big switch server manager uses SSLv3

Bug #1384487 reported by Kevin Benton
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
neutron
Fix Released
High
Kevin Benton
Icehouse
New
Undecided
Unassigned
Juno
Fix Released
Undecided
Unassigned

Bug Description

The communication with the backend is done using the default protocol of ssl.wrap_socket, which is SSLv3. This protocol is vulnerable to the Poodle attack.

Changed in neutron:
assignee: nobody → Kevin Benton (kevinbenton)
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to neutron (stable/icehouse)

Fix proposed to branch: stable/icehouse
Review: https://review.openstack.org/130387

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to neutron (master)

Fix proposed to branch: master
Review: https://review.openstack.org/130395

Changed in neutron:
status: New → In Progress
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to neutron (stable/juno)

Fix proposed to branch: stable/juno
Review: https://review.openstack.org/130396

Kyle Mestery (mestery)
Changed in neutron:
importance: Undecided → High
milestone: none → kilo-1
Changed in neutron:
status: In Progress → Fix Committed
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to neutron (feature/lbaasv2)

Fix proposed to branch: feature/lbaasv2
Review: https://review.openstack.org/130864

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to neutron (feature/lbaasv2)
Download full text (72.6 KiB)

Reviewed: https://review.openstack.org/130864
Committed: https://git.openstack.org/cgit/openstack/neutron/commit/?id=c089154a94e5872efc95eab33d3d0c9de8619fe4
Submitter: Jenkins
Branch: feature/lbaasv2

commit 62588957fbeccfb4f80eaa72bef2b86b6f08dcf8
Author: Kevin Benton <email address hidden>
Date: Wed Oct 22 13:04:03 2014 -0700

    Big Switch: Switch to TLSv1 in server manager

    Switch to TLSv1 for the connections to the backend
    controllers. The default SSLv3 is no longer considered
    secure.

    TLSv1 was chosen over .1 or .2 because the .1 and .2 weren't
    added until python 2.7.9 so TLSv1 is the only compatible option
    for py26.

    Closes-Bug: #1384487
    Change-Id: I68bd72fc4d90a102003d9ce48c47a4a6a3dd6e03

commit 17204e8f02fdad046dabdb8b31397289d72c877b
Author: OpenStack Proposal Bot <email address hidden>
Date: Wed Oct 22 06:20:15 2014 +0000

    Imported Translations from Transifex

    For more information about this automatic import see:
    https://wiki.openstack.org/wiki/Translations/Infrastructure

    Change-Id: I58db0476c810aa901463b07c42182eef0adb5114

commit d712663b99520e6d26269b0ca193527603178742
Author: Carl Baldwin <email address hidden>
Date: Mon Oct 20 21:48:42 2014 +0000

    Move disabling of metadata and ipv6_ra to _destroy_router_namespace

    I noticed that disable_ipv6_ra is called from the wrong place and that
    in some cases it was called with a bogus router_id because the code
    made an incorrect assumption about the context. In other case, it was
    never called because _destroy_router_namespace was being called
    directly. This patch moves the disabling of metadata and ipv6_ra in
    to _destroy_router_namespace to ensure they get called correctly and
    avoid duplication.

    Change-Id: Ia76a5ff4200df072b60481f2ee49286b78ece6c4
    Closes-Bug: #1383495

commit f82a5117f6f484a649eadff4b0e6be9a5a4d18bb
Author: OpenStack Proposal Bot <email address hidden>
Date: Tue Oct 21 12:11:19 2014 +0000

    Updated from global requirements

    Change-Id: Idcbd730f5c781d21ea75e7bfb15959c8f517980f

commit be6bd82d43fbcb8d1512d8eb5b7a106332364c31
Author: Angus Lees <email address hidden>
Date: Mon Aug 25 12:14:29 2014 +1000

    Remove duplicate import of constants module

    .. and enable corresponding pylint check now the only offending instance
    is fixed.

    Change-Id: I35a12ace46c872446b8c87d0aacce45e94d71bae

commit 9902400039018d77aa3034147cfb24ca4b2353f6
Author: rajeev <email address hidden>
Date: Mon Oct 13 16:25:36 2014 -0400

    Fix race condition on processing DVR floating IPs

    Fip namespace and agent gateway port can be shared by multiple dvr routers.
    This change uses a set as the control variable for these shared resources
    and ensures that Test and Set operation on the control variable are
    performed atomically so that race conditions do not occur among
    multiple threads processing floating IPs.
    Limitation: The scope of this change is limited to addressing the race
    condition described in the bug report. It may not address other issues
    such as pre-existing issue wit...

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to neutron (stable/icehouse)

Reviewed: https://review.openstack.org/130387
Committed: https://git.openstack.org/cgit/openstack/neutron/commit/?id=84d6d1b6e7e5a3b345202d70b655b90ccdc43584
Submitter: Jenkins
Branch: stable/icehouse

commit 84d6d1b6e7e5a3b345202d70b655b90ccdc43584
Author: Kevin Benton <email address hidden>
Date: Wed Oct 22 13:04:03 2014 -0700

    Big Switch: Switch to TLSv1 in server manager

    Switch to TLSv1 for the connections to the backend
    controllers. The default SSLv3 is no longer considered
    secure.

    TLSv1 was chosen over .1 or .2 because the .1 and .2 weren't
    added until python 2.7.9 so TLSv1 is the only compatible option
    for py26.

    Conflicts:

     neutron/tests/unit/bigswitch/test_servermanager.py
        Unit test changes couldn't be back-ported because they don't
        exist in Icehouse.

    Closes-Bug: #1384487
    Change-Id: I68bd72fc4d90a102003d9ce48c47a4a6a3dd6e03
    (cherry picked from commit 62588957fbeccfb4f80eaa72bef2b86b6f08dcf8)

tags: added: in-stable-icehouse
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to neutron (stable/juno)

Reviewed: https://review.openstack.org/130396
Committed: https://git.openstack.org/cgit/openstack/neutron/commit/?id=dd5728125f36b1f6e97893765905659184e66c0e
Submitter: Jenkins
Branch: stable/juno

commit dd5728125f36b1f6e97893765905659184e66c0e
Author: Kevin Benton <email address hidden>
Date: Wed Oct 22 13:04:03 2014 -0700

    Big Switch: Switch to TLSv1 in server manager

    Switch to TLSv1 for the connections to the backend
    controllers. The default SSLv3 is no longer considered
    secure.

    TLSv1 was chosen over .1 or .2 because the .1 and .2 weren't
    added until python 2.7.9 so TLSv1 is the only compatible option
    for py26.

    Closes-Bug: #1384487
    Change-Id: I68bd72fc4d90a102003d9ce48c47a4a6a3dd6e03
    (cherry picked from commit 62588957fbeccfb4f80eaa72bef2b86b6f08dcf8)

tags: added: in-stable-juno
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to neutron (master)

Fix proposed to branch: master
Review: https://review.openstack.org/131897

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to neutron (master)

Reviewed: https://review.openstack.org/131897
Committed: https://git.openstack.org/cgit/openstack/neutron/commit/?id=77e283c94f51e21dcf126a316098c54a7cdfca0f
Submitter: Jenkins
Branch: master

commit 77e283c94f51e21dcf126a316098c54a7cdfca0f
Author: Kevin Benton <email address hidden>
Date: Tue Oct 28 21:39:04 2014 -0700

    Big Switch: Fix SSL version on get_server_cert

    The ssl.get_server_certificate method uses SSLv3 by default.
    Support for SSLv3 was dropped on the backend controller in
    response to the POODLE vulnerability. This patch fixes it
    to use TLSv1 like the wrap_socket method.

    Closes-Bug: #1384487
    Change-Id: I9cb5f219d327d62168bef2d7dbee22534b2e454e

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to neutron (stable/juno)

Fix proposed to branch: stable/juno
Review: https://review.openstack.org/131963

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to neutron (stable/icehouse)

Fix proposed to branch: stable/icehouse
Review: https://review.openstack.org/131964

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to neutron (stable/juno)

Reviewed: https://review.openstack.org/131963
Committed: https://git.openstack.org/cgit/openstack/neutron/commit/?id=0be0dabf0e221b142e675348a294af89575ce6d0
Submitter: Jenkins
Branch: stable/juno

commit 0be0dabf0e221b142e675348a294af89575ce6d0
Author: Kevin Benton <email address hidden>
Date: Tue Oct 28 21:39:04 2014 -0700

    Big Switch: Fix SSL version on get_server_cert

    The ssl.get_server_certificate method uses SSLv3 by default.
    Support for SSLv3 was dropped on the backend controller in
    response to the POODLE vulnerability. This patch fixes it
    to use TLSv1 like the wrap_socket method.

    Closes-Bug: #1384487
    Change-Id: I9cb5f219d327d62168bef2d7dbee22534b2e454e
    (cherry picked from commit 77e283c94f51e21dcf126a316098c54a7cdfca0f)

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to neutron (stable/icehouse)

Reviewed: https://review.openstack.org/131964
Committed: https://git.openstack.org/cgit/openstack/neutron/commit/?id=e34ba304370aca6cbcc1c5ce4c8fc1cd4f7044e5
Submitter: Jenkins
Branch: stable/icehouse

commit e34ba304370aca6cbcc1c5ce4c8fc1cd4f7044e5
Author: Kevin Benton <email address hidden>
Date: Tue Oct 28 21:39:04 2014 -0700

    Big Switch: Fix SSL version on get_server_cert

    The ssl.get_server_certificate method uses SSLv3 by default.
    Support for SSLv3 was dropped on the backend controller in
    response to the POODLE vulnerability. This patch fixes it
    to use TLSv1 like the wrap_socket method.

    Closes-Bug: #1384487
    Change-Id: I9cb5f219d327d62168bef2d7dbee22534b2e454e
    (cherry picked from commit 77e283c94f51e21dcf126a316098c54a7cdfca0f)

Thierry Carrez (ttx)
Changed in neutron:
status: Fix Committed → Fix Released
Thierry Carrez (ttx)
Changed in neutron:
milestone: kilo-1 → 2015.1.0
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.