XCP-ng
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    XCP-ng 8.3 updates announcements and testing

    Scheduled Pinned Locked Moved News
    377 Posts 41 Posters 154.5k Views 57 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • rzrR Online
      rzr @ph7
      last edited by rzr

      @ph7 said:

      Well I was and still is on v0.19.0:

      So you're up to date ! it was a mistake, let me generate an up to date list

      1 Reply Last reply Reply Quote 0
      • J Offline
        JeffBerntsen Top contributor @rzr
        last edited by

        @rzr Installed and seems to be working normally on my test systems.

        1 Reply Last reply Reply Quote 3
        • A Offline
          acebmxer @rzr
          last edited by

          @rzr

          Updated my to AMD Ryzen host in my home lab. No issues with update will monitor and report back any issues.

          1 Reply Last reply Reply Quote 3
          • A Offline
            acebmxer @rzr
            last edited by acebmxer

            @rzr

            Built new Ubuntu 24.04 vm either fresh install from ISO or from cloudint i seem to be having issues. Existing vms seem to be fine. First thought was becuase vm was multiple nics add it might have caused networking issues. Powered off that vm and build new (first as fresh from iso. Second from cloudint) with 1 nic. Same issues...

            Update - issues were with script that i updated prior to updating hosts. Fixed script all is working again. Didnt test script on new vm prior to updating host.

            1 Reply Last reply Reply Quote 0
            • olivierlambertO Offline
              olivierlambert Vates 🪐 Co-Founder CEO
              last edited by

              I'm not sure it's the right topic for that, probably worth creating a new one 🙂

              A 1 Reply Last reply Reply Quote 0
              • A Offline
                acebmxer @olivierlambert
                last edited by acebmxer

                @olivierlambert Created new topic.

                1 Reply Last reply Reply Quote 3
                • gduperreyG Online
                  gduperrey Vates 🪐 XCP-ng Team
                  last edited by

                  New update candidate for you to test!

                  A new update for the Xen packages is ready, which brings a significant improvement in live migration performance on AMD systems under heavy load, that we add to the previous batch of updates for a common publication.


                  Maintenance updates

                  • xen: Improve migration performance on AMD systems under heavy load.

                  Test on XCP-ng 8.3

                  yum clean metadata --enablerepo=xcp-ng-testing,xcp-ng-candidates
                  yum update --enablerepo=xcp-ng-testing,xcp-ng-candidates
                  reboot
                  

                  The usual update rules apply: pool coordinator first, etc.

                  Versions:

                  • xen: 4.17.6-4.1.xcpng8.3

                  What to test

                  Normal use and anything else you want to test. If you have a pool with AMD processors, we're interested in your feedback regarding live migration under heavy load.

                  Test window before official release of the updates

                  ~4/5 days

                  A F 2 Replies Last reply Reply Quote 4
                  • A Offline
                    Andrew Top contributor @gduperrey
                    last edited by

                    @gduperrey The new OpenSSL/SSH blocks existing/working RSA keys from older SSH clients. While you can still use a password for SSH, it will block old keys from working which will break things (not good for existing LTS installs). To maintain compatibility add PubkeyAcceptedAlgorithms +ssh-rsa to /etc/ssh/sshd_config

                    gduperreyG rzrR 2 Replies Last reply Reply Quote 1
                    • F Offline
                      flakpyro @gduperrey
                      last edited by

                      @gduperrey Tested this on the same hosts i already have running the testing updates from earlier. No issues. Mixture of AMD and Intel.

                      1 Reply Last reply Reply Quote 2
                      • gduperreyG Online
                        gduperrey Vates 🪐 XCP-ng Team @Andrew
                        last edited by

                        @Andrew I just pinged Philippe (rzr) internally to ask him to look into this 🙂

                        1 Reply Last reply Reply Quote 0
                        • rzrR Online
                          rzr @Andrew
                          last edited by rzr

                          @Andrew said:

                          @gduperrey The new OpenSSL/SSH blocks existing/working RSA keys from older SSH clients. While you can still use a password for SSH, it will block old keys from working which will break things (not good for existing LTS installs). To maintain compatibility add PubkeyAcceptedAlgorithms +ssh-rsa to /etc/ssh/sshd_config

                          Hi @andrew, thank you for your feedback, the fallback option you're suggesting will work but it will downgrade the security of your system, we suggested to update clients:

                          "Note that older ssh-clients (with weak ciphers) will need to update, if connection is rejected."

                          Let me make it more explicit that older keys should be also refreshed:

                            ssh-keygen # To generate new $identity_file 
                            ssh-copy-id \
                                  -i $identity_file \
                                  -o HostKeyAlgorithms=+ssh-rsa \
                                  -o PubkeyAcceptedAlgorithms=+ssh-rsa \
                                  $user@$host
                            ssh $user@$host
                          

                          Ideally this can be done before the update, but let's us think if we have a better strategy to provide a smoother experience, meanwhile if anyone is curious please check:

                          https://www.openssh.org/releasenotes.html

                          https://www.openssh.org/txt/release-8.8

                          "We recommend enabling RSA/SHA1 only as a stopgap measure until legacy
                          implementations can be upgraded or reconfigured with another key type
                          (such as ECDSA or Ed25519)."

                          1 Reply Last reply Reply Quote 0
                          • stormiS Online
                            stormi Vates 🪐 XCP-ng Team
                            last edited by stormi

                            Although disabling ssh-rsa is the right thing to do from a security perspective, we'll see what we can do to smoothen the transition.

                            1 Reply Last reply Reply Quote 1

                            Hello! It looks like you're interested in this conversation, but you don't have an account yet.

                            Getting fed up of having to scroll through the same posts each visit? When you register for an account, you'll always come back to exactly where you were before, and choose to be notified of new replies (either via email, or push notification). You'll also be able to save bookmarks and upvote posts to show your appreciation to other community members.

                            With your input, this post could be even better 💗

                            Register Login
                            • First post
                              Last post