Skip to content

Latest commit

 

History

History
102 lines (74 loc) · 5.57 KB

upgrade-to-1.19.x.mdx

File metadata and controls

102 lines (74 loc) · 5.57 KB
layout page_title description
docs
Upgrade to Vault 1.19.x - Guides
Deprecations, important or breaking changes, and remediation recommendations for anyone upgrading to 1.19.x from Vault 1.18.x.

Overview

The Vault 1.19.x upgrade guide contains information on deprecations, important or breaking changes, and remediation recommendations for anyone upgrading from Vault 1.18. Please read carefully.

Important changes

Azure auth plugin requires resource_group_name, vm_name, and vmss_name to match the JWT claims on login

Vault versions before 1.19.1, 1.18.7, 1.17.14, and 1.16.18, do not strictly validate the resource_group_name, vm_name, and vmss_name parameters against their token claims during login with Azure authentication.

Refer to the Token validation section of the Azure authN plugin guide for more information on the new validation requirements.

Transit support for Ed25519ph and Ed25519ctx signatures ((#ed25519))

NOTE: This only applies to Transit Ed25519 keys.

On prior versions of Vault, when the sign and verify API endpoints backed by an Ed25519 key received the prehashed=true or the hash_algorithm=sha2-512 parameters they were ignored, returning back or verifying a Pure Ed25519 signature. As of 1.19.x, setting these values on Enterprise editions of Vault will now return an Ed25519ph signature and assume the input has been hashed using the SHA-512 algorithm.

If neither prehashed nor hash_algorithm values are provided, the existing default of using Pure Ed25519 signatures remains unchanged for both Enterprise and CE Vault editions. The change is if those values had been overridden they were previously ignored but now will be enforced based on the table below.

Vault Edition prehashed hash_algorithm 1.19.x Signature Previous Vault Versions Signature
Enterprise not set not set Pure Ed25519 Pure Ed25519
Enterprise false any value other than sha2-512 Pure Ed25519 Pure Ed25519
Enterprise false sha2-512 An error is returned Pure Ed25519
Enterprise true any value other than sha2-512 An error is returned Pure Ed25519
Enterprise true sha2-512 Ed25519ph Pure Ed25519
CE not set not set Pure Ed25519 Pure Ed25519
CE false any value other than sha2-512 Pure Ed25519 Pure Ed25519
CE false sha2-512 An error is returned Pure Ed25519
CE true any value other than sha2-512 An error is returned Pure Ed25519
CE true sha2-512 An error is returned (not supported on CE) Pure Ed25519

Identity system duplicate cleanup ((#dedupe))

Users should review their server logs after upgrading to see if identity duplicates are reported.

Vault 1.19.0 enables users impacted by historical identity duplicate bugs to manually trigger a one-time de-duplication process. This process restores the cluster to supported default behavior by resolving the duplicates.

Vault 1.19.0 also includes improved reporting in server logs to help diagnose whether this de-duplication is required. No behavior will change until the operator activates the relevant flag via the API.

To understand if you need to take action, consult Resolve duplicate identities which demonstrates the log lines to watch for and how to ensure your resolve duplicates safely.

LDAP user DN search with upndomain

The github.com/hashicorp/cap/ldap dependency has been upgraded to include a security improvement which may be a breaking change for users. The enhancement ensures that user DN searches with upndomain configured will now check that exactly one user is returned and error otherwise. For more details, see hashicorp/cap#151.

In previous versions of Vault, multiple users could be returned when searching for the user DN with upndomain configured, and the last user would be selected. As of 1.19.x, such searches will error if multiple users are returned.

Anonymous usage data collection ((#anon-data))

Vault 1.19.0 collects anonymous usage data about the Vault cluster and automatically sends the cluster usage data with the standard utilization data reported through automated license reporting.

RADIUS authentication is no longer case sensitive ((#case-sensitive))

As of Vault 1.19.0 the RADIUS authentication plugin will not force case sensitivity when entered.

Known issues and workarounds

@include 'known-issues/duplicate-hsm-key.mdx'

@include 'known-issues/1_19-failures-after-external-group-changes-standby.mdx'

@include 'known-issues/static-role-premature-rotations.mdx'