Can the certificate signature algorithm be changed with management tools (conga, etc.) of Red Hat Enterprise Linux 6 (High Availability)?
Environment
- Red Hat Enterprise Linux 6.2+
luciricci
Issue
- Can the certificate signature algorithm be changed with management tools (
congaorluci/ricci,ccs_sync,ccs) of Red Hat Enterprise Linux 6 (High Availability)? - SSL Certificate signed using weak hashing algorithm with
luciandriccion RHEL 6 -
While scanning cluster nodes with
Nessus networking security tool, the tool reports the following alert:SSL Certificate signed using weak hashing algorithm -
The web browser
firefoxreports the following when accessing the website created bylucifor managing clusters:This site makes use of a SHA-1 Certificate; it's recommended you use certificates with signature algorithms that use hash functions stronger than SHA-1` in the internal logging console when connecting to `luci`
Resolution
If the hashing algorithm is not suitable for the environment that the cluster is running, then a custom certificate can be used instead of the certificates that are generated by luci and ricci.
Root Cause
Self-signed certificates for luci and ricci are created by respective init scripts on first run if they do not exist yet (the latter takes care of ccs_sync as well). Similarly, ccs generates its certificate on-the-fly if it misses it.
The default locations for these certificates (public parts, for that matter) are as follows:
luci:/var/lib/luci/certs/host.pem(public+private)- This certificate is used implicitly for both public (HTTPS) and private communication as detailed in article about custom certificates.
- Both contexts of certificate use can have independent certificates from configured locations so you should refer to these if that is the case.
ricci:/var/lib/ricci/certs/cacert.pem(public)ccs:~/.ccs/cacert.pem(public)ccs_sync: Binary certificate storage, but inherits certificate pair from localriccideployment.
These certificates may not be suitable for the particular environment the cluster is part of.
Diagnostic Steps
The following command provides a diagnostics of the signature algorithm that the particular certificate is using.
# openssl x509 -in <path to the certificate> -noout -text | grep Signature
Signature Algorithm: sha1WithRSAEncryption
Signature Algorithm: sha1WithRSAEncryption
By default, provided example output is identical to any of the above mentioned certificate locations substituted for <path to the certificate>.
This solution is part of Red Hat’s fast-track publication program, providing a huge library of solutions that Red Hat engineers have created while supporting our customers. To give you the knowledge you need the instant it becomes available, these articles may be presented in a raw and unedited form.
Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.
