Bug 1997516 - Failed to download metadata for repo 'rhui-codeready-builder-for-rhel-8-x86_64-rhui-debug-rpms' due to SSL certificate algorithm too weak
Summary: Failed to download metadata for repo 'rhui-codeready-builder-for-rhel-8-x86_6...
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Red Hat Update Infrastructure for Cloud Providers
Classification: Red Hat
Component: Security
Version: 2.1.1
Hardware: Unspecified
OS: Unspecified
unspecified
high
Target Milestone: ---
: ---
Assignee: RHUI Bug List
QA Contact: Radek Bíba
URL:
Whiteboard:
Depends On:
Blocks: 2001464
TreeView+ depends on / blocked
 
Reported: 2021-08-25 12:39 UTC by xiyuan
Modified: 2023-09-15 01:14 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
: 2001464 (view as bug list)
Environment:
Last Closed: 2022-02-16 15:25:16 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description xiyuan 2021-08-25 12:39:55 UTC
Description of problem:
Launch a RHEL-8 on GCP, enable FIPS, and try to install packages from the default RHUI.
It always failed due to: Failed to download metadata for repo 'rhui-codeready-builder-for-rhel-8-x86_64-rhui-debug-rpms' as SSL certificate algorithm too weak
Details could be found at: https://mastern-jenkins-csb-openshift-qe.apps.ocp4.prod.psi.redhat.com/job/ocp4-rhel-scaleup-runner/13053/console


Red Hat Update Infrastructure for Cloud Providers
Security
High

How producible:
always

Version-Release number of selected component (if applicable):
Google-rhui-client-rhel8-2.1-1.noarch

Steps to reproduce:
Launch a RHEL-8 on GCP, enable FIPS, try to install packages from the default RHUI

Actual result:
Get available cri-o RPM versions failed, Rhel8 scaleup failed


TASK [openshift_node : Get available cri-o RPM versions] ***********************
Sunday 22 August 2021  14:53:50 +0800 (0:00:00.079)       0:00:05.587 ********* 
fatal: [10.0.128.6]: FAILED! => {"changed": false, "msg": "Failed to download metadata for repo 'rhui-codeready-builder-for-rhel-8-x86_64-rhui-debug-rpms': Cannot prepare internal mirrorlist: Curl error (60): Peer certificate cannot be authenticated with given CA certificates for https://cds.rhel.updates.googlecloud.com/pulp/mirror//content/dist/rhel8/rhui/8/x86_64/codeready-builder/debug [SSL certificate problem: CA signature digest algorithm too weak]", "rc": 1, "results": []}
fatal: [10.0.128.5]: FAILED! => {"changed": false, "msg": "Failed to download metadata for repo 'rhui-codeready-builder-for-rhel-8-x86_64-rhui-debug-rpms': Cannot prepare internal mirrorlist: Curl error (60): Peer certificate cannot be


Expected result:
Get available cri-o RPM versions succeeded without error. Rhel8 scaleup succeeded

Additional info: 
No such issue when fips is disabled.
Strong crypto defaults in RHEL 8 and deprecation of weak crypto algorithms: https://access.redhat.com/articles/3642912

Comment 1 xiyuan 2021-09-02 11:38:05 UTC
Seems it is an upstream issue. Created ticket to google https://issuetracker.google.com/issues/197769045?pli=1 instead.

Comment 3 xiyuan 2021-09-08 03:36:44 UTC
Got feedback from google(seen from https://issuetracker.google.com/issues/197769045?pli=1):
mo...<mo...> #3Sep 7, 2021 05:20PM
Hello,

I will summarize part of the investigation that has been done until today.

Product team has reported that this is currently Work as Intended. RHUI (via Red Hat's implementation) is deployed using a self signed CA for the certificates between the clients and the distribution nodes.

Short term plan is to not change them. These are the certs that RHUI creates and I believe they were sha1 because of RHEL 6. The Red Hat software controlled how they were created.

From FIPS 140-2 Validated documentation: When your clients connect to Google infrastructure, their TLS clients must be configured to require use of secure FIPS-compliant algorithms; if the TLS client and GCP's TLS services agree on an encryption method that is incompatible with FIPS, a non-validated encryption implementation will be used.

There is still an ongoing investigation about this issue and the confirmation of not declaring FIPS compliance at this level. Take into account there is no ETA for updates but we will update it shortly.

Please feel free to add any other questions or information to speed up the resolution of this issue.

Comment 6 Gregg Tanzillo 2022-02-16 15:25:16 UTC
This is has been fixed in RHUI 4.0, which is the current release

Comment 7 Gregg Tanzillo 2022-02-16 15:25:28 UTC
This is has been fixed in RHUI 4.0, which is the current release

Comment 8 Red Hat Bugzilla 2023-09-15 01:14:13 UTC
The needinfo request[s] on this closed bug have been removed as they have been unresolved for 500 days


Note You need to log in before you can comment on or make changes to this bug.