Skip to content

Commit 7b4d313

Browse files
committed
stream-ssl: Remove support for deprecated TLSv1 and TLSv1.1.
TLSv1 and TLSv1.1 are officially deprecated by RFC 8996 since March of 2021: https://datatracker.ietf.org/doc/rfc8996/ Both protocols should not generally be used (RFC says MUST NOT) and are being actively removed from support by major distributions and libraries. They were deprecated and disabled by default in OVS 3.5 with the following commit: 923a80d ("stream-ssl: Deprecate and disable TLSv1 and TLSv1.1.") It's time to fully remove the support for these protocols. Some infrastructure and parts of the documentation look a little awkward since we're only supporting 2 versions of TLS now, so I tried to re-word the text a little. But I kept the code intact so we can easily add new versions when they appear or deprecate TLSv1.2 when the time comes, even though it may not be soon. Acked-by: Eelco Chaudron <[email protected]> Acked-by: Kevin Traynor <[email protected]> Signed-off-by: Ilya Maximets <[email protected]>
1 parent 19b8941 commit 7b4d313

File tree

5 files changed

+106
-38
lines changed

5 files changed

+106
-38
lines changed

NEWS

+3
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,9 @@ Post-v3.5.0
55
- ovs-ctl:
66
* Added a new option, --oom-score=<score>, to set the daemons' Linux
77
Out-Of-Memory (OOM) killer score.
8+
- SSL/TLS:
9+
* Support for deprecated TLSv1 and TLSv1.1 protocols on OpenFlow and
10+
database connections is now removed.
811
- Tunnels:
912
* Support for previously deprecated LISP and STT tunnel port types
1013
is now removed.

lib/ssl-connect.man

+13-13
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,24 @@
11
.IP "\fB\-\-ssl\-protocols=\fIprotocols\fR"
22
Specifies a range or a comma- or space-delimited list of the SSL/TLS protocols
3-
\fB\*(PN\fR will enable for SSL/TLS connections. Supported
4-
\fIprotocols\fR include \fBTLSv1\fR (deprecated), \fBTLSv1.1\fR (deprecated),
5-
\fBTLSv1.2\fR and \fBTLSv1.3\fR. Ranges can be provided in a form of two
6-
protocol names separated with a dash, or as a single protocol name with a plus
7-
sign. For example, use \fBTLSv1.1-TLSv1.3\fR to allow \fBTLSv1.1\fR,
8-
\fBTLSv1.2\fR and \fBTLSv1.3\fR. Use \fBTLSv1.2+\fR to allow \fBTLSv1.2\fR and
9-
any later protocol. The option accepts a list of protocols or exactly one
10-
range. The range is a preferred way of specifying protocols and the option
11-
always behaves as if the range between the minimum and the maximum specified
12-
version is provided, i.e., if the option is set to \fBTLSv1.1,TLSv1.3\fR, the
13-
\fBTLSv1.2\fR will also be enabled as if it was a range.
3+
\fB\*(PN\fR will enable for SSL/TLS connections. Supported \fIprotocols\fR
4+
include \fBTLSv1.2\fR and \fBTLSv1.3\fR.
5+
Ranges can be provided in a form of two protocol names separated with a dash,
6+
or as a single protocol name with a plus sign. For example, use
7+
\fBTLSv1.2-TLSv1.3\fR to allow \fBTLSv1.2\fR and \fBTLSv1.3\fR. Use
8+
\fBTLSv1.2+\fR to allow \fBTLSv1.2\fR and any later protocol.
9+
The option accepts a list of protocols or exactly one range. The
10+
range is a preferred way of specifying protocols and the option always behaves
11+
as if the range between the minimum and the maximum specified version is
12+
provided, i.e., if the option is set to \fBTLSv1.X,TLSv1.(X+2)\fR, the
13+
\fBTLSv1.(X+1)\fR will also be enabled as if it was a range.
1414
Regardless of order, the highest protocol supported by both sides will
1515
be chosen when making the connection. The default when this option is
1616
omitted is \fBTLSv1.2\fR or later.
1717
.
1818
.IP "\fB\-\-ssl\-ciphers=\fIciphers\fR"
1919
Specifies, in OpenSSL cipher string format, the ciphers \fB\*(PN\fR will
20-
support for SSL/TLS connections with TLSv1.2 and earlier. The default when
21-
this option is omitted is \fBDEFAULT:@SECLEVEL=2\fR.
20+
support for SSL/TLS connections with TLSv1.2.
21+
The default when this option is omitted is \fBDEFAULT:@SECLEVEL=2\fR.
2222
.
2323
.IP "\fB\-\-ssl\-ciphersuites=\fIciphersuites\fR"
2424
Specifies, in OpenSSL ciphersuite string format, the ciphersuites

lib/stream-ssl.c

+1-3
Original file line numberDiff line numberDiff line change
@@ -1221,7 +1221,7 @@ stream_ssl_set_key_and_cert(const char *private_key_file,
12211221
}
12221222
}
12231223

1224-
/* Sets SSL/TLS ciphers for TLSv1.2 and earlier based on string input.
1224+
/* Sets SSL/TLS ciphers for TLSv1.2 based on string input.
12251225
* Aborts with an error message if 'arg' is not valid. */
12261226
void
12271227
stream_ssl_set_ciphers(const char *arg)
@@ -1267,8 +1267,6 @@ stream_ssl_set_protocols(const char *arg)
12671267
bool deprecated;
12681268
} protocols[] = {
12691269
{"later", 0 /* any version */, false},
1270-
{"TLSv1", TLS1_VERSION, true },
1271-
{"TLSv1.1", TLS1_1_VERSION, true },
12721270
{"TLSv1.2", TLS1_2_VERSION, false},
12731271
{"TLSv1.3", TLS1_3_VERSION, false},
12741272
};

lib/stream.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -161,7 +161,7 @@ stream_usage(const char *name, bool active, bool passive,
161161
printf("SSL/TLS options:\n"
162162
" --ssl-protocols=PROTOS range of SSL/TLS protocols to enable\n"
163163
" --ssl-ciphers=CIPHERS list of SSL/TLS ciphers to enable\n"
164-
" with TLSv1.2 and earlier\n"
164+
" with TLSv1.2\n"
165165
" --ssl-ciphersuites=SUITES list of SSL/TLS ciphersuites to\n"
166166
" enable with TLSv1.3 and later\n");
167167
#endif

tests/ovsdb-server.at

+88-21
Original file line numberDiff line numberDiff line change
@@ -912,17 +912,6 @@ AT_CHECK_UNQUOTED(
912912
[[@<:@{"rows":@<:@{"private_key":"$PKIDIR/testpki-privkey2.pem"}@:>@}@:>@
913913
]], [ignore])
914914

915-
# Check that, when the server has TLSv1.2+ and the client has
916-
# TLSv1.1, connection fails.
917-
AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.1]), [1], [stdout], [stderr])
918-
cat stderr > output
919-
AT_CHECK_UNQUOTED(
920-
[sed -n "/failed to connect/s/ (.*)//p" output], [0],
921-
[ovsdb-client: failed to connect to "ssl:127.0.0.1:$SSL_PORT"
922-
],
923-
[ignore])
924-
AT_CHECK([grep -q 'TLSv1.1 protocol is deprecated' output])
925-
AT_CHECK([grep -q 'Enabled protocol range: TLSv1.1 - TLSv1.1' stderr])
926915
# Check that when ciphers are not compatible, a negotiation
927916
# failure occurs.
928917
AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.2], [ECDHE-ECDSA-AES256-GCM-SHA384]),
@@ -954,22 +943,100 @@ AT_CHECK_UNQUOTED(
954943
AT_CHECK([grep -q -E "(sslv3|ssl/tls) alert handshake failure" output])
955944

956945
# Checking parsing of different protocol ranges.
957-
AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.1,TLSv1.3]), [0], [stdout], [stderr])
958-
AT_CHECK([grep -q 'Enabled protocol range: TLSv1.1 - TLSv1.3' stderr])
959-
AT_CHECK([grep -q \
960-
'TLSv1.2 is not configured, but will be enabled anyway' stderr])
961-
AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.1-TLSv1.3]), [0], [stdout], [stderr])
962-
AT_CHECK([grep -q 'Enabled protocol range: TLSv1.1 - TLSv1.3' stderr])
963-
AT_CHECK([grep -q 'will be enabled anyway' stderr], [1])
964-
AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.3-TLSv1.1]), [0], [stdout], [stderr])
965-
AT_CHECK([grep -q 'Enabled protocol range: TLSv1.1 - TLSv1.3' stderr])
966-
AT_CHECK([grep -q 'will be enabled anyway' stderr], [1])
946+
AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.2,TLSv1.3]), [0], [stdout], [stderr])
947+
AT_CHECK([grep -q 'Enabled protocol range: TLSv1.2 - TLSv1.3' stderr])
948+
AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.2-TLSv1.3]), [0], [stdout], [stderr])
949+
AT_CHECK([grep -q 'Enabled protocol range: TLSv1.2 - TLSv1.3' stderr])
950+
AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.3-TLSv1.2]), [0], [stdout], [stderr])
951+
AT_CHECK([grep -q 'Enabled protocol range: TLSv1.2 - TLSv1.3' stderr])
967952
AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.3+]), [0], [stdout], [stderr])
968953
AT_CHECK([grep -q 'Enabled protocol range: TLSv1.3 or later' stderr])
969954
AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.2-TLSv1.3,TLSv1.3+]), [0], [stdout], [stderr])
970955
AT_CHECK([grep -q 'SSL/TLS protocol not recognized' stderr])
971956
AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.2+TLSv1.3]), [0], [stdout], [stderr])
972957
AT_CHECK([grep -q 'SSL/TLS protocol not recognized' stderr])
958+
AT_CHECK(SSL_OVSDB_CLIENT([TLSv1+]), [0], [stdout], [stderr])
959+
AT_CHECK([grep -q 'SSL/TLS protocol not recognized' stderr])
960+
AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.1]), [0], [stdout], [stderr])
961+
AT_CHECK([grep -q 'SSL/TLS protocol not recognized' stderr])
962+
963+
OVSDB_SERVER_SHUTDOWN(["
964+
/stream_ssl|WARN/d
965+
/Protocol error/d
966+
"])
967+
AT_CLEANUP
968+
969+
AT_SETUP([SSL/TLS db: implementation (TLSv1.3 only)])
970+
AT_KEYWORDS([ovsdb server positive ssl tls $5])
971+
AT_SKIP_IF([test "$HAVE_OPENSSL" = no])
972+
# For this test, we pass PKIDIR through a ovsdb-tool transact and
973+
# msys on Windows does not convert the path style automatically.
974+
# So, do that forcefully with a 'pwd -W' (called through pwd() function).
975+
PKIDIR="$(cd $abs_top_builddir/tests && pwd)"
976+
AT_SKIP_IF([expr "$PKIDIR" : ".*[[ '\"
977+
\\]]"])
978+
AT_DATA([schema],
979+
[[{"name": "mydb",
980+
"tables": {
981+
"SSL": {
982+
"columns": {
983+
"private_key": {"type": "string"},
984+
"certificate": {"type": "string"},
985+
"ca_cert": {"type": "string"},
986+
"ssl_protocols" : {"type": "string"},
987+
"ssl_ciphers" : {"type" : "string"},
988+
"ssl_ciphersuites" : {"type": "string"}
989+
}}}}
990+
]])
991+
AT_CHECK([ovsdb-tool create db schema], [0], [stdout], [ignore])
992+
AT_CHECK(
993+
[[ovsdb-tool transact db \
994+
'["mydb",
995+
{"op": "insert",
996+
"table": "SSL",
997+
"row": {"private_key": "'"$PKIDIR/testpki-privkey2.pem"'",
998+
"certificate": "'"$PKIDIR/testpki-cert2.pem"'",
999+
"ca_cert": "'"$PKIDIR/testpki-cacert.pem"'",
1000+
"ssl_protocols": "'"TLSv1.3"'"
1001+
}}]']],
1002+
[0], [ignore], [ignore])
1003+
on_exit 'kill `cat *.pid`'
1004+
AT_CHECK(
1005+
[ovsdb-server --log-file --detach --no-chdir --pidfile \
1006+
--private-key=db:mydb,SSL,private_key \
1007+
--certificate=db:mydb,SSL,certificate \
1008+
--ca-cert=db:mydb,SSL,ca_cert \
1009+
--ssl-protocols=db:mydb,SSL,ssl_protocols \
1010+
--ssl-ciphers=db:mydb,SSL,ssl_ciphers \
1011+
--ssl-ciphersuites=db:mydb,SSL,ssl_ciphersuites \
1012+
--remote=pssl:0:127.0.0.1 db],
1013+
[0], [ignore], [ignore])
1014+
PARSE_LISTENING_PORT([ovsdb-server.log], [SSL_PORT])
1015+
1016+
# SSL_OVSDB_CLIENT(PROTOCOL)
1017+
m4_define([SSL_OVSDB_CLIENT], [dnl
1018+
ovsdb-client -vconsole:stream_ssl:dbg \
1019+
--private-key=$PKIDIR/testpki-privkey.pem \
1020+
--certificate=$PKIDIR/testpki-cert.pem \
1021+
--ca-cert=$PKIDIR/testpki-cacert.pem \
1022+
--ssl-protocols=[$1] \
1023+
transact ssl:127.0.0.1:$SSL_PORT \
1024+
'[[["mydb",
1025+
{"op": "select",
1026+
"table": "SSL",
1027+
"where": [],
1028+
"columns": ["private_key"]}]]]'])
1029+
1030+
# Check that, when the server has TLSv1.3 and the client has
1031+
# TLSv1.2, connection fails.
1032+
AT_CHECK(SSL_OVSDB_CLIENT([TLSv1.2]), [1], [stdout], [stderr])
1033+
cat stderr > output
1034+
AT_CHECK_UNQUOTED(
1035+
[sed -n "/failed to connect/s/ (.*)//p" output], [0],
1036+
[ovsdb-client: failed to connect to "ssl:127.0.0.1:$SSL_PORT"
1037+
],
1038+
[ignore])
1039+
AT_CHECK([grep -q 'Enabled protocol range: TLSv1.2 - TLSv1.2' stderr])
9731040

9741041
OVSDB_SERVER_SHUTDOWN(["
9751042
/stream_ssl|WARN/d

0 commit comments

Comments
 (0)