XCP-ng
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    XCP-ng 8.2 updates announcements and testing

    Scheduled Pinned Locked Moved News
    717 Posts 67 Posters 2.0m Views 83 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stormiS Offline
      stormi Vates 🪐 XCP-ng Team @gskger
      last edited by

      @gskger Thanks, you're always there for the tests!

      1 Reply Last reply Reply Quote 0
      • olivierlambertO Offline
        olivierlambert Vates 🪐 Co-Founder CEO
        last edited by

        Indeed, that's really useful! Thanks @gskger

        1 Reply Last reply Reply Quote 0
        • stormiS Offline
          stormi Vates 🪐 XCP-ng Team
          last edited by

          Update pushed to the update repository, blog post to be published on Monday.

          H 1 Reply Last reply Reply Quote 0
          • stormiS Offline
            stormi Vates 🪐 XCP-ng Team
            last edited by stormi

            Another update in testing: ca-certificates, for both XCP-ng 8.1 and 8.2.

            The one we have (from Citrix Hypervisor) is 2 years old and it's good to refresh the list of root certificates from time to time. Not much impact on XCP-ng actually because it's mostly used when you wget or curl an external URL AFAIK. And probably for yum too.

            Install with

            yum clean metadata --enablerepo=xcp-ng-testing
            yum update ca-certificates --enablerepo=xcp-ng-testing
            

            Then usual checks that nothing looks unexpectedly broken.

            H J 2 Replies Last reply Reply Quote 1
            • H Offline
              HeMaN @stormi
              last edited by

              @stormi
              I did not test the updates in the test-repository this time because I wanted to test the Rolling Pool Update function from XO. I recently created a pool of 2 hosts.

              I noticed the patches were available according to XO on the recently installed host, but not on the host I am using already for a longer time (and used to install the test-patches before). This host is also the pool master.
              Only after a yum clean all and a yum update the updates were visible on the first host and thus the pool.

              After fixing that, the Rolling Pool Update went very smooth. I like this feature!

              olivierlambertO 1 Reply Last reply Reply Quote 2
              • H Offline
                HeMaN @stormi
                last edited by HeMaN

                @stormi said in Updates announcements and testing:

                yum clean metadata --enablerepo=xcp-ng-testing
                yum update ca-certificates

                After the rolling pool update of the released production patches, I wanted to test the ca-certificates from the testing repository as well.
                Maybe I was to fast but I got no updates on both hosts

                [18:30 xenserver-2 ~]# yum clean metadata --enablerepo=xcp-ng-testing
                Loaded plugins: fastestmirror
                Cleaning repos: xcp-ng-base xcp-ng-testing xcp-ng-updates
                9 metadata files removed
                8 sqlite files removed
                0 metadata files removed
                [18:30 xenserver-2 ~]# yum update ca-certificates
                Loaded plugins: fastestmirror
                Loading mirror speeds from cached hostfile
                Excluding mirror: updates.xcp-ng.org
                 * xcp-ng-base: mirrors.xcp-ng.org
                Excluding mirror: updates.xcp-ng.org
                 * xcp-ng-updates: mirrors.xcp-ng.org
                xcp-ng-base/signature                                                 |  473 B  00:00:00
                xcp-ng-base/signature                                                 | 3.0 kB  00:00:00 !!!
                xcp-ng-updates/signature                                              |  473 B  00:00:00
                xcp-ng-updates/signature                                              | 3.0 kB  00:00:00 !!!
                (1/2): xcp-ng-updates/primary_db                                      |  46 kB  00:00:00
                (2/2): xcp-ng-base/primary_db                                         | 1.2 MB  00:00:01
                No packages marked for update
                
                
                [18:34 xenserver-3 ~]# yum list installed ca-certificates
                Loaded plugins: fastestmirror
                Loading mirror speeds from cached hostfile
                Excluding mirror: updates.xcp-ng.org
                 * xcp-ng-base: mirrors.xcp-ng.org
                Excluding mirror: updates.xcp-ng.org
                 * xcp-ng-updates: mirrors.xcp-ng.org
                Installed Packages
                ca-certificates.noarch                                                                2018.2.22-70.0.el7_5                                                                @install/$releasever
                
                stormiS 1 Reply Last reply Reply Quote 0
                • stormiS Offline
                  stormi Vates 🪐 XCP-ng Team @HeMaN
                  last edited by

                  @heman You're right, I had forgotten an --enablerepo switch in my post. I edited it to add it.

                  H 1 Reply Last reply Reply Quote 0
                  • H Offline
                    HeMaN @stormi
                    last edited by HeMaN

                    @stormi said in Updates announcements and testing:

                    @heman You're right, I had forgotten an --enablerepo switch in my post. I edited it to add it.

                    I am not at my best today I noticed, I should have seen that 😉

                    Anyway, installed without issue. No strange behaviour afterwards

                    1 Reply Last reply Reply Quote 1
                    • olivierlambertO Offline
                      olivierlambert Vates 🪐 Co-Founder CEO @HeMaN
                      last edited by

                      @heman said in Updates announcements and testing:

                      I noticed the patches were available according to XO on the recently installed host, but not on the host I am using already for a longer time (and used to install the test-patches before). This host is also the pool master.
                      Only after a yum clean all and a yum update the updates were visible on the first host and thus the pool.

                      After fixing that, the Rolling Pool Update went very smooth. I like this feature!

                      Thanks for the feedback. I think we must add a feature to do that from the plugin ("force refresh updates"). Pinging @nraynaud about this.

                      1 Reply Last reply Reply Quote 1
                      • J Offline
                        jmccoy555 @stormi
                        last edited by

                        @stormi Applied ca-certificates along with the security patch and all is good in my pool.

                        1 Reply Last reply Reply Quote 1
                        • stormiS Offline
                          stormi Vates 🪐 XCP-ng Team
                          last edited by

                          The blog post, as promised: https://xcp-ng.org/blog/2021/01/25/january-2021-security-update/

                          1 Reply Last reply Reply Quote 1
                          • stormiS Offline
                            stormi Vates 🪐 XCP-ng Team
                            last edited by

                            A new update of the Xen packages which is not a security update this time is available for tests. It fixes crash analysis with xen-crashdump-analyser (this runs automatically when the host crashes and puts results in /var/crash).

                            When the Release tag (e.g. 9.8.2.xcpng8.2) of the RPM was longer than a certain number of characters (last digit of Xen version + - + release tag <= 16 chars), it was truncated in the xen_extra field (xl info xen_extra) which caused xen-crashdump-analyser to not find some required files from /boot to conduct its crash analysis). The updated packages fix that by removing the .xcpng8.2 or .xcpng8.1 suffix from the filenames in /boot and from the xen_extra value.

                            Installation:

                            yum clean metadata --enablerepo=xcp-ng-testing
                            yum update xen-dom0-libs xen-dom0-tools xen-hypervisor xen-libs xen-tools --enablerepo=xcp-ng-testing
                            

                            Main objective of the tests: as usual, detect obvious regressions.

                            If you want to test the fixed behaviour in case of crash, see https://github.com/xcp-ng/xcp/issues/476 (basically, provoke a crash with the command I gave in the comments, then check that the xen-crashdump-analyser.log file in /var/crash is OK).

                            ghost created this issue in xcp-ng/xcp

                            closed Kdump not generating proper Xen Crashdump Analyzer file on XCP-ng 8.2 #476

                            1 Reply Last reply Reply Quote 1
                            • stormiS Offline
                              stormi Vates 🪐 XCP-ng Team
                              last edited by stormi

                              I've promoted the sudo (https://xcp-ng.org/blog/2021/01/28/security-issue-in-sudo/) and ca-certificate update candidates to official updates.

                              The Xen update is on hold until it's been sufficiently tested.

                              1 Reply Last reply Reply Quote 1
                              • J Offline
                                jmccoy555
                                last edited by

                                A bit late to the party....... Updated my pool and no oddities to report.

                                1 Reply Last reply Reply Quote 1
                                • A Offline
                                  Arraylist
                                  last edited by

                                  Is a host reboot really necessary for the sudo and ca-certificate updates (as noted in the blog post)?
                                  On an ordinary linux system I wouldn't see a need to restart after updating these packages.

                                  stormiS 1 Reply Last reply Reply Quote 0
                                  • stormiS Offline
                                    stormi Vates 🪐 XCP-ng Team @Arraylist
                                    last edited by

                                    @arraylist Good point. I'm updating the blog post.

                                    H 1 Reply Last reply Reply Quote 0
                                    • H Offline
                                      HeMaN @stormi
                                      last edited by

                                      @stormi I did an update for sudo on the hosts with XO CE and after the update I got the warning a reboot is required. I do not know if that is by default after installing updates or that it is a property of the package?

                                      1 Reply Last reply Reply Quote 0
                                      • stormiS Offline
                                        stormi Vates 🪐 XCP-ng Team
                                        last edited by

                                        That's the default behaviour from XO because we currently don't have that kind of information about each updated package available to XO.

                                        1 Reply Last reply Reply Quote 2
                                        • olivierlambertO Offline
                                          olivierlambert Vates 🪐 Co-Founder CEO
                                          last edited by

                                          Indeed. There's some plans to get a way to have more info on which packages really need a reboot. But it's not ultra straight forward.

                                          1 Reply Last reply Reply Quote 1
                                          • stormiS Offline
                                            stormi Vates 🪐 XCP-ng Team
                                            last edited by stormi

                                            A new batch of updates arrived in the testing repository, for XCP-ng 8.2

                                            • Xen (bugfixes)
                                            • xcp-ng-release-* for a fix to the ssh and sshd configuration in order to limit the list of accepted ciphers only to those that are considered secure enough. See list at https://support.citrix.com/article/CTX292897
                                            • xcp-python-libs: "A misconfigured PCI interface-rename rule leaves all host interfaces inaccessible." (quoting Citrix)
                                            • xenserver-status-report and bugtool-conn-tests: "On slower systems, xen-bugtool can experience time outs." (quoting Citrix again)

                                            To install:

                                            yum clean metadata --enablerepo=xcp-ng-testing
                                            yum update bugtool-conn-tests xcp-python-libs xen-dom0-libs xen-dom0-tools xen-hypervisor xen-libs xen-tools xenserver-status-report xcp-ng-release xcp-ng-release-config xcp-ng-release-presets --enablerepo=xcp-ng-testing
                                            

                                            As usual, we're mainly interested in the verification that there's no obvious regression after the installation and a reboot.

                                            A specific test: please check that your /etc/ssh/sshd_config and /etc/ssh/ssh_config have been updated by the update (there's a chance they aren't, if you have modified them in a way that makes the patching fail... And there won't be any warning unfortunately). Check for the presence of:

                                            • in sshd_config:
                                            # Ciphers, MACs, KEX Algorithms & HostKeyAlgorithms
                                            Ciphers chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc
                                            MACs hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
                                            KexAlgorithms curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1
                                            HostKeyAlgorithms ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-rsa
                                            

                                            and also GSSAPIAuthentication no (uncommented)

                                            • in ssh_config:
                                                    Ciphers chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc
                                                    MACs hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
                                                    KexAlgorithms curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1
                                                    HostKeyAlgorithms ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-rsa
                                            
                                            gskgerG 1 Reply Last reply Reply Quote 0

                                            Hello! It looks like you're interested in this conversation, but you don't have an account yet.

                                            Getting fed up of having to scroll through the same posts each visit? When you register for an account, you'll always come back to exactly where you were before, and choose to be notified of new replies (either via email, or push notification). You'll also be able to save bookmarks and upvote posts to show your appreciation to other community members.

                                            With your input, this post could be even better 💗

                                            Register Login
                                            • First post
                                              Last post