RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 2134906 - sos report --clean does not obfuscate IPv6 addresses
Summary: sos report --clean does not obfuscate IPv6 addresses
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Red Hat Enterprise Linux 8
Classification: Red Hat
Component: sos
Version: 8.6
Hardware: Unspecified
OS: Linux
high
high
Target Milestone: rc
: ---
Assignee: Pavel Moravec
QA Contact: Supportability QE
Jana Heves
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2022-10-14 16:11 UTC by Kevin Clevenger
Modified: 2023-03-16 21:35 UTC (History)
7 users (show)

Fixed In Version: sos-4.4-4.bz2134906.el8_7
Doc Type: Enhancement
Doc Text:
.The `sos clean` command now obfuscates IPv6 addresses Previously, the `sos clean` command did not obfuscate IPv6 addresses, leaving some customer-sensitive data in the collected `sos` report. With this update, `sos clean` detects and obfuscates IPv6 addresses as expected.
Clone Of:
Environment:
Last Closed: 2023-03-16 21:35:44 UTC
Type: Bug
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github sosreport sos pull 3060 0 None open [cleaner,ipv6] Add support for IPv6 obfuscation 2022-11-12 12:32:22 UTC
Red Hat Issue Tracker RHELPLAN-136582 0 None None None 2022-10-14 16:29:21 UTC

Description Kevin Clevenger 2022-10-14 16:11:28 UTC
Description of problem:

sos report --clean does not yet obfuscate IPv6 addresses

Version-Release number of selected component (if applicable):

4.2-20.el8_6

How reproducible:

run 'sos report --clean'

Actual results:

IPv6 addresses are not obfuscated

Expected results:

IPv6 addresses are obfuscated

Additional info:

Upstream open issue https://github.com/sosreport/sos/issues/3008

System:
2: enp1s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether 52:54:00:a2:c4:fc brd ff:ff:ff:ff:ff:ff
    inet 192.168.1.211/24 brd 192.168.1.255 scope global dynamic noprefixroute enp1s0
       valid_lft 66149sec preferred_lft 66149sec
    inet6 fe80::5054:ff:fea2:c4fc/64 scope link
       valid_lft forever preferred_lft forever
8: podman1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
    link/ether 9a:4d:52:c0:de:e9 brd ff:ff:ff:ff:ff:ff
    inet 10.89.0.1/24 brd 10.89.0.255 scope global podman1
       valid_lft forever preferred_lft forever
    inet6 fe80::7439:b1ff:fed4:dce0/64 scope link
       valid_lft forever preferred_lft forever

Sos:
2: enp1s0    inet 100.0.0.1/24 brd 100.0.0.255 scope global dynamic noprefixroute enp1s0
       valid_lft 66448sec preferred_lft 66448sec
2: enp1s0    inet6 fe80::5054:ff:fea2:c4fc/64 scope link 
       valid_lft forever preferred_lft forever
8: podman1    inet 101.0.0.1/24 brd 101.0.0.255 scope global podman1
       valid_lft forever preferred_lft forever
8: podman1    inet6 fe80::7439:b1ff:fed4:dce0/64 scope link 
       valid_lft forever preferred_lft forever

Comment 8 Pavel Moravec 2023-03-16 21:35:44 UTC
Closing the bugzilla as the fix has been delivered in sos-4.5.0-1.el8 released via https://access.redhat.com/errata/RHBA-2023:1300 errata.


Note You need to log in before you can comment on or make changes to this bug.