notice  [QUORUM] Members[4]: 1 3 4 5
> Nov 09 12:00:44 [50162] virt-248 corosync notice  [MAIN  ] Completed service synchronization, ready to provide service.

The node fails to properly communicate after config reload and gets fenced as a result, which indicates that the authkey does indeed get changed/reloaded properly.


Backwards compatibility was also tested, old and new corosync/knet versions with the same totem.crypto_{cipher,hash} config are able to start, communicate and cleanly shut down without issues:

> [root@virt-248 ~]# for node in $NODES; do echo $node; ssh $node rpm -q corosync libknet1; ssh $node corosync-cfgtool -s; ssh $node corosync-cmapctl totem.crypto_cipher totem.crypto_hash; done
> virt-248
> corosync-3.1.0-1.el8.x86_64
> libknet1-1.18-1.el8.x86_64               
> Printing link status.                    
> Local node ID 1                          
> LINK ID 0                                
>         addr    = 2620:52:0:25a4:1800:ff:fe00:f8
>         status:                   
>                 nodeid  1:      localhost
>                 nodeid  2:      connected
>                 nodeid  3:      connected
>                 nodeid  4:      connected
>                 nodeid  5:      connected
> totem.crypto_cipher (str) = aes256
> totem.crypto_hash (str) = sha512
> virt-249
> corosync-3.0.3-4.el8.x86_64
> libknet1-1.16-1.el8.x86_64
> Printing link status.
> Local node ID 2
> LINK ID 0
>         addr    = 2620:52:0:25a4:1800:ff:fe00:f9
>         status:
>                 nodeid  1:      link enabled:1  link connected:1
>                 nodeid  2:      link enabled:1  link connected:1
>                 nodeid  3:      link enabled:1  link connected:1
>                 nodeid  4:      link enabled:1  link connected:1
>                 nodeid  5:      link enabled:1  link connected:1
> totem.crypto_cipher (str) = aes256
> totem.crypto_hash (str) = sha512
> virt-250
> corosync-3.1.0-1.el8.x86_64
> libknet1-1.18-1.el8.x86_64
> Printing link status.
> Local node ID 3
> LINK ID 0
>         addr    = 2620:52:0:25a4:1800:ff:fe00:fa
>         status:
>                 nodeid  1:      connected
>                 nodeid  2:      connected
>                 nodeid  3:      localhost
>                 nodeid  4:      connected
>                 nodeid  5:      connected
> totem.crypto_cipher (str) = aes256
> totem.crypto_hash (str) = sha512
> virt-251
> corosync-3.1.0-1.el8.x86_64
> libknet1-1.18-1.el8.x86_64
> Printing link status.
> Local node ID 4
> LINK ID 0
>         addr    = 2620:52:0:25a4:1800:ff:fe00:fb
>         status:
>                 nodeid  1:      connected
>                 nodeid  2:      connected
>                 nodeid  3:      connected
>                 nodeid  4:      localhost
>                 nodeid  5:      connected
> totem.crypto_cipher (str) = aes256
> totem.crypto_hash (str) = sha512
> virt-252
> corosync-3.1.0-1.el8.x86_64
> libknet1-1.18-1.el8.x86_64
> Printing link status.
> Local node ID 5
> LINK ID 0
>         addr    = 2620:52:0:25a4:1800:ff:fe00:fc
>         status:
>                 nodeid  1:      connected
>                 nodeid  2:      connected
>                 nodeid  3:      connected
>                 nodeid  4:      connected
>                 nodeid  5:      localhost
> totem.crypto_cipher (str) = aes256
> totem.crypto_hash (str) = sha512


Changing cluster configuration during an upgrade procedure is not supported and hence crypto reconfiguration between old and new corosync/knet versions was not tested.

Moving to verified.

Comment 23 errata-xmlrpc 2021-05-18 15:26:09 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (corosync bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2021:1780


Note You need to log in before you can comment on or make changes to this bug.