Ganeti uses both SSL and SSH keys, and actively modifies the SSH keys on the nodes. As result, in order to replace these keys, a few extra steps need to be followed.
For an example when this could be needed, see the thread at Regenerating SSL and SSH keys after the security bug in Debian’s OpenSSL.
Ganeti uses OpenSSL for encryption on the RPC layer and SSH for executing commands. The SSL certificate is automatically generated when the cluster is initialized and it’s copied to added nodes automatically together with the master’s SSH host key.
Note that paths below may vary depending on your distribution. In general, modifications should be done on the master node and then distributed to all nodes of a cluster (possibly using a pendrive - but don’t forget to use “shred” to remove files securely afterwards).
The cluster SSL key is stored in /var/lib/ganeti/server.pem.
Run the following command to generate a new key:
gnt-cluster renew-crypto --new-cluster-certificate
# Older version, which don't have this command, can instead use:
chmod 0600 /var/lib/ganeti/server.pem &&
openssl req -new -newkey rsa:1024 -days 1825 -nodes \
-x509 -keyout /var/lib/ganeti/server.pem \
-out /var/lib/ganeti/server.pem -batch &&
chmod 0400 /var/lib/ganeti/server.pem &&
/etc/init.d/ganeti restart
gnt-cluster copyfile /var/lib/ganeti/server.pem
gnt-cluster command /etc/init.d/ganeti restart
There are two sets of SSH keys in the cluster: the host keys (both DSA and RSA, though Ganeti only uses the RSA one) and the root’s DSA key (Ganeti uses DSA for historically reasons, in the future RSA will be used).
These are the files named /etc/ssh/ssh_host_*. You need to manually recreate them; it’s possibly that the startup script of OpenSSH will generate them if they don’t exist, or that the package system regenerates them.
Also make sure to copy the master’s SSH host keys to all other nodes.
The new public rsa host key created in the previous step must be added in two places:
Edit these two files and update them with newly generated SSH host key (in the previous step, take it from the /etc/ssh/ssh_host_rsa_key.pub).
For the config.data file, please look for an entry named rsahostkeypub and replace the value for it with the contents of the .pub file. For the known_hosts file, you need to replace the old key with the new one on each line (for each host).
These are the files named ~root/.ssh/id_dsa*.
Run this command to rebuild them:
ssh-keygen -t dsa -f ~root/.ssh/id_dsa -q -N ""
This is the file named ~root/.ssh/authorized_keys.
Edit file and update it with the newly generated root key, from the id_dsa.pub file generated in the previous step.
In the end, the files mentioned above should be identical for all nodes in a cluster. Also do not forget to run gnt-cluster verify.