Uploaded image for project: 'OpenShift Bugs'
  1. OpenShift Bugs
  2. OCPBUGS-38345

After upgrade to 4.15 IPSEC is not able to start anymore if crypto policy was changed.

XMLWordPrintable

    • Moderate
    • None
    • False
    • Hide

      None

      Show
      None
    • 09/30 work around is to use DEFAULT policy. KB written

      Description of problem:

      If the crypto policy on RHCOS nodes is set to "FUTURE", ipsec cannot start because of errors like: 

      sh-5.1# journalctl -u ipsec --no-pager |grep ERROR |tail -1
      Aug 12 11:40:17 worker-0.example.com pluto[40873]: "ovn-bd7af8-0-out-1" #255: NSS: ERROR: IPsec certificate CN=openshift-ovn-kubernetes_signer-ca@1723451186 invalid: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. 

      In particular if the policy was changed before an upgrade from 4.14 to 4.15 the IPSec unexpectedly stop to work.

      Version-Release number of selected component (if applicable):

      4.16, 4.15

      How reproducible:

      100% always

      Steps to Reproduce:

      1. Set the crypto policy to "FUTURE" on the RHCOS nodes, for example by running `update-crypto-policies --set FUTURE` and then rebooting the nodes.

      2. Enable IPSec in the cluster in "mode: Full".

      3. IPSec pods are not able to start.

      Actual results:

      After enabling IPsec certificates are not generated or recreated with an accepted signing algorithm causing IPsec to start but not able to sue the certificate. The certificate is signed with "sha512WithRSAEncryption" algorithm.

      Expected results:

      The IPSEC configuration should work since the documentation reports that RHCOS can be hardened as any RHEL machine:

      Additional info:

      This issue was reported by a customer but is also easily reproducible in a lab. Reverting the crypto policy to "DEFAULT" is a tested workaround.

              pepalani@redhat.com Periyasamy Palanisamy
              rhn-support-cpassare Christian Passarelli
              Huiran Wang Huiran Wang
              David Eads
              Votes:
              0 Vote for this issue
              Watchers:
              7 Start watching this issue

                Created:
                Updated: