[Bug 1979070] Re: [2.17.0-0ubuntu1] Many SSL warnings in the ovsdb log
Launchpad Bug Tracker
1979070 at bugs.launchpad.net
Mon Jul 4 14:11:49 UTC 2022
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: openvswitch (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
OpenStack, which is subscribed to openvswitch in Ubuntu.
https://bugs.launchpad.net/bugs/1979070
Title:
[2.17.0-0ubuntu1] Many SSL warnings in the ovsdb log
Status in openvswitch package in Ubuntu:
Confirmed
Bug description:
There are many repeating warning messages like this in the ovsdb log:
2022-06-17T14:11:39.298Z|00054|stream_ssl|WARN|SSL_accept: error:0A000126:SSL routines::unexpected eof while reading
2022-06-17T14:11:39.298Z|00055|jsonrpc|WARN|ssl:127.0.0.1:46472: receive error: Protocol error
2022-06-17T14:11:39.298Z|00056|reconnect|WARN|ssl:127.0.0.1:46472: connection dropped (Protocol error)
2022-06-17T14:17:00.454Z|00057|stream_ssl|WARN|SSL_accept: error:0A000126:SSL routines::unexpected eof while reading
2022-06-17T14:17:00.454Z|00058|jsonrpc|WARN|ssl:127.0.0.1:46476: receive error: Protocol error
2022-06-17T14:17:00.454Z|00059|reconnect|WARN|ssl:127.0.0.1:46476: connection dropped (Protocol error)
While they seem harmless, we may need to do something about this as it
gives false leads to people trying to debug real issues (e.g. with
networking) in their environments.
Some references as to why this might be happening:
https://www.openssl.org/docs/man3.0/man3/SSL_CTX_set_options.html
"SSL_OP_IGNORE_UNEXPECTED_EOF
Some TLS implementations do not send the mandatory close_notify alert on shutdown. If the application tries to wait for the close_notify alert but the peer closes the connection without sending it, an error is generated. When this option is enabled the peer does not need to send the close_notify alert and a closed connection will be treated as if the close_notify alert was received.
You should only enable this option if the protocol running over TLS
can detect a truncation attack itself, and that the application is
checking for that truncation attack."
https://github.com/openssl/openssl/issues/18574#issuecomment-1156118884
$ apt policy openvswitch-common
openvswitch-common:
Installed: 2.17.0-0ubuntu1
Candidate: 2.17.0-0ubuntu1
Version table:
*** 2.17.0-0ubuntu1 500
500 http://archive.ubuntu.com/ubuntu jammy/main amd64 Packages
100 /var/lib/dpkg/status
root 5823 1 0 13:19 ? 00:00:01 ovsdb-server -vconsole:off -vfile:info --log-file=/var/log/ovn/ovsdb-server-sb.log --remote=punix:/var/run/ovn/ovnsb_db.sock --pidfile=/var/run/ovn/ovnsb_db.pid --unixctl=/var/run/ovn/ovnsb_db.ctl --remote=db:OVN_Southbound,SB_Global,connections --private-key=/etc/ovn/key_host --certificate=/etc/ovn/cert_host --ca-cert=/etc/ovn/ovn-central.crt --ssl-protocols=db:OVN_Southbound,SSL,ssl_protocols --ssl-ciphers=db:OVN_Southbound,SSL,ssl_ciphers /var/lib/ovn/ovnsb_db.db
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openvswitch/+bug/1979070/+subscriptions
More information about the Ubuntu-openstack-bugs
mailing list