ClickCease New Version of KernelCare ePortal has been Released - TuxCare

Join Our Popular Newsletter

Join 4,500+ Linux & Open Source Professionals!

2x a month. No spam.

New Version of KernelCare ePortal has been Released

June 17, 2020 - TuxCare PR Team

NEW Kernelcare eportal blog featured

A new version of KernelCare ePortal allows using custom paths for certificates and uses system certificates by default, as opposed to the previous version which worked with certificates from certifi lib.

What is KernelCare ePortal?

 

KernelCare.ePortal is a patch server that runs internally, but outside of your firewall. It acts as a bridge between internal servers and the main KernelCare patch server. This approach is ideal for staging and production environments which need strict isolation from external networks, or which requires stricter control over the patches to be applied. You can learn more about ePortal in KernelCare Technical Whitepaper.

 

And now, KernelCare team is glad to announce that a new version of ePortal has been released. Here’s what has been changed for the best.

mikhail_pobirsky

 

“It was tremendous effort to release such a major ePortal version, we worked hard for few months to achieve this result. Hopefully our enterprise customers will feel the difference and their life will be a bit easier.”

Mikhail Pobirsky, KernelCare’s Product manager

 

What’s changed in ePortal?

 

First of all, KernelCare ePortal is now FIPS – compliant. Some of KernelCare clients have the requirements to the systems that allows them to state that they are FIPS 140-2 compliant. Usually it is done on python modules substitution to make sure that md5 is not used for cryptographic purposes. In KernelCare ePortal, such function is used to make sure that the file downloaded from the patch server is not broken and the cryptographic area is not affected. In this new release, we added a beacon to md5 call. 

 

A second major improvement is certification usage logic enhancement. Previously, ePortal has been working with certificates provided by certifi lib. The current release changes this logic. ePortal 1.11-1 uses system certificates by default. To make your transition from previous ePortal version smooth, please, install the ca-certificates package before the update (command is the same for both Centos 6 and Centos 7):

 

yum -y install ca-certificates

If you encountered any issues with release delivery after new ePortal version installation, you can do the following:

1) You can always switch back to certifi and certificates provided by this library. In this case, please, add USE_CERTIFI=True parameter to /usr/share/kcare-eportal/config/local.py

echo ‘USE_CERTIFI = True’ >> /usr/share/kcare-eportal/config/local.py

After changing /usr/share/kcare-eportal/config/local.py you need to reboot ePortal following these instructions (dependent from your operating system): https://docs.kernelcare.com/kernelcare-enterprise/#stopping-starting.

Further updates won’t require any additional actions from your end. Your certification settings in /usr/share/kcare-eportal/config/local.py will remain unchanged.

 

2) If you use custom certificates, you need to add CA_BUNDLE variable in /usr/share/kcare-eportal/config/local.py. Specify the path to the directory with your certificates as the value.

For example, the contents of /usr/share/kcare-eportal/config/local.py will look as follows:

cat /usr/share/kcare-eportal/config/local.py

CA_BUNDLE = ‘/my/certificates/directory’

 

Upgrading ePortal to the new version

If you are already using KernelCare ePortal, run the yum -y install kcare-eportal command to update it to 1.11-1 version.

 

To install ePortal from scratch, refer to these installation instructions. Note that ePortal is available to enterprise clients only and will not be available for CentOS 6 starting from July 2020.

 

There are more ePortal improvements planned for deployment this year, so stay tuned for the updates in KernelCare blog or via our social media channels – Facebook, Twitter.

Looking to automate vulnerability patching without kernel reboots, system downtime, or scheduled maintenance windows?

Learn About Live Patching with TuxCare

Become a TuxCare Guest Writer

Get started

Mail

Join

4,500

Linux & Open Source
Professionals!

Subscribe to
our newsletter