On Mon, Feb 4, 2019 at 1:21 PM Yedidyah Bar David <[email protected]> wrote:
>
> On Wed, Jan 30, 2019 at 10:28 PM Chris Adams <[email protected]> wrote:
> >
> > Digging a little deeper... if I add the Let's Encrypt CA to
> > /etc/pki/ovirt-engine/.truststore, imageio-proxy works (I can
> > successfully upload an ISO), so I guess the issue is that imageio-proxy
> > uses the same cert for web and engine communication and the engine
> > wasn't happy with the public-CA-signed cert.
>
> I think I agree with your analysis.
>
> I now reproduced this on a test env.
>
> I started with ovirt-system-tests basic suite deploy, made sure I
> can upload an image.
>
> Then I followed the docs about replacing certs, using a temporarily-
> created CA for testing (using openssl, actually using a copy of the
> engine's pki scripts), including adding 99-custom-truststore.conf,
> imported the CA's cert to the browser, and:
>
> 1. Connecting with the browser worked, all is green.
>
> 2. Logged in, pressed "Disks -> Upload -> Start -> Test Connection",
> and it failed.
>
> 3. Edited the ovirt-imageio-proxy conf to point key and cert to a
> key and cert I created and signed using my temp ca, restarted it,
> "Test Connection" worked.
>
> 4. Actually uploading the image failed as you describe.
>
> 5. Imported my CA's cert to /etc/pki/ovirt-engine/.truststore,
> using:
>
> keytool -importcert -trustcacerts -keystore
> /etc/pki/ovirt-engine/.truststore -storepass mypass -file
> /etc/pki/ovirt-engine/apache-ca.pem
>
> and restarted the engine, and then upload works.
>
> Adding Martin and Nir.
>
>
> >
> > So, rather than point part of the engine at a separate trust store (as
> > the docs recommend), maybe just add the public CA to the engine's
> > existing trust store?
>
> I admit I still didn't try to fully analyze this myself, but I tend
> to agree with you. Or rather: Our docs should probably support both
> options - tell the engine to trust (and use?) the system-wide store,
> or manually add a specific cert. Because I guess you can find people
> that will prefer either option.

Decided that only the first makes sense, opened this bug, should be
fixed in 4.3.2:

https://bugzilla.redhat.com/1687301

This is obviously just one step. The next will be:

https://bugzilla.redhat.com/show_bug.cgi?id=1637809

Then, hopefully, following the existing doc to use 3rd-party CA
will "just work" also for imageio.

BTW, of course you can also create another custom truststore
only for https access to the engine, and point
ENGINE_HTTPS_PKI_TRUST_STORE at it - but I wouldn't add this to
the docs before we have automated testing that makes sure this
does not break in the future.

Best regards,


>
> >
> > However, while digging, I also noticed that now the engine is not
> > communicating with ovirt-provider-ovn, possibly due to a similar issue?
> > It is having the reverse problem; it rejects the engine's cert.
>
> Didn't try this yet, adding Dominik.
>
> >
> > This is all on 4.2.8 BTW.
>
> I personally tried this on:
>
> ovirt-engine-4.3.0-0.8.master.20190122121624.git9a8a519.el7.noarch
>
> I guess the behavior didn't change much between them.
>
> Thanks for your debugging and report!
>
> Best regards,
> --
> Didi



--
Didi
_______________________________________________
Users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Privacy Statement: https://www.ovirt.org/site/privacy-policy/
oVirt Code of Conduct: 
https://www.ovirt.org/community/about/community-guidelines/
List Archives: 
https://lists.ovirt.org/archives/list/[email protected]/message/JB2DV6MH6G3UUKSRSUYL4ASO4HJHKCDD/

Reply via email to