Wednesday, 2023-08-30

derekokeeffeHi all, back again :) I'm trying to get Barbican working with Thales Luna Network HSM, I have most of the config done and the client on the machine can connect to the HSM but Barbican can't. I am on to Thales support trying to figure it out but I think you said you had it done before noonedeadpunk?? When I run the command to create the hmac or mkek keys it returns the error: ERROR: No token was found in slot 0non-zero return code. Any ideas 07:38
derekokeeffeon where to look?07:38
noonedeadpunkhey. I think pretty much same issue mgariepy had recently. I'm not sure if they were able to resolve it though, but worth asking07:50
noonedeadpunkbut neither of my advices has helped :(07:50
noonedeadpunkI believe that things like config, plugin and symlinks are in place?07:51
jrosserderekokeeffe: did you see the examples in the barbican role docs?07:54
jrosserhttps://docs.openstack.org/openstack-ansible-os_barbican/latest/07:55
noonedeadpunkthese didn't help Mark iirc07:57
noonedeadpunkbut yeah, good question to ask07:58
jrossernoonedeadpunk: i know you had trouble with pki/git permissions, so did we, could you take a look at https://review.opendev.org/c/openstack/ansible-role-pki/+/89079307:58
jrosserwe have a deploy host with a non root deploy user and ssh config which makes that user ssh as root07:58
jrosserso it's slightly different again07:58
derekokeeffeHi noonedeadpunk & jrosser, thanks for the reply. Yeah I have all the config done and I thought it was the Luna HSM hence why I contacted them as the error suggests it's something I have failed to do on that (so I thought anyway) the one thing different from the docs is that I don't have libdpod.plugin instead I have libcloud.plugin. Could that be an issue?07:59
derekokeeffeOther than that I must say the AIO is great (I should have taken your advice earlier) :)08:00
noonedeadpunkderekokeeffe: at the end of the day - you can generate mkek and hmac manually thorugh luna clients...08:00
noonedeadpunkAs barbican after all cares only about labels.08:00
noonedeadpunkThough they should be in proper algorythm and format08:01
jrosseri would expect some kind of debug enable on the shared library to08:01
jrossertoo08:01
noonedeadpunkjrosser: yeah, I missed when it went from WIP08:01
derekokeeffeOh can I? Do you have any link to instructions on how to do that with the client?08:01
jrosseri only have experience of this with yubihsm not thales but it was possible to set some env vars that made the yubi pkcs11 library drop a log file08:01
jrossermaybe possible to do the same sort of thing with the thales one?08:02
derekokeeffeOh ok, something else to look at so. Right I'l go digging again and if I find a solution I'll let you know. Thanks as always08:03
noonedeadpunkI never had any reasonable output from thales lib08:03
derekokeeffeAh ok08:05
noonedeadpunkderekokeeffe: and you provide proper slot id to the barbican-manage command?08:07
noonedeadpunkSo HMAC should be CKK_AES/CKK_SHA256_HMAC algo with length 3208:08
noonedeadpunkMKEK same length, CKK_AES only08:09
derekokeeffenoonedeadpunk I have yep, If I provide a slot that doesn't exist I get an error saying it's invalid, that's the reason I initially thought it was misconfiguration on the HSM as Barbican could actually see what slots were available. Thanks I'll get on that now and see if I can get this over the line08:10
noonedeadpunkOr wait for Marc to wake up:)08:10
derekokeeffeHaha I'll do both :)08:11
noonedeadpunkif it was them at all....08:12
jrosseridk if this is any use https://thalesdocs.com/gphsm/ptk/5.9/docs/Content/PTK-C_Program/PKCS_11_Logger/PKCS_11_logger.htm08:13
noonedeadpunkmaybe they've re-created slot or smth like that... I really can't recall08:14
noonedeadpunkI has setup it once like 2-3 years ago and never touched HSM part since them08:14
noonedeadpunk(and actually nobody did)08:14
noonedeadpunkit just works08:15
derekokeeffeThanks jrosser, Oh you have a currently working setup noonedeadpunk?08:19
noonedeadpunkyup08:19
opendevreviewMerged openstack/openstack-ansible-os_nova master: Enable multiple console proxies where requried in deployments  https://review.opendev.org/c/openstack/openstack-ansible-os_nova/+/89052109:49
noonedeadpunkjrosser: I've left a comment to the patch09:58
opendevreviewMerged openstack/openstack-ansible-galera_server master: Remove galera-4 package during upgrades to force version up  https://review.opendev.org/c/openstack/openstack-ansible-galera_server/+/89078710:10
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-galera_server stable/2023.1: Remove galera-4 package during upgrades to force version up  https://review.opendev.org/c/openstack/openstack-ansible-galera_server/+/89287910:13
noonedeadpunkthough we can merge that if you think it's fine this way. I'll put +2 but won't set +W10:21
andrewbonneynoonedeadpunk: I'll take a look at that pki patch comment shortly10:22
opendevreviewAndrew Bonney proposed openstack/ansible-role-pki master: Add defaults for owner/group/mode on pki_install_host  https://review.opendev.org/c/openstack/ansible-role-pki/+/89079310:51
mgariepyi do not have barbican ;) 11:20
mgariepyso it wasn't me hehe11:20
noonedeadpunksorry then :D11:28
noonedeadpunkthen I don't know who that was....11:28
jamesdentoni did those Entrust docs, fwiw13:21
jamesdentonbut it's been a while13:21
NeilHanloni've been meaning to look at barbican, but due to $requirements ended up just slapping together a solution with yubiHSMs13:23
jamesdentonI was anticipating a customer demand that never manifested13:26
jamesdentonfor the HSM, anyway13:26
NeilHanlonyeah my use case is for signing secure boot kernels which comes with its own mess of problems 13:30
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Fix ansible_ssh_extra_args extra newline  https://review.opendev.org/c/openstack/openstack-ansible/+/89319113:57
noonedeadpunkEventually encrypted volumes are pretty much used and asked for, at least by our customers14:49
noonedeadpunkthis also unblocks tls termination for octavia14:50
jamesdenton+115:05
noonedeadpunkthough admin side of things is a disaster....15:06
jamesdentonoff topic, but have you had good luck with vpnaas?15:07
noonedeadpunkwell. relatively:)15:08
noonedeadpunkruns in production for ages15:08
jamesdentoncool. just now revisiting it15:09
noonedeadpunkrouter failovers - can be problematic, but this can be solved from user side by setting vpn state donw/up15:09
noonedeadpunkwe also had to apply some override to templates for cisco specifically15:09
jamesdentonoh, nice. For Cisco peers, like ASA?15:10
noonedeadpunkI'm not sure to be frank... But we had to enable make_before_break, disable mobike and slightly tuned re-keying intervals15:13
noonedeadpunkBut IIRC make_before_break was quite a big deal15:14
jamesdentonwill have to check that out15:14
jamesdentonhave a small POC right now, just creating the VPN between 2 neutron routers at 2 sites15:15
jamesdentonbut its through an ASA on each side, for now. Passthrough15:15
jamesdentondon't think i'm getting through ipsec phase 2, as the tunnel is down15:15
jamesdentonis there any decent logging?15:15
noonedeadpunkUm.. No. We've enabled one with custom template as well15:16
noonedeadpunkI think there's an example somewhere even, sec15:16
jamesdentonalrighty, i can check that out. thanks for the hint15:17
noonedeadpunkwe have strongswan.conf like that https://paste.openstack.org/show/bbECsZitB2aEj1XEFnF6/15:18
noonedeadpunkthere's an example here on how to distribute it https://docs.openstack.org/openstack-ansible-os_neutron/latest/configure-network-services.html#virtual-private-network-service-vpnaas-optional15:18
noonedeadpunkbut iirc you'd need to replace 1 with 2 or smth for more verbose output15:18
noonedeadpunkjamesdenton: sorry15:19
noonedeadpunksyslog didn't fly15:19
noonedeadpunkwe ended up with https://paste.openstack.org/show/bUAt6wbdLuvKAELIsDOA/15:20
jamesdentonoh, it didn't want to write to syslog?15:20
noonedeadpunkfilepath is relative to namespace15:20
jamesdentonor didn't want to clutter15:20
jamesdentonok15:20
noonedeadpunkwell, it's in netns15:20
jamesdentonright, ok15:20
noonedeadpunkso it's hard with syslog there15:20
* noonedeadpunk goes to partch things internally15:21
jamesdentonrebuilding some terraform now15:21
jamesdentonthanks again15:21
noonedeadpunkthese logs will end up in /var/lib/neutron/ipsec/<router uuid>/var/run eventually15:23
jamesdentonright, gotcha. thanks15:23
opendevreviewMerged openstack/openstack-ansible-galera_server stable/2023.1: Remove galera-4 package during upgrades to force version up  https://review.opendev.org/c/openstack/openstack-ansible-galera_server/+/89287916:26
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-lxc_container_create master: Allow LXC container auto mounts to be customised  https://review.opendev.org/c/openstack/openstack-ansible-lxc_container_create/+/89322916:56
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Add default name for user collections file  https://review.opendev.org/c/openstack/openstack-ansible/+/89323017:07
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: WIP - test Vexxhost CAPI driver for magnum  https://review.opendev.org/c/openstack/openstack-ansible/+/89324018:25
jrosser^ i guarantee this is broken right now but is more-right-than-wrong for anyone interested in magnum cluster api18:26
jrossersee https://vexxhost.github.io/magnum-cluster-api/admin/intro/ for context18:27
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: WIP - test Vexxhost CAPI driver for magnum  https://review.opendev.org/c/openstack/openstack-ansible/+/89324018:28
opendevreviewMerged openstack/ansible-role-pki master: Add defaults for owner/group/mode on pki_install_host  https://review.opendev.org/c/openstack/ansible-role-pki/+/89079318:31
opendevreviewJonathan Rosser proposed openstack/ansible-role-pki stable/2023.1: Add defaults for owner/group/mode on pki_install_host  https://review.opendev.org/c/openstack/ansible-role-pki/+/89324718:35
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: WIP - test Vexxhost CAPI driver for magnum  https://review.opendev.org/c/openstack/openstack-ansible/+/89324018:49
KarniHi19:33
KarniIn our previous experiences, it couldn't touch even 1G.19:34
Karninoonedeadpunk suggested me to enable the feature multiqueue on images/flavors that allows networking tasks to use all vCPU.19:35
KarniThis is my Scenario: I have 3 VMs on 3 different physical servers. Each server has 10G NIC cards. VM1=Ubuntu A=ipref Client | VM2 = Cisco ASAv (just for monitoring; it's the gateway for the other two VMS) | VM3=Ubuntu B = ipref Server19:35
KarniAll traffics goes through ASA (I want to use its bit rates graphs)19:36
KarniI'm looking for the right tool to generate traffics19:38
KarniAs someone mentioned that "Note that iperf3 is single threaded, so if you are CPU bound, this will not yield higher throughput."19:38
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: WIP - test Vexxhost CAPI driver for magnum  https://review.opendev.org/c/openstack/openstack-ansible/+/89324020:51
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: WIP - test Vexxhost CAPI driver for magnum  https://review.opendev.org/c/openstack/openstack-ansible/+/89324022:00

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!