RHEL 6.4 & Potential Authentication Issues

RHEL 6.4 & Potential Authentication Issues

As you may know, Red Hat released Red Hat Enterprise Linux 6.4 last Thursday.  I’m not going to rehash new features and updates as there are many tweets and articles already out.  Instead I want to make you aware of an upstream behavioral change that could cause authentication and other issues.  The credit for this goes to a customer and friend who called me after updating to RHEL 6.4 to fix a kernel problem they were hitting.

The problem surfaced for them as LDAP authentication issues with SSSD.  Users couldn’t log into the systems and the admins found the following error in the logs:

sssd[be[LDAP]]: Could not start TLS encryption. TLS error-8016:The certificate was signed using a signature algorithm that is disabled because it is not secure.

Having not made any other changes to the LDAP system they started digging.  Luckily for them some Googling and some savvy admins managed to walk the cat back to NSS using a Fedora 18 bugzilla report.

The upstream Mozilla NSS disabled support for MD5 hash signed certificates in the 3.14 release, which was added to RHEL 6.4.  From the upstream documentation the following workaround is noted:

Support for MD5 may be manually enabled (but is discouraged) by setting the environment variable of "NSS_HASH_ALG_SUPPORT=+MD5" or by using the NSS_SetAlgorithmPolicy function.

The other solution would be to re-key the LDAP server which may potentially require more changes to the CA depending on how you originally built and signed your keys.

There are two ways to set the variable that have been reported to work.  Option 1, export the variable at service startup with upstart via /etc/environment:

# /etc/environment

Option 2, create (or add to) nss.sh in /etc/profile.d/ and export the variable there.

# /etc/profile.d/nss.sh

The folks who reported the problem to me are going with solution #2.

And so as not to take any credit for these, here’s the link to the Fedora Bugzilla report that talks about the solution.  The information from the Red Hat docs on the upstream release update can be found in the Technical Notes and the Release Notes.  The upstream project had set a date on supporting MD5 hashes based on earlier issues discovered with the hash algorithm.

If you are having difficulty getting a working configuration, use your Red Hat support contract and call the experts.

Image courtesy of Vibeone.com.

UPDATE: Earlier versions of this article referred to a solution for systemd which is not the currently supported service management daemon for RHEL 6.  The upstartd technique above will work for RHEL 6.

Matt Micene is a Solutions Architect and lead engineer for DLT Solutions. He has over 10 years of experience in information technology, ranging from Solaris and Linux architecture and system design to data center design to long, coffee filled nights of system maintenance for various web-based service companies. In his current role, Matt advises customers in the pre-implementation stage, with the adoption and understanding of technologies, such as cloud computing and virtualization. He assists public sector customers with selecting the best building blocks to create environments supporting their missions. A strong advocate for open source, Matt is also a Red Hat Certified Architect (RHCA) and was named RHCE of the Year in 2010.