Two ESXi 5.5 patches have been released to update the OpenSSL library to version 1.0.1g. These updates do not impact the openssl.exe file:
Caution: When running ESXi 5.5 host with NFS storage, apply patch ESXi550-201404020. If you apply patch ESXi550-201404001 you might encounter issues mentioned in
Frequent NFS APDs after upgrading ESXi to 5.5 U1 (KB 2076392).
Installation instructions:
The typical way to apply patches to ESXi hosts is through the VMware Update Manager. For details, see the Installing and Administering VMware vSphere Update Manager.
For ESXi 5.5 Hosts:
Apply Patch Release ESXi550-201404020, and then apply Patch Release ESXi550-201404001
For ESXi 5.5 Update 1 Hosts:
Apply the Patch Bulletin ESXi550-201404401-SG from the Patch Release ESXi550-201404001
Post installation instructions:
After installing the above-mentioned patches accordingly, you need to perform certificate revocation or replacement and change the passwords.
Generate new self-signed certificate
To generate new self-signed certificates, perform the following steps:
Note: If you are booting the hosts through Auto Deploy, remove the existing certificate directories in C:\ProgramData\VMware\VMware vSphere Auto Deploy\ssl. You see multiple host-xx directories containing the hostname file, certificate, and key of the ESXi Hosts. Remove these directories and reboot the ESXi hosts against the updated Image Profile to generate new certificates for the hosts.
- Log in to the ESXi Shell as a user with administrator privileges.
- Run commands cd /etc/vmware/ssl and ls -l
- In the directory /etc/vmware/ssl, back up any existing certificate and key to a storage persistent directory (under /vmfs/....).
For example:
mv rui.crt /vmfs/volumes/datastore1/orig.rui.crt
mv rui.key /vmfs/volumes/datastore1/orig.rui.key
- Run the command /sbin/generate-certificates to generate new certificates.
Note:: You might see the following error message:
WARNING: can't open config file: /usr/ssl/openssl.cnf
or
WARNING: can't open config file: /etc/pki/tls/openssl.cnf
You can ignore this message as the new certificates are generated successfully.
- To verify that the host has successfully generated new certificates, run the ls -la command and compare the time stamps of the new certificate files with orig.rui.crt and orig.rui.key
- To set the sticky bit back, run the chmod +t rui.crt and chmod +t rui.key commands.
- Restart the host.
Generating the certificates places them in the correct location. Alternatively, you can put the host into maintenance mode, install the new certificate, and then use the Direct Console User Interface (DCUI) to restart the management agents.
Note: You will need to reconnect to vCenter Server after restarting the Host. When you right-click and select Connect, the following warning message might be displayed:
Authenticity of the hosts's SSL certificate is not verified.
Close this message and re-enter the root credentials in the Host Connection wizard to successfully reconnect to the vCenter Server.
You can also configure CA signed certificates for your ESXi 5.5 hosts. For details see Configuring CA signed certificates for ESXi 5.x hosts (2015499).
Change ESXi host root user password
To change the ESXi host root user password, perform the following steps:
- Log in to the ESXi host service console as root, either through SSH or the physical console.
Enter the current root password when prompted.
- Change the root password by running the following command:
passwd root
- Enter the new root password, press Enter. Enter the password a second time to verify. ESXi warns you about nonsecure passwords, but does not prevent you from using them.
Note: If the problem persists after completing the steps in this article, file a support request with VMware Support and note this KB article ID (2076665) in the problem description. For more information, see Filing a Support Request in Customer Connect (2006985).
Additional Information
For translated versions of this article, see: