auth algorithms limited to sha1 only

Bug #1803386 reported by Rafal Ramocki
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Neutron VPNaaS dashboard
Fix Released
Akihiro Motoki

Bug Description

Currently when creating IKE policies and IPSEC policies there is only SHA1 to choose but vpnaas plugin supports sha1, sha256, sha384 and sha512. This causes additional problem - when policies using other than sha1 algorthms are created from cli they are uneditable from dashboard. Also please keep in mind that sha1 is no longer considered safe and secure.

Revision history for this message
Rafal Ramocki (rafal-ramocki) wrote :
Akihiro Motoki (amotoki)
Changed in neutron-vpnaas-dashboard:
importance: Undecided → High
status: New → In Progress
assignee: nobody → Akihiro Motoki (amotoki)
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to neutron-vpnaas-dashboard (master)

Submitter: Zuul
Branch: master

commit 5157219107c4d940922dfc80cc4b04119ec0d5cf
Author: Akihiro Motoki <email address hidden>
Date: Mon Dec 17 04:25:03 2018 +0900

    Support alrogithms other than sha1

    neutron-vpnaas now supports sha1, sha256, sha384, sha512
    for IKE policy auth_algorithm and IPsec policy auth_algorithm.

    Change-Id: I7d8f3116500230113f66de71a781d13f3ca7b2d9
    Closes-Bug: #1803386

Changed in neutron-vpnaas-dashboard:
status: In Progress → Fix Released
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix included in openstack/neutron-vpnaas-dashboard 1.5.0

This issue was fixed in the openstack/neutron-vpnaas-dashboard 1.5.0 release.

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers


Remote bug watches

Bug watches keep track of this bug in other bug trackers.