We released updates for all of our currently supported Ceph releases to fix a security issue where Ceph was not ensuring that reconnecting/renewing clients were presenting an existing ticket when reclaiming their
Affected Versions:
Available Fixes:
After you upgrade your ceph server installation to the package versions including the fixes, you need to restart all monitors, managers, metadata-services (MDS) and OSDs!
You will then still see two HEALTH warnings:
You also need to restart the
Next you can resolve the monitor warning by enforcing the stricter behavior that is possible now.
Execute the following command on one of the nodes in the Proxmox VE Ceph cluster:
Note: As said, that will cut-off any old client after the ticket validity times out (72h)
If you operate an external cluster and the Proxmox VE side only uses the client, you can still add our Ceph repository and run a normal upgrade process (
See also:
https://docs.ceph.com/en/latest/security/CVE-2021-20288/
global_id
value. An attacker that was able to authenticate could claim a global_id
in use by a different client and potentially disrupt other cluster services.Affected Versions:
- for server: all previous versions
- for clients:
- kernel: none
- user-space: all since (and including) Luminous 12.2.0
- have a valid authentication key for the cluster
- know or guess the global_id of another client
- run a modified version of the Ceph client code to reclaim another client’s global_id
- construct appropriate client messages or requests to disrupt service or exploit Ceph daemon assumptions about global_id uniqueness
Available Fixes:
- Ceph Octopus: 15.2.11
- Ceph Nautlis: 14.2.20
After you upgrade your ceph server installation to the package versions including the fixes, you need to restart all monitors, managers, metadata-services (MDS) and OSDs!
You will then still see two HEALTH warnings:
client is using insecure global_id reclaim
mons are allowing insecure global_id reclaim
KRBD
run the newer client library. For that, either fully restart the VMs (reboot over API or stop ad start), or migrate them to another node in the cluster that has that ceph update already installed.You also need to restart the
pvestatd
and pvedaemon
Proxmox VE daemons accessing the ceph cluster periodically to gather status data or to execute API calls. Either use the web-interface (Node -> System
) or the command-line:
Bash:
systemctl try-reload-or-restart pvestatd.service pvedaemon.service
Next you can resolve the monitor warning by enforcing the stricter behavior that is possible now.
Execute the following command on one of the nodes in the Proxmox VE Ceph cluster:
Bash:
ceph config set mon auth_allow_insecure_global_id_reclaim false
Note: As said, that will cut-off any old client after the ticket validity times out (72h)
If you operate an external cluster and the Proxmox VE side only uses the client, you can still add our Ceph repository and run a normal upgrade process (
apt update && apt dist-upgrade
) to get the fixed client package versions.See also:
https://docs.ceph.com/en/latest/security/CVE-2021-20288/
Last edited: