With the introduction of OpenSSL 1.1.1, certificates must adhere to new security standards. Failure to meet these standards will result in rejection by OpenSSL during the server-client TLS handshake process.
For more information about cb.conf, see the Carbon Black EDR Server Configuration Guide.
To facilitate the migration from legacy to the system-provided FIPS-compliant OpenSSL 1.1.1, you must scan all active certificates that Carbon Black EDR uses.
To initiate the certificate scanning process, run the following command:
# /usr/share/cb/cbssl certs --scan.
The scan output table provides detailed information for each certificate. The output varies depending on the setup and type and generation of the certificates.
The following example shows how the scan output table can appear if issues are detected with the named certificates. The scan output table provides a comprehensive overview of any issues found with the certificates. It highlights the certificate name, the current status, its location, the reason for the issue, and the recommended remedy to address the problem.
In the following table, the Status
field for all certificates is Fail
.
Name | Location | Reason | Remedy |
---|---|---|---|
Alliance | /etc/cb/certs/carbonblack-alliance-client.crt | Certificate files do not match. Signing algorithm is not |
Perform the following steps in order:
|
Legacy | /etc/cb/certs/cb-server.crt | Missing key usage extension. Signing algorithm is not |
Perform the following steps in order:
|
Client-CA | /etc/cb/certs/cb-client-ca.crt | Missing key usage extension. Signing algorithm is not CA certificate must have the Key Usage extension with the CA certificate must have the Basic Constraints extension with the |
Run the following commands in order:
|
Custom | Carbon Black EDR database | Missing key usage extension. | Perform the following steps in order:
|
UI | /etc/cb/certs/cb-server.crt | Missing key usage extension. Signing algorithm is not |
Perform the following steps in order:
Note: The new certificate must have read permission explicitly set for
cb user if you are not using the default
Carbon Black EDR certs path (
/etc/cb/certs).
|
Redis-CA | /etc/cb/certs/cb-redis-ca.crt | Missing key usage extension. Signing algorithm is not CA certificate must have the Key Usage extension with the CA certificate must have the Basic Constraints extension with the |
Perform the following steps in order:
|
Redis | /etc/cb/certs/cb-redis.crt | Certificate files do not match. Missing key usage extension. Signing algorithm is not sha256WithRSAEncryption , sha384WithRSAEncryption , or sha512WithRSAEncryption . |
Perform the following steps in order:
|
What to do next: See Regenerating Certificates.