[MDEV-15568] SST + SSL/TLS broken due to socat CN check Created: 2018-03-14 Updated: 2019-08-28 Resolved: 2018-08-07 |
|
| Status: | Closed |
| Project: | MariaDB Server |
| Component/s: | Galera SST |
| Affects Version/s: | 10.1.28 |
| Fix Version/s: | N/A |
| Type: | Bug | Priority: | Major |
| Reporter: | Wagner Bianchi (Inactive) | Assignee: | Jan Lindström (Inactive) |
| Resolution: | Not a Bug | Votes: | 2 |
| Labels: | None | ||
| Environment: |
CentOS 7.2 |
||
| Issue Links: |
|
||||||||
| Description |
|
Folks, Configuring a running MariaDB Cluster 10.1.28 with self-signed SSL certs with different CNs cause the SST break due to socat 1.7.3 which has extra certificate check introduced:
Is there any treatment that can be done to avoid this issue, adding, e.g. --verify=0? After generating the certificates:
|
| Comments |
| Comment by Wagner Bianchi (Inactive) [ 2018-05-04 ] | |||||||||||||||
|
Folks, I managed to create certificates in a way it can comply with the new verify option enabled by default within the new socat version. This is a matter of creating the CA and the client certificates ion one of the server/nodes, part of the cluster and rsync them to all other nodes. Go to each of the nodes and create local server cert based on the previously created CA certificate. Doing this way, you can fill up the CN or CommonName field during the process of the certificate creation with the server name. Wildcard certificates are not well supported as I tested that before coming to this solution.
So, with that said, we can close this JIRA, thanks! | |||||||||||||||
| Comment by Mathew Winstone [ 2019-08-28 ] | |||||||||||||||
|
If you follow the docs and pass 'tca' with encrypt 3 it would appear that triggers socat to validate the certs. If you omit 'tca' it seems to just use the certificates. I'm using 10.3 and my state transfers appear to be working so long as I omit tca. |