1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251
|
ganeti (3.0.1-1) unstable; urgency=medium
The Debian packages for Ganeti 3.0 provide a seamless upgrade path from
existing 2.16 setups; in contrast to what is written in the upstream
documentation, upgrades from _any_ 2.16 version (and not just from 2.16.2)
should work out of the box. The upgrade can be performed simply by installing
the 3.0 packages on all nodes and running
gnt-cluster upgrade --to=3.0
-- Apollon Oikonomopoulos <apoikos@debian.org> Wed, 03 Feb 2021 20:45:51 +0200
ganeti (2.16.0~rc2-5) unstable; urgency=medium
This version changes Ganeti's internal CA, which is used to secure
intra-cluster RPC, to use SHA256 digests when signing certificates.
Previously issued certificates were signed using SHA1 and will be rejected
by newer OpenSSL versions, causing cluster malfunction.
After upgrading all nodes to this package version, please run
gnt-cluster renew-crypto --new-cluster-certificate
at a convenient time to re-generate the cluster's certificates using the new
signing algorithm. This operation does not incur any instance downtime,
however you will not be able to issue any gnt-* commands while renew-crypto
is running.
If you are using built-in certificates for RAPI and/or spice, please
consider adding --new-rapi-certificate and --new-spice-certificate
respectively to the above command.
-- Apollon Oikonomopoulos <apoikos@debian.org> Tue, 28 Aug 2018 11:12:28 +0300
ganeti (2.15.2-8) unstable; urgency=medium
This version introduces support for non-DSA SSH keys. Previously, Ganeti
relied exclusively on DSA SSH keys for intra-cluster SSH as a hardcoded
default. However, DSA keys are regarded as weak and are no longer accepted
by sshd since openssh 7.1, leading to cumbersome Ganeti cluster setups. This
version adds support for specifying additional key types (RSA and ECDSA), as
well as key length.
The default for newly-created clusters is to use 2048-bit RSA keys. For
existing clusters you can switch over to RSA or ECDSA keys, using
gnt-cluster renew-crypto --new-ssh-keys --ssh-key-type=rsa --ssh-key-bits=2048
The new key type support introduces backend changes and requires that all
nodes run at least 2.15.2-8, so please make sure to upgrade all nodes at the
same time.
-- Apollon Oikonomopoulos <apoikos@debian.org> Thu, 25 May 2017 11:58:31 +0300
ganeti (2.15.2-1) unstable; urgency=high
ganeti-rapi is now bound to the loopback interface by default and anonymous
access has been turned off even for read-only operations, to prevent
potential disclosure of sensitive cluster information, like in the case of
CVE-2015-7945. If you rely on RAPI for external tools, make sure to restore
the previous behavior by removing the arguments from /etc/default/ganeti.
Additionally, RAPI's SSL implementation is vulnerable to a Denial-of-Service
attack (CVE-2015-7944) when exposed to public networks. If you intend to run
RAPI on a public network, you are advised to place it behind a reverse proxy
(e.g. nginx, apache or haproxy) for SSL termination.
-- Apollon Oikonomopoulos <apoikos@debian.org> Wed, 30 Dec 2015 15:47:32 +0200
ganeti (2.12.5-1) unstable; urgency=medium
This release contains a fix for an SSL-related issue in Ganeti's RPC
mechanism. The fix makes it necessary to run
gnt-cluster renew-crypto --new-node-certificates
after a cluster is fully upgraded to 2.12.5. For more information about the
issue, see https://code.google.com/p/ganeti/issues/detail?id=1094.
-- Apollon Oikonomopoulos <apoikos@debian.org> Mon, 20 Jul 2015 15:22:58 +0300
ganeti (2.11.5-1) unstable; urgency=high
Security Release.
Please read the text of the advisory, quoted below, for more information:
Ganeti, an open source virtualisation manager, suffered from an insecure file
permission vulnerability that leads to sensitive information disclosure. This
issue was fixed with versions 2.10.7 and 2.11.5.
The Ganeti upgrade command ‘gnt-cluster upgrade’ creates an archive of the
current configuration of the cluster (e.g. the contents of “/var/lib/ganeti”).
The archive is named following the pattern ganet*.tar and is written to
“/var/lib/”. Such archives were written with too lax permissions that made
it possible to read them as unprivileged user, on the master node.
The configuration archive contains sensitive information, including SSL keys
for the inter-node communication via RPC as well as the credentials for the
remote API (RAPI). Such information can be used to control various operations
of the cluster, including shutting down and removing instances and nodes from
the cluster, or assuming the identity of the cluster in a MITM attack.
This vulnerability only affects Ganeti clusters meeting the following
criteria:
* The cluster is running Ganeti version 2.10.0 or higher.
* The upgrade command was run, for example when upgrading from 2.10 to 2.11.
* Unprivileged users have access to the host machines and in particular to
the cluster master node.
With the fixed release, the upgrade command will set the permissions of the
archives properly. However, in case previous versions have created an unsafe
archive already, the following mitigations are advised:
* Remove the access to the archive for unprivileged users (for example by
running “chmod 400 /var/lib/ganeti*.tar”).
* Renew the SSL keys by running “gnt-cluster renew-crypto”. You may need to
pass the --new-cluster-certificate, --new-confd-hmac-key,
--new-rapi-certificate, --new-spice-certificate,
--new-cluster-domain-secret flags, and (for version 2.11 only)
the --new-node-certificates flag.
* Renew the RAPI credentials by editing the /var/lib/ganeti/rapi_users file.
* Update RAPI, confd and other clients with the new secrets and
certificates, if applicable.
* Look for any other information regarded as secret in /var/lib/ganeti and
change it. For example VNC and SPICE passwords are not by default kept
there, but could, if Ganeti is so configured.
This vulnerability will be published as oCert-2014-006 on ocert.org; CVE ID is
pending. Thanks to Apollon Oikonomopoulos for reporting and fixing this issue.
Affected versions: 2.10.0 - 2.10.6, 2.11.0 - 2.11.4
Fixed versions: 2.10.7, 2.11.5
-- Guido Trotter <ultrotter@debian.org> Mon, 11 Aug 2014 15:14:40 +0200
ganeti (2.11.2-1) unstable; urgency=medium
Ganeti versions 2.10 and onwards support a coordinated cluster-wide
upgrade between different minor versions (e.g. 2.10.5 -> 2.11.2). This makes
the upgrade process different, depending on the previously installed
version:
* If you are upgrading from 2.10.x, you should first upgrade the packages on
all cluster nodes and then run
gnt-cluster upgrade --to=2.11
on the master node to switch to the new version. The old 2.10 packages can
be safely removed after a successful upgrade.
* If you are upgrading from 2.9.x or earlier, please follow the usual
upgrade procedure by stopping the master, upgrading the packages on all
nodes (the master daemon will refuse to start), and then running
cfgupgrade on the master node to upgrade the configuration.
-- Apollon Oikonomopoulos <apoikos@debian.org> Fri, 13 Jun 2014 12:15:19 +0300
ganeti (2.10.2-1) unstable; urgency=medium
Ganeti now ships a molly-guard(8) script that attempts to prevent an
accidental shutdown or reboot of a node with running instances. To use this
functionality, simply install the molly-guard package.
-- Apollon Oikonomopoulos <apoikos@debian.org> Thu, 20 Mar 2014 11:46:58 +0200
ganeti (2.10.1-1) unstable; urgency=medium
As of 2.10.1-1, ganeti-htools is intended for stand-alone installation on
non-cluster systems only and conflicts with the ganeti package. The ganeti
package itself now provides the htools binaries for cluster systems in a way
that is compatible with upstream's new upgrade model[1].
Future minor version upgrades (e.g. from 2.10 to 2.11) will be compatible
with upstream's new upgrade model, using `gnt-cluster upgrade' (see [1]).
[1] http://docs.ganeti.org/ganeti/2.10/html/design-upgrade.html
-- Apollon Oikonomopoulos <apoikos@debian.org> Wed, 05 Mar 2014 15:35:16 +0200
ganeti (2.8.0-1) unstable; urgency=low
As of 2.8.0-1, ganeti is configured to use separate users for its daemons.
Each daemon now runs as a different user (all with a “gnt-” username prefix)
and root access is currently granted only to the node daemon. This is a
build-time setting and existing installations will be automatically converted
to use the new user separation model.
-- Apollon Oikonomopoulos <apoikos@gmail.com> Tue, 01 Oct 2013 18:02:24 +0300
ganeti (2.7.0-2) unstable; urgency=low
The ganeti2 package has been renamed to ganeti, since the original reasons
for nameing the package ganeti2 (i.e. the 1.2 to 2.0 migration) no longer
apply. A dummy transitional ganeti2 package is provided for compatibility,
you can safely remove it after the installation has finished.
Since 2.7.0-2, all internal Ganeti Python libraries are shipped as a private
module. This is done because the Ganeti internal APIs are not guaranteed to
be stable and direct use by 3rd-party applications is discouraged. Thus, any
3rd-party programs importing Ganeti's Python code, should now live under
/usr/share/ganeti or include /usr/share/ganeti in Python's sys.path.
The RAPI client library, being the only stable external API, is now shipped
as a public module in its own package, python-ganeti-rapi.
Since 2.7.0-2, the HTML documentation is provided in the ganeti-doc package.
-- Apollon Oikonomopoulos <apoikos@gmail.com> Sat, 13 Jul 2013 04:04:27 +0300
ganeti2 (2.1.1-1) unstable; urgency=low
Upgrading from Lenny's 1.2 directly to 2.1 requires a two-step method: first
run /usr/lib/ganeti/tools/cfgupgrade12 followed by the normal
/usr/lib/ganeti/tools/cfgupgrade. This is somewhat more tricky than the
intermediate step (1.2 to 2.0 and 2.0 to 2.1), but should otherwise work.
Backup of the configuration directory is of course recommended, and reading
the wiki page too. Note: if running 2.0, it is possible do to the upgrade
without downtime. If running 1.2, it is a must to stop instances.
Detailed instructions (for both 1.2->2.1 and 2.0->2.1 upgrades):
- stop cron, or comment out the watcher entry in cron
- stop ganeti on the master node
- make a backup of /var/lib/ganeti
- install new software
- if running 1.2, stop all instances
- if running 1.2, first migrate all instances to DRBD8 using
/usr/lib/ganeti/tools/drbd8-upgrade
- if running 1.2, on the master node run /usr/lib/ganeti/tools/cfgupgrade12
- on the master node, run /usr/lib/ganeti/tools/cfgupgrade
- if both cfgupgrade runs have finished successfully, remove the file
/var/lib/ganeti/ssconf_hypervisor on all nodes on which it still exists
- on all non-master nodes, restart ganeti (invoke-rc.d ganeti restart); this
will give some warnings for rapi and confd daemons, but ignore them for now
- on the master node, restart ganeti, and confirm "gnt-node list" works
- on the master node, run "gnt-cluster redist-conf"
- restart ganeti on all nodes now (once more, and on the master node last)
- check that "gnt-cluster verify" doesn't complain
- you can now start all instances (if you stopped them)
- you can now restart cron (or re-enable the watcher entry)
-- Iustin Pop <iustin@debian.org> Sat, 17 Apr 2010 19:05:45 +0200
ganeti2 (2.0.3-1) unstable; urgency=low
Upgrading from the 'ganeti' package (versions 1.2.x) requires manual
intervention; the proper procedure is available at
http://code.google.com/p/ganeti/wiki/UpgradeNotes and requires full
cluster shutdown. It is recommended to read that first before
installing this package.
-- Iustin Pop <iusty@k1024.org> Sat, 25 Jul 2009 12:12:46 +0200
|