Uploaded image for project: 'OpenShift Logging'
  1. OpenShift Logging
  2. LOG-3166

Logfile metrics exporter is accessible over TLS v1.1 with minTLS version set to 1.2.

XMLWordPrintable

    • False
    • Hide

      None

      Show
      None
    • False
    • NEW
    • NEW

      Version of components:

      cluster-logging.v5.6.0

      elasticsearch-operator.v5.6.0

      Server Version: 4.11.0-0.nightly-2022-10-08-131055

      Kubernetes Version: v1.24.0+dc5a2fd

      Description of the problem:

      Logfile metrics exporter with min TLS version set to 1.2 can be connected with TLS v1.1

      Steps to reproduce the issue:

      *Create a cluster logging instance.

      *Check connection to logfile metrics exporter endpoints.

      sh-4.4$ openssl s_client -tls1_1 -CAfile /run/secrets/kubernetes.io/serviceaccount/service-ca.crt -connect collector:2112
      CONNECTED(00000003)
      Can't use SSL_get_servername
      depth=1 CN = openshift-service-serving-signer@1665541076
      verify return:1
      depth=0 CN = collector.openshift-logging.svc
      verify return:1
      ---
      Certificate chain
       0 s:CN = collector.openshift-logging.svc
         i:CN = openshift-service-serving-signer@1665541076
       1 s:CN = openshift-service-serving-signer@1665541076
         i:CN = openshift-service-serving-signer@1665541076
      ---
      Server certificate
      -----BEGIN CERTIFICATE-----
      MIID7TCCAtWgAwIBAgIIPi3AOR6YQqUwDQYJKoZIhvcNAQELBQAwNjE0MDIGA1UE
      Awwrb3BlbnNoaWZ0LXNlcnZpY2Utc2VydmluZy1zaWduZXJAMTY2NTU0MTA3NjAe
      Fw0yMjEwMTIwNDM1MjFaFw0yNDEwMTEwNDM1MjJaMCoxKDAmBgNVBAMTH2NvbGxl
      Y3Rvci5vcGVuc2hpZnQtbG9nZ2luZy5zdmMwggEiMA0GCSqGSIb3DQEBAQUAA4IB
      DwAwggEKAoIBAQDAVzWa/AzK+Mlh+jlFyR94fjxnwTceHstmJyWfNhFmTFxNfJ3j
      1Wn141raJFWL9V1n6HT9XlrYzkBO23A1RsKyS5DSbolhOwLJR+yFzRkcjQrocWaG
      txuBag6ExBV3qqgoqz5ralSrcKTZORGNBm9H3qHexpGBpKBsuNBOvsNm2L0Bjcns
      51djBvH68PXvpTXAGUEAyz5zoNrO/XNsvARZOF8E8ubkX+sNPUF1WuX2El28anPg
      R3Dt2FUhQPhCItGamMFIAIWCSn1eNtSNGObv+u4fKsJPigWwzO4I1cN/IOb/5TzM
      MXdxKlMJY7iwfZfKkNWDqFmBkJWad7LR+OIfAgMBAAGjggEJMIIBBTAOBgNVHQ8B
      Af8EBAMCBaAwEwYDVR0lBAwwCgYIKwYBBQUHAwEwDAYDVR0TAQH/BAIwADAdBgNV
      HQ4EFgQUY9l7o2vDb+CWdcAU3+KiYGxBeSEwHwYDVR0jBBgwFoAUkVeKey9wLEvm
      Kn4NFkvf59e7sMswWQYDVR0RBFIwUIIfY29sbGVjdG9yLm9wZW5zaGlmdC1sb2dn
      aW5nLnN2Y4ItY29sbGVjdG9yLm9wZW5zaGlmdC1sb2dnaW5nLnN2Yy5jbHVzdGVy
      LmxvY2FsMDUGCysGAQQBkggRZAIBBCYTJDdhYjdkMmQ1LTZmMGUtNDNhMC1iYzk4
      LWZlODU5ZGFiNjAxYzANBgkqhkiG9w0BAQsFAAOCAQEAaz1Ci408Ggco9GIL1WMn
      AC26lLWp3Yq0rhJt//lxh9pj0PSm97mb8n85JnNAqkDjUnFOlYhaFTYjO2gArM1D
      WH0McsRhn9t02JACja38W7P/R/jbqfGigudbav/f63v0LDabqldvAorLoDdsChI+
      7Om3VT2jWDxN0XDdq0W5kAT8Q0BTmmCZOtbCDhsysPbYfZdLlWN12xYhqKVgCdry
      2X1JZxPXZdORpMJ3qVveiBv1vmyYozcX7C+ewzdBlYUKgzYLTrzEhyV27RNEwgZR
      eLDv+uuXiSGTypAZXhWptu/ZVHlYIoYacu9QSbkaHkSu0hflGO8OLnJRkAqYj144
      zg==
      -----END CERTIFICATE-----
      subject=CN = collector.openshift-logging.svcissuer=CN = openshift-service-serving-signer@1665541076---
      No client certificate CA names sent
      Peer signing digest: MD5-SHA1
      Peer signature type: RSA
      Server Temp Key: X25519, 253 bits
      ---
      SSL handshake has read 2475 bytes and written 221 bytes
      Verification: OK
      ---
      New, TLSv1.0, Cipher is ECDHE-RSA-AES128-SHA
      Server public key is 2048 bit
      Secure Renegotiation IS supported
      Compression: NONE
      Expansion: NONE
      No ALPN negotiated
      SSL-Session:
          Protocol  : TLSv1.1
          Cipher    : ECDHE-RSA-AES128-SHA
          Session-ID: 2CC85AAC1F58BDBD8360C23C3C0BBE991E35AF055505C6C79B53EA4CC4FDA117
          Session-ID-ctx: 
          Master-Key: 1DD9D244AAD099221DD4477B571D0D234D1E1AA150A58D76201042202AD99BC6B133C1FD03EBC7ABBF7AE7727A215BD7
          PSK identity: None
          PSK identity hint: None
          SRP username: None
          TLS session ticket:
          0000 - 84 e2 cf de b3 09 dd 6b-dc af 20 ef 61 1f c1 9a   .......k.. .a...
          0010 - e9 23 ea 0e eb 35 0d c4-b9 af d3 91 81 75 11 fb   .#...5.......u..
          0020 - d0 42 31 87 1c ef 88 67-c0 51 8d 58 57 4d 4b 64   .B1....g.Q.XWMKd
          0030 - 27 1e f4 26 78 39 f4 fe-ee ce 86 c0 9a 9e e5 78   '..&x9.........x
          0040 - 97 28 4a fe ab af ba a9-c8 2c 1e 1b 55 b9 33 03   .(J......,..U.3.
          0050 - 71 bb 86 d6 a7 6e 44 94-e9 fd f9 b5 f1 0b 32 ca   q....nD.......2.
          0060 - e6 73 da 27 37 d0 f4 b0-2f be b8 6c 0b 15 30 06   .s.'7.../..l..0.
          0070 - 6e 15 b0 e7 d6 c8 af c7-2c 91 c4 07 5e d1 31 10   n.......,...^.1.
          0080 - e1                                                .    Start Time: 1665550748
          Timeout   : 7200 (sec)
          Verify return code: 0 (ok)
          Extended master secret: no
      ---
      
      
      sh-4.4$ openssl s_client -tls1_2 -CAfile /run/secrets/kubernetes.io/serviceaccount/service-ca.crt -connect collector:2112
      CONNECTED(00000003)
      Can't use SSL_get_servername
      depth=1 CN = openshift-service-serving-signer@1665541076
      verify return:1
      depth=0 CN = collector.openshift-logging.svc
      verify return:1
      ---
      Certificate chain
       0 s:CN = collector.openshift-logging.svc
         i:CN = openshift-service-serving-signer@1665541076
       1 s:CN = openshift-service-serving-signer@1665541076
         i:CN = openshift-service-serving-signer@1665541076
      ---
      Server certificate
      -----BEGIN CERTIFICATE-----
      MIID7TCCAtWgAwIBAgIIPi3AOR6YQqUwDQYJKoZIhvcNAQELBQAwNjE0MDIGA1UE
      Awwrb3BlbnNoaWZ0LXNlcnZpY2Utc2VydmluZy1zaWduZXJAMTY2NTU0MTA3NjAe
      Fw0yMjEwMTIwNDM1MjFaFw0yNDEwMTEwNDM1MjJaMCoxKDAmBgNVBAMTH2NvbGxl
      Y3Rvci5vcGVuc2hpZnQtbG9nZ2luZy5zdmMwggEiMA0GCSqGSIb3DQEBAQUAA4IB
      DwAwggEKAoIBAQDAVzWa/AzK+Mlh+jlFyR94fjxnwTceHstmJyWfNhFmTFxNfJ3j
      1Wn141raJFWL9V1n6HT9XlrYzkBO23A1RsKyS5DSbolhOwLJR+yFzRkcjQrocWaG
      txuBag6ExBV3qqgoqz5ralSrcKTZORGNBm9H3qHexpGBpKBsuNBOvsNm2L0Bjcns
      51djBvH68PXvpTXAGUEAyz5zoNrO/XNsvARZOF8E8ubkX+sNPUF1WuX2El28anPg
      R3Dt2FUhQPhCItGamMFIAIWCSn1eNtSNGObv+u4fKsJPigWwzO4I1cN/IOb/5TzM
      MXdxKlMJY7iwfZfKkNWDqFmBkJWad7LR+OIfAgMBAAGjggEJMIIBBTAOBgNVHQ8B
      Af8EBAMCBaAwEwYDVR0lBAwwCgYIKwYBBQUHAwEwDAYDVR0TAQH/BAIwADAdBgNV
      HQ4EFgQUY9l7o2vDb+CWdcAU3+KiYGxBeSEwHwYDVR0jBBgwFoAUkVeKey9wLEvm
      Kn4NFkvf59e7sMswWQYDVR0RBFIwUIIfY29sbGVjdG9yLm9wZW5zaGlmdC1sb2dn
      aW5nLnN2Y4ItY29sbGVjdG9yLm9wZW5zaGlmdC1sb2dnaW5nLnN2Yy5jbHVzdGVy
      LmxvY2FsMDUGCysGAQQBkggRZAIBBCYTJDdhYjdkMmQ1LTZmMGUtNDNhMC1iYzk4
      LWZlODU5ZGFiNjAxYzANBgkqhkiG9w0BAQsFAAOCAQEAaz1Ci408Ggco9GIL1WMn
      AC26lLWp3Yq0rhJt//lxh9pj0PSm97mb8n85JnNAqkDjUnFOlYhaFTYjO2gArM1D
      WH0McsRhn9t02JACja38W7P/R/jbqfGigudbav/f63v0LDabqldvAorLoDdsChI+
      7Om3VT2jWDxN0XDdq0W5kAT8Q0BTmmCZOtbCDhsysPbYfZdLlWN12xYhqKVgCdry
      2X1JZxPXZdORpMJ3qVveiBv1vmyYozcX7C+ewzdBlYUKgzYLTrzEhyV27RNEwgZR
      eLDv+uuXiSGTypAZXhWptu/ZVHlYIoYacu9QSbkaHkSu0hflGO8OLnJRkAqYj144
      zg==
      -----END CERTIFICATE-----
      subject=CN = collector.openshift-logging.svcissuer=CN = openshift-service-serving-signer@1665541076---
      No client certificate CA names sent
      Peer signing digest: SHA256
      Peer signature type: RSA-PSS
      Server Temp Key: X25519, 253 bits
      ---
      SSL handshake has read 2453 bytes and written 285 bytes
      Verification: OK
      ---
      New, TLSv1.2, Cipher is ECDHE-RSA-AES128-GCM-SHA256
      Server public key is 2048 bit
      Secure Renegotiation IS supported
      Compression: NONE
      Expansion: NONE
      No ALPN negotiated
      SSL-Session:
          Protocol  : TLSv1.2
          Cipher    : ECDHE-RSA-AES128-GCM-SHA256
          Session-ID: 52A1E8CB53D1F9708E27A9D94D5F846FCD7402144FDCDD83F470FF5D928BA5B6
          Session-ID-ctx: 
          Master-Key: B2F571A0BAEA64577EBC861F9DF94FD1C3A39008C6A2758325CE35023D414B4C4043BC5016B3C64745A7A705E9B7874D
          PSK identity: None
          PSK identity hint: None
          SRP username: None
          TLS session ticket:
          0000 - 29 a4 27 66 3c 44 36 04-52 38 8e b4 af 7b fb ec   ).'f<D6.R8...{..
          0010 - 7a 59 ae 09 ed 0d 29 1c-a0 b9 7e ae b7 45 f5 0d   zY....)...~..E..
          0020 - 63 28 26 20 6c 6d b0 4d-9b 1c 89 9d 91 a7 8a 0d   c(& lm.M........
          0030 - d4 41 23 8e 2b e2 10 cc-45 5d c4 7f 15 a8 45 22   .A#.+...E]....E"
          0040 - 68 21 fc b2 39 11 c1 46-de 3f 6c e4 e0 ef 3d d9   h!..9..F.?l...=.
          0050 - d4 e4 f6 e8 d8 41 f9 76-ee dc 36 d1 de 71 54 f4   .....A.v..6..qT.
          0060 - df 9d b2 29 40 3f c7 3a-6e 09 05 96 95 e1 e0 2b   ...)@?.:n......+
          0070 - 25 f3 56 0b 14 30 10 c9-ee 47 30 96 2f b8 19 5a   %.V..0...G0./..Z
          0080 - 95                                                .    Start Time: 1665550766
          Timeout   : 7200 (sec)
          Verify return code: 0 (ok)
          Extended master secret: no
      --- 

      Check that we can connect using TLS v1.1 . By default the TLS version must be set accroding to intermediate tlsSecurityProfile with minTLS version 1.2. Also the logfile metrics exporter must comply with the global tlsSecurityProfile set in apiserver/cluster.

              syedriko_sub@redhat.com Sergey Yedrikov
              rhn-support-ikanse Ishwar Kanse
              Ishwar Kanse Ishwar Kanse
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

                Created:
                Updated:
                Resolved: