-
Notifications
You must be signed in to change notification settings - Fork 297
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[BUG] CA used to generate certs is expired #4047
Comments
Transferring to security repo to update the CA. |
@DarshitChanpura Could you look into this?
|
I will provide an update once I dive deep into this. |
I am experiencing the same issue. Is someone assigned to update the docker image for this issue? Is there a guide for replacing these certificates in the docker images? |
can you please let me know if there is any progress on this? We are blocked in a deployment because of this bug |
@seiimonn @jeffcourtade This bug will be addressed via: #4061 |
…expired root ca certificate (#4061) ### Description During the last renewal of certs #3268, the option `-days 3650` was missed for root-ca.pem cert causing it to set the default expiry of 30 days. This PR regenerates the public cert root-ca.pem, using the same private-key, and it also regenerate public certs `es-node.pem` and `kirk.pem` so that they can be verified with this new certificate. * Category : Bug fix * Why these changes are required? - To ensure the expiry is in 10 years from now * What is the old behavior before changes and new behavior after changes? - root-ca is currently expired, and this change will set expiry to 2034 ### Issues Resolved - Resolves #4047 ### Testing - Automated testing + [Manual Testing](#4061 (comment)) --------- Signed-off-by: Darshit Chanpura <[email protected]>
…expired root ca certificate (#4061) ### Description During the last renewal of certs #3268, the option `-days 3650` was missed for root-ca.pem cert causing it to set the default expiry of 30 days. This PR regenerates the public cert root-ca.pem, using the same private-key, and it also regenerate public certs `es-node.pem` and `kirk.pem` so that they can be verified with this new certificate. * Category : Bug fix * Why these changes are required? - To ensure the expiry is in 10 years from now * What is the old behavior before changes and new behavior after changes? - root-ca is currently expired, and this change will set expiry to 2034 ### Issues Resolved - Resolves #4047 ### Testing - Automated testing + [Manual Testing](#4061 (comment)) --------- Signed-off-by: Darshit Chanpura <[email protected]> (cherry picked from commit 9a6a018) Signed-off-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
…expired root ca certificate (opensearch-project#4061) ### Description During the last renewal of certs opensearch-project#3268, the option `-days 3650` was missed for root-ca.pem cert causing it to set the default expiry of 30 days. This PR regenerates the public cert root-ca.pem, using the same private-key, and it also regenerate public certs `es-node.pem` and `kirk.pem` so that they can be verified with this new certificate. * Category : Bug fix * Why these changes are required? - To ensure the expiry is in 10 years from now * What is the old behavior before changes and new behavior after changes? - root-ca is currently expired, and this change will set expiry to 2034 ### Issues Resolved - Resolves opensearch-project#4047 ### Testing - Automated testing + [Manual Testing](opensearch-project#4061 (comment)) --------- Signed-off-by: Darshit Chanpura <[email protected]>
What is the bug?
The cert used by the container is signed by the CA found in
config/root-ca.pem
. This CA is expired but the certs are valid for 10 years.The CA:
The cert:
How can one reproduce the bug?
Pull the lastest image and check the cerst.
What is the expected behavior?
Is would be nice if the default certs could be used for a testing use case without having to generate our own certs.
What is your host/environment?
https://hub.docker.com/layers/opensearchproject/opensearch/latest/images/sha256-5495aa4f6ce16c689918846a6e8acc5ef991141693ff7ce3d09c151e25f19e9d?context=explore&tab=vulnerabilities
Do you have any screenshots?
See the outputs from openssl above.
Do you have any additional context?
This worked for previous versions of the image, I do not know when it broke.
The text was updated successfully, but these errors were encountered: