Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[release/8.0] Support specifying multiple directories through SSL_CERT_DIR. #93749

Merged
merged 5 commits into from
Oct 20, 2023

Conversation

github-actions[bot]
Copy link
Contributor

@github-actions github-actions bot commented Oct 19, 2023

Backport of #92920 to release/8.0

Customer Impact

Customers running applications in Kubernetes on Linux can experience HTTPS certificate trust failures.

OpenSSL provides an SSL_CERT_DIR value which contains a delimiter-separated list of paths to directories containing trusted CA certificates. That value is being interpreted as a single path instead of a list of paths, which prevents certificates in those directories from being respected.

This was reported, fixed, and tested by @tmds. Support for this type of environment is being backported to RHEL .NET 8 distros that derive from CentOS Stream. Backporting this fix to .NET 8 ensures we have consistent behavior between RHEL .NET 8 and other distributions of .NET 8.

Testing

A new Linux-specific unit test was added for verifying the behavior. Manual testing verified the issue is fixed in the RHEL Kubernetes environments. Manual testing also covered NFS and SMB mount scenarios.

This same issue was encountered in Go, with a similar fix made in February 2020.

Risk

Medium, but confidence is high. Changes to these scenarios would have high impact if there is a regression, but adequate reviews and testing have been done to give us confidence in this fix.

@ghost
Copy link

ghost commented Oct 19, 2023

Tagging subscribers to this area: @dotnet/area-system-security, @bartonjs, @vcsjones
See info in area-owners.md if you want to be subscribed.

Issue Details

Backport of #92920 to release/8.0

/cc @jeffhandley @tmds

Customer Impact

Testing

Risk

IMPORTANT: If this backport is for a servicing release, please verify that:

  • The PR target branch is release/X.0-staging, not release/X.0.

  • If the change touches code that ships in a NuGet package, you have added the necessary package authoring and gotten it explicitly reviewed.

Author: github-actions[bot]
Assignees: -
Labels:

area-System.Security

Milestone: -

@carlossanlop
Copy link
Member

When ready, please send an email to Tactics requesting approval. Friendly reminder that we need this merged before 4pm tomorrow Friday 20th to ensure it goes into GA.

@jeffhandley jeffhandley added the Servicing-consider Issue for next servicing release review label Oct 20, 2023
Copy link
Member

@wfurt wfurt left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@jeffhandley jeffhandley added Servicing-approved Approved for servicing release and removed Servicing-consider Issue for next servicing release review labels Oct 20, 2023
@carlossanlop carlossanlop merged commit 0b0222b into release/8.0 Oct 20, 2023
103 of 110 checks passed
@carlossanlop carlossanlop deleted the backport/pr-92920-to-release/8.0 branch October 20, 2023 20:22
@ghost ghost locked as resolved and limited conversation to collaborators Nov 20, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
area-System.Security Servicing-approved Approved for servicing release
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants