On Wed, Jul 4, 2018 at 6:50 PM, Nir Soffer <[email protected]> wrote:
> On Wed, Jul 4, 2018 at 11:08 AM Etienne Charlier <Etienne.Charlier@ > reduspaceservices.eu> wrote: > >> Thanks for getting back to me. >> >> >> I wanted to "protect" my ovirt installation with letsencrypt certificates >> ( to have a "green" bar in my chrome browser.) >> > I think there is a misconception here. Using the engine builtin CA is more > secure than any other > CA, not less secure. You don't protect anything by using another CA. > Well, not sure I agree, but not sure that's the point... The engine-internal CA is only protected by a unix ACL, on the engine machine. So if you manage to get root on it, you can do anything with the engine CA. Most reasonable CAs (including hopefully most organization-internal ones) have more than one level in the authority chain, with the root cert's key being kept offline in some safe, so it's harder to break. > > What you really need to do is to import the engine CA certificate to your > browser, and this is also > required for communicating with the proxy. > > Unless you know what you are doing, replacing the certificates with your > own is going to be > hard. > Should not be - we have this doc, and should update it as needed: [1] https://www.ovirt.org/documentation/admin-guide/appe-oVirt_and_SSL/ Actually it's indeed somewhat out-of-date. See also: [2] https://bugzilla.redhat.com/show_bug.cgi?id=1385617 which should be the only thing missing in: [3] https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.2/html/administration_guide/appe-red_hat_enterprise_virtualization_and_ssl which is somewhat more up-to-date than [1] (has websocket-proxy). > >> I set up a bastion host where I configured letsencrypt. >> >> >> I copied the certificates over the ovirt engine machine and ran the >> script "convert.sh" ( see attachement). ( still need to automate it to >> handle certificate renew..) >> >> >> Once this was in place, the test connection button ( in upload image UI) >> gave me "green" "Connection to ovirt-imageio-proxy was successful." >> > This means that the proxy is configured to use the new CA, but this is not > enough > to upload. The proxy has its own certificates, and they must be signed by > the new > CA. > > So to use your own certificates, you have to regenerate both the engine > certificates, > and the proxy certificates, and this process is not easy or documented yet. > Isn't this what above bug [2] is about? You wrote there that it's ok to configure the proxy to use same key/cert as apache. Thanks, > > If you created everything correctly, you need to configure the proxy to > use the new > certificates. > > Finally, you need to restart ovirt-imgaeio-proxy, since it does not > support reloading > certificates or configuration changes yet. > > I think the best solution for you is to use engine builtin PKI, managed by > engine-setup. > > To "protect" your ovirt installation, add the engine CA to your browser > using this link: > https://my.engine/ovirt-engine/services/pki-resource? > resource=ca-certificate&format=X509-PEM-CA > > You save this file locally, and then you import this certificate into your > browser. > > Using Chrome, you do: > 1. go to: Settings > Advanced > Manage Certificates > Authorities > 2. click "Import" > 3. select the certificate > 4. check "Trust this certificate for identifying web sites" > 5. confirm > 6. restart the browser > > >> Here a copy of engine.log and ovirt-imageio-proxy log files. The ssl >> paths are dumped in the log file >> >> Thanks for your support >> Etienne >> >> ------------------------------ >> *De :* Nir Soffer <[email protected]> >> *Envoyé :* mardi 3 juillet 2018 23:31 >> *À :* Etienne Charlier >> *Cc :* [email protected]; Daniel Erez >> *Objet :* Re: [ovirt-users] Cannot import a qcow2 image >> >> >> >> On Tue, Jul 3, 2018 at 11:47 PM Nir Soffer <[email protected]> wrote: >> >>> On Tue, 3 Jul 2018, 15:44 , <[email protected]> >>> wrote: >>> >>>> Hello, >>>> >>>> I' m trying without success to import a qcow2 file into ovirt. I tried >>>> on a ISCSI datadomain and an nfs datadomain. >>>> >>>> I struggled quite a lot to have the "test connection" succed ( I write >>>> a small shell script to "deploy" letsencryt certificates into ovirt engine) >>>> >>>> Doc is not clear on the fact that certificates for imageio-proxy are >>>> different than for main engine… >>>> >>>> >>>> Now, the upload fails with >>>> >>>> Transfer was stopped by system. Reason: failed to add image ticket to >>>> ovirt-imageio-proxy. >>>> Image gets stuck in "transfer paused by system" >>>> >>>> Any idea ? >>>> >>> >>> you probably have bad cretificate configuration in the proxy. Why not >>> use the default certificates generated by engine setup? This is how we test >>> the proxy. >>> >> >> Can you share the contents of: >> /etc/ovirt-imageio-proxy/ovirt-imageio-proxy.conf >> >> And the proxy log at >> /var/log/ovirt-imageio-proxy/image-proxy.log >> Showing the time of the error (failed to add image ticket to >> ovirt-imageio-proxy.) >> >> Nir >> >> >>> >>> >>>> ovrit is up to date: 4.2.4 on both engine and hosts. >>>> _______________________________________________ >>>> Users mailing list -- [email protected] >>>> To unsubscribe send an email to [email protected] >>>> Privacy Statement: https://www.ovirt.org/site/privacy-policy/ >>>> oVirt Code of Conduct: https://www.ovirt.org/community/about/community- >>>> guidelines/ >>>> List Archives: https://lists.ovirt.org/archives/list/[email protected]/ >>>> message/FTC3PBZCRRTI2LBADOPOS2EYRCZ6EQA3/ >>>> >>> -- Didi
_______________________________________________ Users mailing list -- [email protected] To unsubscribe send an email to [email protected] Privacy Statement: https://www.ovirt.org/site/privacy-policy/ oVirt Code of Conduct: https://www.ovirt.org/community/about/community-guidelines/ List Archives: https://lists.ovirt.org/archives/list/[email protected]/message/DSJJZBHXIPY3GR6REIP26BGDYOBAHQER/

