XCP-ng
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    XCP-ng 8.3 updates announcements and testing

    Scheduled Pinned Locked Moved News
    388 Posts 45 Posters 156.0k Views 60 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • gduperreyG Online
      gduperrey Vates 🪐 XCP-ng Team @Andrew
      last edited by

      @Andrew I just pinged Philippe (rzr) internally to ask him to look into this 🙂

      1 Reply Last reply Reply Quote 0
      • rzrR Online
        rzr Vates 🪐 XCP-ng Team @Andrew
        last edited by rzr

        @Andrew said:

        @gduperrey The new OpenSSL/SSH blocks existing/working RSA keys from older SSH clients. While you can still use a password for SSH, it will block old keys from working which will break things (not good for existing LTS installs). To maintain compatibility add PubkeyAcceptedAlgorithms +ssh-rsa to /etc/ssh/sshd_config

        Hi @andrew, thank you for your feedback, the fallback option you're suggesting will work but it will downgrade the security of your system, we suggested to update clients:

        "Note that older ssh-clients (with weak ciphers) will need to update, if connection is rejected."

        Let me make it more explicit that older keys should be also refreshed:

          ssh-keygen # To generate new $identity_file 
          ssh-copy-id \
                -i $identity_file \
                -o HostKeyAlgorithms=+ssh-rsa \
                -o PubkeyAcceptedAlgorithms=+ssh-rsa \
                $user@$host
          ssh $user@$host
        

        Ideally this can be done before the update, but let's us think if we have a better strategy to provide a smoother experience, meanwhile if anyone is curious please check:

        https://www.openssh.org/releasenotes.html

        https://www.openssh.org/txt/release-8.8

        "We recommend enabling RSA/SHA1 only as a stopgap measure until legacy
        implementations can be upgraded or reconfigured with another key type
        (such as ECDSA or Ed25519)."

        https://datatracker.ietf.org/doc/html/rfc8332

        As I understand, RSA is safe unless it was coupled with SHA1 hash function which was then decoupled in later versions (and then obsoleted in V_8_7_P1-4-g234475025 with https://github.com/openssh/openssh-portable/commit/2344750250247111a6c3c6a4fe84ed583a61cc11 "The use of RSA/SHA1 can be re-enabled by adding "ssh-rsa" to the
        PubkeyAcceptedAlgorithms directives on the client and server.") .

        Regen keys will be needed, better sooner than later, meanwhile we could support weak keys clients during a short (TBD) deprecation period.

        Update: I think I was able to reproduce the issue @andrew reported using a RSA key generated with
        OpenSSH_5.1p1 Debian-6.maemo2, OpenSSL 0.9.8e 23 Feb 2007

        ssh-keygen -lf ~/.ssh/id_rsa.pub
        2048 SHA256:abcde+0123456789012345678901234567890/vwxyz user@Nokia-N810-43-7 (RSA)
        

        Used along a later client (in a debian chroot jessie amd64) :
        OpenSSH_6.7p1 Debian-5+deb8u4, OpenSSL 1.0.1t 3 May 2016

        While it worked as expected (in a debian chroot stretch amd64) : with:
        OpenSSH_7.4p1 Debian-10+deb9u7, OpenSSL 1.0.2u 20 Dec 2019

        So to conclude using rsa keys need ssh-7+ while ssh6 can be used using stronger cypher like id_ed25519 (not rsa).

        PS: this post may be updated

        0 djmdjm committed to openssh/openssh-portable
        upstream: After years of forewarning, disable the RSA/SHA-1
        
        signature algorithm by default. It is feasible to create colliding SHA1
        hashes, so we need to deprecate its use.
        
        RSA/SHA-256/512 remains available and will be transparently selected
        instead of RSA/SHA1 for most SSH servers released in the last five+
        years. There is no need to regenerate RSA keys.
        
        The use of RSA/SHA1 can be re-enabled by adding "ssh-rsa" to the
        PubkeyAcceptedAlgorithms directives on the client and server.
        
        ok dtucker deraadt
        
        OpenBSD-Commit-ID: 189bcc4789c7254e09e23734bdd5def8354ff1d5
        psafontP 1 Reply Last reply Reply Quote 0
        • stormiS Offline
          stormi Vates 🪐 XCP-ng Team
          last edited by stormi

          Although disabling ssh-rsa is the right thing to do from a security perspective, we'll see what we can do to smoothen the transition.

          1 Reply Last reply Reply Quote 1
          • psafontP Offline
            psafont Vates 🪐 XAPI & Network Team @rzr
            last edited by psafont

            @rzr said:

            Hi @andrew, thank you for your feedback, the fallback option you're suggesting will work but it will downgrade the security of your system, we suggested to update clients:

            If users need to take action, I would rather recommend users to do something that raises the security floor, like generating new keys with newer, future-looking ciphers, like ed25519:

            ssh-keygen -t ed25519 -C "<email>"
            for server in $servers do ; ssh-copy-id $server; done
            
            1 Reply Last reply Reply Quote 0
            • G Offline
              gb.123
              last edited by gb.123

              Hello,
              After updating I get this:

              xcp-ng-error.png

              This seems harmless as I don't have and scsi drive attached. But these messages were not there before.

              Other than that, the server seems to boot fine.

              Regards,

              PS:
              I have updated once for several updates (not one by one) so this messages may also be there in previous updates and may not be related to this particular update.

              rzrR 1 Reply Last reply Reply Quote 0
              • rzrR Online
                rzr Vates 🪐 XCP-ng Team @gb.123
                last edited by rzr

                @gb.123 said:

                Wrong diagnostic page; asked for 1 got 8
                Failed to get diagnostic page 0x1
                Failed to bind enclosure -19
                

                be there in previous updates and may not be related to this particular update.

                I think you're right because the issue you are facing is reported by kernel itself (which was not updated), Can you please share more details about the hardware you're using (is any USB device involved ? try smartmon tools too) eventually post details in other sections of forum.

                G 1 Reply Last reply Reply Quote 0
                • G Offline
                  gb.123 @rzr
                  last edited by

                  @rzr said:

                  I think you're right because the issue you are facing is reported by kernel itself (which was not updated), Can you please share more details about the hardware you're using (is any USB device involved ? try smartmon tools too) eventually post details in other sections of forum.

                  @rzr
                  CPU is AMD Ryzen 7 7840HS in a mini pc.

                  No USB involved in boot, but I do have an external USB HDD connected which is passed through to a VM (this should not effect boot)

                  What details are you looking for and where so you want me to post them ?

                  Update: I also tried on a AMD Ryzen 9 7945HX, which does not seem to have this message.

                  Do you think its USB related or motherboard/bios driver related ?

                  fohdeeshaF 1 Reply Last reply Reply Quote 1
                  • fohdeeshaF Offline
                    fohdeesha Vates 🪐 Pro Support Team @gb.123
                    last edited by

                    @gb.123 those scsi messages can be expected and ignored when a USB enclosure is connected, some USB enclosures do not emulate SCSI Enclosure Services (SES) very well, so the kernel complains when it queries them and gets nonsense back. USB passthrough devices are still visible and enumerated by dom0's kernel. If you remove the drive the messages will go away, but they can be safely ignored.

                    F 1 Reply Last reply Reply Quote 3
                    • F Online
                      flakpyro @fohdeesha
                      last edited by

                      I took the opportunity to swap out the ssh keys on my hosts yesterday from the default rsa keys over to ed25519 keys. I used Ansible to copy the new key over before running another playbook to remove the old key. Having the ability to use Ansible to mange your hosts at scale is very slick!

                      1 Reply Last reply Reply Quote 1
                      • gduperreyG Online
                        gduperrey Vates 🪐 XCP-ng Team
                        last edited by

                        Thank you everyone for your tests and your feedback!

                        The updates are live now: https://xcp-ng.org/blog/2026/03/10/march-2026-maintenance-updates-for-xcp-ng-8-3-lts/

                        M 1 Reply Last reply Reply Quote 2
                        • M Online
                          MajorP93 @gduperrey
                          last edited by

                          @gduperrey On my pool master there are no updates available in yum repository (checked via "yum check-update").
                          Will it take some more time?

                          gduperreyG 1 Reply Last reply Reply Quote 0
                          • B Offline
                            bnerickson
                            last edited by

                            Just a heads up that the updates to net-snmp-libs will break the lldpd package from epel. I know packages from epel aren't supported and are discouraged, but XCP-ng 9 can't come soon enough 🙂. Time to boot up an ancient CentOS 7 VM and create a custom lldpd spec/rpm.

                            1 Reply Last reply Reply Quote 1
                            • gduperreyG Online
                              gduperrey Vates 🪐 XCP-ng Team @MajorP93
                              last edited by

                              @MajorP93 the diffusion of RPMs across different repositories around the world can take some time depending on your geographical location.

                              Sometimes a yum clean metadata can also help to clear the cache and better detect updates that have just arrived on certain repositories.

                              M 1 Reply Last reply Reply Quote 1
                              • M Online
                                MajorP93 @gduperrey
                                last edited by

                                @gduperrey After running "yum clean metadata && yum check-update" the package updates are shown. Thanks.

                                1 Reply Last reply Reply Quote 0

                                Hello! It looks like you're interested in this conversation, but you don't have an account yet.

                                Getting fed up of having to scroll through the same posts each visit? When you register for an account, you'll always come back to exactly where you were before, and choose to be notified of new replies (either via email, or push notification). You'll also be able to save bookmarks and upvote posts to show your appreciation to other community members.

                                With your input, this post could be even better 💗

                                Register Login
                                • First post
                                  Last post