After upgrading a tunnel server or client hub to 23.4.7 from any prior version, the following symptoms may occur:
OpenSSL upgrade mandates SHA384 signature algorithm for hub certificates
A hotfix (hub 23.4.7.1) for this issue is available at the CU7 Solution Document page.
If you have a backup of the system or the /hub/ folder:
If you have taken a backup of the system, or the /Nimsoft/ or /hub/ folders prior to the upgrade, take the following steps:
Note: you may also connect locally to the afffected hubs using Infrastructure Manager, and downgrade them to hub 23.4.6 or prior, rather than restoring a backup.
If you do not have a backup, or you are unable to downgrade, or if you have completed the above steps and now need to replace the certificates with SHA384:
In order to resolve this issue, the tunnel server CA will need to be reset, and all existing tunnel client certificates will have to be invalidated, and new certificates issued to replace them.
If you have upgraded the Tunnel Server only, but no clients:
If you have upgraded your tunnel server hub to 23.4.7 but the clients are still on 23.4.6 or earlier, you can temporarily downgrade the hub back to a prior version (23.4.6 or earlier). This will allow the tunnel clients to reconnect.
Then, before upgrading any tunnel hub to 23.4.7 you will need to recreate the Tunnel Server CA and issue new client certificates.
Now you must distribute the new certificates to the clients.
If you happen to have tunnel redundancy (two tunnel servers per client), you can use one tunnel to upgrade the certificates for the other. This process is described in further detail here.
Additional details on using a superpackage to distribute new certificates is available here.
If you have upgraded one or more Tunnel Clients, but not the tunnel server:
If you have upgraded one or more tunnel clients to 23.4.7 and they have gone offline, it will be a little more difficult to bring them back.
You will need to take the following steps:
Once the hub is downgraded to 23.4.6 or earlier, it will come back online using the existing client certificate.
Once all the clients are back online, you will need to go through the process of recreating the Tunnel Server CA and re-issuing the client certificates as described in the section above this one.