TLSv1 related vulnerabilities on MOS Controllers
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Fuel for OpenStack |
Won't Fix
|
Critical
|
MOS Maintenance |
Bug Description
Detailed bug description:
Customer's Qualsys security software determined that their controllers are susceptible to the following vulnerabilities:
CVE-2013-2566
CVE-2015-2808
CVE-2014-3566
CVE-2016-2107
CVE-2011-3389
They state that it is needed to stop using TLSv1+ssl if possible.
Steps to reproduce:
On a controller node in MOS 7.0 environment, we can see that TLSv1_1 and v1_2 are not enabled(or supported).
root@node-1:~# python
Python 2.7.6 (default, Oct 26 2016, 20:30:19)
[GCC 4.8.4] on linux2
Type "help", "copyright", "credits" or "license" for more information.
>>> import ssl
>>> 'PROTOCOL_TLSv1' in dir(ssl)
True
>>> 'PROTOCOL_TLSv1_1' in dir(ssl)
False
>>> 'PROTOCOL_TLSv1_2' in dir(ssl)
False
Expected results:
Have the ability to use v1_1 or v1_2
Actual result:
Unable to, since I believe it is not supported in the version of Python shipped with MOS 7.0 (and up to at least 9.0 as well). I believe Python 2.7.9 supports TLSv1_1 and v1_2
Reproducibility:
N/A
Workaround:
None at the moment.
Impact:
Description of the environment:
Operation system: Ubuntu 14.04
Versions of components: Python 2.7.6
Reference architecture: N/A
Network model: N/A
Related projects installed: N/A
Additional information:
N/A
You're right. All we stuck in is that OpenStack pinned to Python version. So, let's ask some MOS guys if we can raise Python version for newer OpenStack releases.